Policy contexts: controlling information flow in parameterised RBAC, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.99-110, 2003. ,
DOI : 10.1109/POLICY.2003.1206964
Information Flow Security for XML Transformations, ASIAN03, pp.33-53, 2003. ,
DOI : 10.1007/978-3-540-40965-6_4
URL : https://hal.archives-ouvertes.fr/hal-00152613
CDuce, ACM SIGPLAN Notices, vol.38, issue.9, pp.51-63, 2003. ,
DOI : 10.1145/944746.944711
URL : https://hal.archives-ouvertes.fr/hal-00699610
Secure and selective dissemination of XML documents, ACM Transactions on Information and System Security, vol.5, issue.3, pp.290-331, 2002. ,
DOI : 10.1145/545186.545190
Design and implementation of an access control processor for XML documents, Computer Networks, vol.33, issue.1-6, pp.1-6, 2000. ,
DOI : 10.1016/S1389-1286(00)00053-0
Securing XML Documents, EDBT00, pp.121-135, 2000. ,
DOI : 10.1007/3-540-46439-5_8
A general approach to securely querying XML, Computer Standards & Interfaces, vol.30, issue.6, pp.379-389, 2008. ,
DOI : 10.1016/j.csi.2008.03.006
URL : https://hal.archives-ouvertes.fr/hal-00994104
JOXM: Java Object XML Mapping, 2008 Eighth International Conference on Web Engineering, pp.332-335, 2008. ,
DOI : 10.1109/ICWE.2008.43
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.7185
A survey and analysis of access control architectures for XML data. Master's thesis, Naval Postgraduate School, 2006. ,
Secure XML querying with security views, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.587-598, 2004. ,
DOI : 10.1145/1007568.1007634
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.2679
A model for evaluation and administration of security in object-oriented databases, IEEE Transactions on Knowledge and Data Engineering, vol.6, issue.2, pp.275-292, 1994. ,
DOI : 10.1109/69.277771
Role-based access controls, 15th National Computer Security Conference, pp.554-563, 1992. ,
D3 -expression of security policies compatible with code sharing, Tech. rep., ANR SFINCS, 2010. ,
Updatable Security Views, 2009 22nd IEEE Computer Security Foundations Symposium, pp.60-74, 2009. ,
DOI : 10.1109/CSF.2009.25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.145.8632
A logical formalization of a secure XML database, Computer Science and System Engineering Journal, vol.21, issue.5, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00399308
Regulating Access to XML Documents, DBSEC01, pp.299-314, 2001. ,
DOI : 10.1007/978-0-387-35587-0_21
On Practical Information Flow Policies for Java-Enabled Multiapplication Smart Cards, Proc. 8th IFIP Conf. on Smart Card Research and Advanced Applications (CARDIS08), pp.32-47, 2008. ,
DOI : 10.1109/JSAC.2002.806121
URL : https://hal.archives-ouvertes.fr/inria-00544952
A Sound Analysis for Secure Information Flow Using Abstract Memory Graphs, Lecture Notes in Computer Science, vol.5961, pp.355-370 ,
DOI : 10.1007/978-3-642-11623-0_21
XML Security Views Revisited, DBPL, pp.52-67, 2009. ,
DOI : 10.1007/11896548_22
URL : https://hal.archives-ouvertes.fr/hal-00396796
XML access control language: provisional authorization for XML documents ,
Authorization-Transparent Access Control for XML Under the Non-Truman Model, EDBT, pp.222-239, 2006. ,
DOI : 10.1007/11687238_16
Generalized XML security views, International Journal of Information Security, vol.29, issue.2, pp.173-203, 2009. ,
DOI : 10.1007/s10207-008-0074-x
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.8168
Storage and access control issues for XML documents, Encyclopedia of Information Science and Technology (V), M. Khosrow-Pour, Ed. Idea Group, 2005. ,
DTD inference for views of XML data, Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '00, pp.35-46, 2000. ,
DOI : 10.1145/335168.335173
A model of authorization for next-generation database systems, ACM Transactions on Database Systems, vol.16, issue.1, pp.88-131, 1991. ,
DOI : 10.1145/103140.103144
Using Schemas to Simplify Access Control for XML Documents, ICDCIT04, pp.363-368, 2004. ,
DOI : 10.1007/978-3-540-30555-2_42
Extending query rewriting techniques for fine-grained access control, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.551-562, 2004. ,
DOI : 10.1145/1007568.1007631
An authorization model for a distributed hypertext system, IEEE Transactions on Knowledge and Data Engineering, vol.8, issue.4, pp.555-562, 1996. ,
DOI : 10.1109/69.536249
Information flow property preserving transformation of UML interaction diagrams, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.150-159, 2006. ,
DOI : 10.1145/1133058.1133080
Semantic-based approach to streaming XML contents using Xstream, Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003, p.91, 2003. ,
DOI : 10.1109/CMPSAC.2003.1245326
Schema Based XML Security: RBAC Approach, DBSEC03 (Estes Park, pp.330-343, 2003. ,
DOI : 10.1007/1-4020-8070-0_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.6016