Logic in Access Control (Tutorial Notes) In Foundations of Security Analysis and Design V, p.165, 2009. ,
The Active XML project: an overview, The VLDB Journal, vol.7, issue.4, pp.1019-1040, 2008. ,
DOI : 10.1007/s00778-007-0049-y
A rule-based language for web data management, Proceedings of the 30th symposium on Principles of database systems of data, PODS '11, 2011. ,
DOI : 10.1145/1989284.1989320
URL : https://hal.archives-ouvertes.fr/inria-00582891
Social networking on top of the WebdamExchange system, 2011 IEEE 27th International Conference on Data Engineering, pp.1300-1303, 2011. ,
DOI : 10.1109/ICDE.2011.5767939
URL : https://hal.archives-ouvertes.fr/inria-00536361
Provenance in databases, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, pp.1171-1173, 2007. ,
DOI : 10.1145/1247480.1247646
The declarative imperative, ACM SIGMOD Record, vol.39, issue.1, pp.5-19, 2010. ,
DOI : 10.1145/1860702.1860704
Implementing declarative overlays, ACM SIGOPS Operating Systems Review, vol.39, issue.5, pp.75-90, 2005. ,
DOI : 10.1145/1095809.1095818
Separating key management from file system security, SIGOPS, vol.33, issue.5, p.139, 1999. ,
Pond: the OceanStore prototype, 2nd USENIX Conference on File and Storage Technologies, pp.1-14, 2003. ,
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility, ACM SIGOPS Operating Systems Review, vol.35, issue.5, pp.188-201, 2001. ,
DOI : 10.1145/502059.502053
Authentication in the Taos operating system, ACM Transactions on Computer Systems, vol.12, issue.1, pp.3-32, 1994. ,
DOI : 10.1145/174613.174614