Lecture notes in computer science, pp.146-161, 2010. ,
Rewriting of SPARQL/update queries for securing data access Lecture notes in computer science, 12th International Conference on Information and Communications Security ICICS'2010, pp.4-15, 2010. ,
SPARQL query rewriting instrumented by access control model, 1st International Symposium on Data-Driven Process Discovery and Analysis, pp.3-6, 2011. ,
DOI : 10.1007/s12243-013-0365-8
URL : https://hal.archives-ouvertes.fr/hal-00725606
Privacy Policy Preferences Enforced by SPARQL Query Rewriting, 2012 Seventh International Conference on Availability, Reliability and Security, p.2012, 2012. ,
DOI : 10.1109/ARES.2012.86
URL : https://hal.archives-ouvertes.fr/hal-00948460
Secure and Privacy-Preserving Execution Model for Data Services, 25th International Conference on Advanced Information Systems Engineering CAiSE'13 LIST OF PUBLICATIONS International Journals, 2013. ,
DOI : 10.1007/978-3-642-38709-8_3
URL : https://hal.archives-ouvertes.fr/hal-00960863
Privacy query rewriting algorithm instrumented by a privacyaware access control model, Lecture notes in computer science, vol.68, 2013. ,
DOI : 10.1007/s12243-013-0365-8
URL : https://hal.archives-ouvertes.fr/hal-00869138
PAIRSE, SIGMOD-RECORD 2013 -submitted ? S. Oulmakhzoune, N. Cuppens-Boulahia, F. Cuppens and S. Morucci, " SPARQL Query Rewriting Instrumented by the OrBAC Access Control Model " . Paper being submitted for publication at Transaction on Data Privacy ,
DOI : 10.1145/2536669.2536677
URL : https://hal.archives-ouvertes.fr/hal-01124429
fQuery: réécriture de requêtes SPARQL pour assurer la confidentialité des données " . XXIIIe congrès INFORSID, National Journals ? S. Oulmakhzoune, N. Cuppens-Boulahia, F. Cuppens and S. Morucci, " fQuery: réécriture de requêtes SPARQL pour assurer la confidentialité des données " . Génie logiciel, pp.20-25, 2010. ,
The tsimmis project: Integration of heterogenous information sources, p.10, 1994. ,
The information manifold, Proceedings of the AAAI 1995 Spring Symp. on Information Gathering from Heterogeneous, pp.85-91, 1995. ,
A uniform framework for integrating knowledge in heterogeneous knowledge systems, Proceedings of the Eleventh International Conference on Data Engineering, pp.513-520, 1995. ,
DOI : 10.1109/ICDE.1995.380362
Scaling heterogeneous databases and the design of Disco, Proceedings of 16th International Conference on Distributed Computing Systems, pp.449-457, 1996. ,
DOI : 10.1109/ICDCS.1996.507993
URL : https://hal.archives-ouvertes.fr/inria-00073986
Don?Äôt scrap it, wrap it! a wrapper architecture for legacy data sources, Proceedings of 23rd International Conference on Very Large Data Bases, pp.266-275, 1997. ,
Weakly Constraining Multimedia Types Based on a Type Embedding Ordering, Advances in Multimedia Information Systems, pp.121-129, 1998. ,
DOI : 10.1007/3-540-49651-3_12
Security enforced mediation systems for data integration, INFOCOMP Journal of Computer Science, vol.5, issue.1, pp.87-95, 2005. ,
Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003. ,
DOI : 10.1109/POLICY.2003.1206966
URL : https://hal.archives-ouvertes.fr/hal-01483818
Contextual Privacy Management in Extended Role Based Access Control Model, DPM/SETOP, pp.21-35, 2009. ,
DOI : 10.1007/978-3-642-11207-2_10
Resource description framework (rdf): Concepts and abstract syntax, p.147, 2004. ,
Sparql query language for rdf. http: //www.w3.org/TR/rdf-sparql-query, p.81, 2008. ,
Sparql 1.1 federation extensions, 2010. ,
Sparql query language for rdf, p.48, 2008. ,
Mediators in the architecture of future information systems, Computer, vol.25, issue.3, pp.38-49, 1992. ,
DOI : 10.1109/2.121508
Secure mediation: requirements, design, and architecture, Journal of Computer Security, vol.11, issue.3, pp.365-398, 2003. ,
DOI : 10.3233/JCS-2003-11306
URL : http://doi.org/10.3233/jcs-2003-11306
Combining the best of global-as-view and local-asview for data integration, Proc. of the 3rd International Conference ISTA, pp.123-135, 2004. ,
Query caching and optimization in distributed mediator systems, ACM SIGMOD Record, vol.25, issue.2, pp.137-146, 1996. ,
DOI : 10.1145/235968.233327
Navigational plans for data integration, Proceedings of the National Conference on Artificial Intelligence, pp.67-73 ,
Querying heterogeneous information sources using source descriptions, 1996. ,
Infomaster, ACM SIGMOD Record, vol.26, issue.2, pp.539-542, 1997. ,
DOI : 10.1145/253262.253400
Planning to gather information, PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, pp.32-39, 1996. ,
Data Integration: The Relational Logic Approach, Synthesis Lectures on Artificial Intelligence and Machine Learning, vol.4, issue.1, pp.1-97, 2010. ,
DOI : 10.2200/S00226ED1V01Y200911AIM008
A distributed semantic mediation architecture, Journal of Information and Organizational Sciences, vol.28, issue.12 10, pp.135-150, 2004. ,
Humboldt discoverer: A semantic p2p index for pdms, International Workshop Data Integration and the Semantic Web (DISWeb) ,
A peer-to-peer (p2p) based semantic agreement approach for spatial information interoperability, p.141, 2006. ,
Aggrego server| semsoft. http://semsoft-corp.com/fr/content/ aggrego-server, pp.141-154, 2012. ,
Object exchange across heterogeneous information sources, Proceedings of the Eleventh International Conference on Data Engineering, pp.251-260, 1995. ,
DOI : 10.1109/ICDE.1995.380386
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.47.5182
Semantic Query Routing and Processing in P2P Database Systems: The ICS-FORTH SQPeer Middleware, Current Trends in Database Technology-EDBT 2004 Workshops, pp.433-436, 2005. ,
DOI : 10.1007/978-3-540-30192-9_48
EDUTELLA, Proceedings of the eleventh international conference on World Wide Web , WWW '02, pp.604-615, 2002. ,
DOI : 10.1145/511446.511525
Bibster: a semantics-based bibliographic peer-to-peer system. The Semantic Web?ISWC, pp.122-136, 2004. ,
RDFPeers, Proceedings of the 13th conference on World Wide Web , WWW '04, pp.650-657, 2004. ,
DOI : 10.1145/988672.988760
Gridvine: Building internet-scale semantic overlay networks. The Semantic Web?ISWC, pp.107-121, 2004. ,
DOI : 10.1007/978-3-540-30475-3_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.8877
Peer-to-peer semantic integration of xml and rdf data sources. Agents and Peer-to-Peer Computing, pp.108-119, 2005. ,
The piazza peer data management system. Knowledge and Data Engineering, IEEE Transactions on, vol.16, issue.7 11, pp.787-798, 2004. ,
XPeer : A Self-Organizing XML P2P Database System, Current Trends in Database Technology-EDBT, 2004. ,
DOI : 10.1007/978-3-540-30192-9_45
Replication and query processing in the appa data management system, 2004. ,
URL : https://hal.archives-ouvertes.fr/hal-00688795
PeerDB: a P2P-based system for distributed data sharing, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), pp.633-644, 2003. ,
DOI : 10.1109/ICDE.2003.1260827
AmbientDB: Relational Query Processing in a P2P Network, Proceedings of the International Workshop on Databases, Information Systems and Peer-to-Peer Computing (DBISP2P), LNCS 2788. Citeseer, 2003. ,
DOI : 10.1007/978-3-540-24629-9_12
Hyperqueries: Dynamic distributed query processing on the internet, PROCEEDINGS OF THE INTERNATIONAL CONFER- ENCE ON VERY LARGE DATA BASES, pp.551-560, 2001. ,
The hyperion project, ACM SIGMOD Record, vol.32, issue.3, pp.53-58, 2003. ,
DOI : 10.1145/945721.945733
FREddies: DHT-based adaptive query processing via FedeRated Eddies. Citeseer, 2004. ,
An adaptable distributed query processing architecture, Data & Knowledge Engineering, vol.53, issue.3, pp.283-309, 2005. ,
DOI : 10.1016/j.datak.2004.08.004
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.3890
Providing security and interoperation of heterogeneous systems. Distributed and Parallel Databases, pp.119-145, 2000. ,
Credential Based Mediator Architecture for Access Control and Data Integration in Multiple Data Sources Environment, International Journal of Network Security & Its Applications, vol.3, issue.3, 2011. ,
DOI : 10.5121/ijnsa.2011.3304
Mediation security specification and enforcement for heterogeneous databases, Proceedings of the 2005 ACM symposium on Applied computing , SAC '05, pp.354-358, 2005. ,
DOI : 10.1145/1066677.1066759
A role-based access control model for information mediation, Information Reuse and Integration Proceedings of the 2004 IEEE International Conference on, pp.277-282, 2004. ,
An advanced xml mediator for heterogeneous information systems based on application domain specification, International journal of computer science and applications, vol.3, issue.2 10, 2006. ,
Secure access wrapper: mediating security between heterogeneous databases, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.308-322, 2000. ,
DOI : 10.1109/DISCEX.2000.821529
Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges, The Second International Conference on Availability, Reliability and Security (ARES'07), pp.871-878, 2007. ,
DOI : 10.1109/ARES.2007.30
CHAOS: An Active Security Mediation System, Advanced Information Systems Engineering, pp.232-246, 2000. ,
DOI : 10.1007/3-540-45140-4_16
A Hybrid PKI Model: Application to Secure Mediation, 16th Annual IFIP WG, pp.271-282, 2003. ,
DOI : 10.1007/978-0-387-35697-6_21
Towards Secure Mediation, Workshop Sicherheit und Electronic Commerce, p.11, 1998. ,
DOI : 10.1007/978-3-322-84901-4_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.6468
Secure Mediation of Join Queries by Processing Ciphertexts, 2007 IEEE 23rd International Conference on Data Engineering Workshop, pp.715-724, 2007. ,
DOI : 10.1109/ICDEW.2007.4401059
Privacy-preserving semantic interoperation and access control of heterogeneous databases, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, pp.66-77, 2006. ,
DOI : 10.1145/1128817.1128831
A security mediator for health care information, Proceedings of the AMIA Annual Fall Symposium, page 120. American Medical Informatics Association, 1996. ,
Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, p.146, 2001. ,
DOI : 10.1145/501978.501980
Decentralized mediation security, 2008 IEEE International Symposium on Parallel and Distributed Processing, pp.1-6, 2008. ,
DOI : 10.1109/IPDPS.2008.4536560
A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms, Secure Data Management, VLDB 2004 Workshop, pp.133-147, 2004. ,
DOI : 10.1007/978-3-540-30073-1_10
A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, p.14, 2002. ,
DOI : 10.1145/505586.505590
A Formal Access Control Model for XML Databases, Proc. Of the 2005 VLDB Workshop on Secure Data Management (SDM), p.14, 2005. ,
DOI : 10.1007/11552338_7
URL : https://hal.archives-ouvertes.fr/hal-00408570
The case for access control on XML relationships, Proceedings of the 14th ACM international conference on Information and knowledge management , CIKM '05, p.14, 2005. ,
DOI : 10.1145/1099554.1099576
URL : https://hal.archives-ouvertes.fr/hal-00489266
XML document security based on provisional authorization, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, p.14, 2000. ,
DOI : 10.1145/352600.352613
Secure XML Views, Proc. of the 16th IFIP WG11.3 Working Conference on Database and Application Security, p.14, 2002. ,
DOI : 10.1007/978-0-387-35697-6_11
Protection of Relationships in XML Documents with the XML-BB Model, Proc. of ICISS2005, p.16, 2005. ,
DOI : 10.1007/11593980_11
Access control in a relational data base management system by query modification, Proceedings of the 1974 annual conference on , ACM 74, pp.180-186, 1974. ,
DOI : 10.1145/800182.810400
Oracle database security guide : Chapter 7, using oracle virtual private database to control data access, p.89 ,
On the correctness criteria of fine-grained access control in relational databases, Proceedings of the 33rd international conference on Very large data bases, pp.77-89, 2007. ,
Limiting Disclosure in Hippocratic Databases, Proceedings of the Thirtieth international conference on Very large data bases, pp.108-119, 2004. ,
DOI : 10.1016/B978-012088469-8.50013-9
A general approach to securely querying XML, Proc. of the 5th International Workshop on Security in Information Systems, p.16, 2007. ,
DOI : 10.1016/j.csi.2008.03.006
URL : https://hal.archives-ouvertes.fr/hal-00994104
QFilter, Proceedings of the Thirteenth ACM conference on Information and knowledge management , CIKM '04, pp.543-552, 2004. ,
DOI : 10.1145/1031171.1031273
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata, The VLDB Journal, vol.60, issue.2, pp.397-415, 2011. ,
DOI : 10.1007/s00778-010-0202-x
Yfilter: Efficient and scalable filtering of xml documents, Data Engineering Proceedings. 18th International Conference on, pp.341-342, 2002. ,
fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality, Proc. of the 24th IFIP WG11.3 Working Conference on Data and Applications Security and Privacy, pp.21-23, 2010. ,
DOI : 10.1007/978-3-642-13739-6_10
URL : https://hal.archives-ouvertes.fr/hal-01056741
Extending query rewriting techniques for fine-grained access control, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, p.71, 2004. ,
DOI : 10.1145/1007568.1007631
Secure computer system: Unified exposition and multics interpretation, p.47, 1976. ,
Principles of Database and Knowledge-Base Systems: Volume II: The New Technologies, p.55, 1990. ,
Modelling contextual security policies, International Journal of Information Security, vol.57, issue.58, p.92, 2007. ,
DOI : 10.1007/s10207-007-0051-9
Inheritance Hierarchies in the Or-BAC Model and Application in a Network Environment, Proceedings of the 3rd Workshop on Foundations of Computer Security (FCS?Äô04), p.58, 2004. ,
Multi-Granular Licences to Decentralize Security Administration, Proceedings of the First International Workshop on Reliability, Availability and Security (WRAS'07), p.59, 2007. ,
Sparql query rewriting instrumented by access control model, 1st International Symposium on Data-Driven Process Discovery and Analysis 2011, pp.3-6, 2011. ,
DOI : 10.1007/s12243-013-0365-8
URL : https://hal.archives-ouvertes.fr/hal-00725606
Privacy-aware role based access control, Proceedings of the 12th ACM symposium on Access control models and technologies, pp.41-50, 2007. ,
DOI : 10.1109/msp.2009.102
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.566
A purpose-based access control model, Information Assurance and Security IAS 2007. Third International Symposium on, pp.143-148, 2007. ,
Purbac: Purpose-aware role-based access control. On the Move to Meaningful Internet Systems: OTM, pp.1104-1121, 2008. ,
DOI : 10.1007/978-3-540-88873-4_12
Composing dataproviding web services in p2p-based collaboration environments, Advanced Information Systems Engineering, pp.531-545, 2007. ,
SPARQL2XQuery 2.0: Supporting Semantic-based queries over XML data, 2010 Fifth International Workshop Semantic Media Adaptation and Personalization, pp.76-84, 2010. ,
DOI : 10.1109/SMAP.2010.5706860
Semantic based access over xml data. Visioning and Engineering the Knowledge Society. A Web Science Perspective, pp.259-267, 2009. ,
DOI : 10.1007/978-3-642-04754-1_27
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
Collective privacy management in social networks, Proceedings of the 18th international conference on World wide web, WWW '09, pp.521-530, 2009. ,
DOI : 10.1145/1526709.1526780
Sparql 1.1 query language, p.82, 2011. ,
The platform for privacy preference 1.1(p3p 1.1) specification, Tech. Rep. Note, vol.13, issue.89, 2006. ,
On Obligations, 10th European Symposium on Research in Computer Security, pp.98-117, 2005. ,
DOI : 10.1007/11555827_7
Directive 97/66, the processing of personal data and the protection of privacy in the telecommunications sector, 1990. ,
Privacy Policy Preferences Enforced by SPARQL Query Rewriting, 2012 Seventh International Conference on Availability, Reliability and Security, pp.335-342 ,
DOI : 10.1109/ARES.2012.86
URL : https://hal.archives-ouvertes.fr/hal-00948460
A Query Rewriting Approach for Web Service Composition, IEEE Transactions on Services Computing, vol.3, issue.3, pp.206-222, 2010. ,
DOI : 10.1109/TSC.2010.4
URL : https://hal.archives-ouvertes.fr/hal-01381443
Frederic Cuppens, Michael Mrissa, and Hajer Taktak. Secure and privacy-preserving execution model for data services, 25th International Conference on Advanced Information Systems Engineering CAiSE'13, 2013. ,
Data services, Communications of the ACM, vol.55, issue.6, pp.86-97, 2012. ,
DOI : 10.1145/2184319.2184340
Declarative data services: This is your data on soa, SOCA, p.4, 2007. ,
Quality-aware service-oriented data integration, ACM SIGMOD Record, vol.41, issue.1, pp.11-19, 2012. ,
DOI : 10.1145/2206869.2206873
Information as a Service in a Data Analytics Scenario - A Case Study, 2008 IEEE International Conference on Web Services, pp.615-620, 2008. ,
DOI : 10.1109/ICWS.2008.119
DEMODS: A Description Model for Data-as-a-Service, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications, pp.5-12, 2012. ,
DOI : 10.1109/AINA.2012.91
Information-as-a-service: What's behind this hot new trend? Forrester Research, Research Report, vol.3, issue.3 103, pp.206-222, 2007. ,
Interoperability in ehealth systems (tutorial) PVLDB, pp.2026-2027, 2012. ,
Data Management Challenges in Cloud Computing Infrastructures, DNIS, pp.1-10, 2010. ,
DOI : 10.1007/978-3-642-12038-1_1
Privacy, information technology, and health care, Commun . ACM, vol.40, issue.8, pp.92-100, 1997. ,
Secure and privacypreserving data services in the cloud: A data centric view, VLDB 2012, pp.270-294, 2001. ,
Web service security, Encyclopedia of Cryptography and Security, pp.1365-1377, 2011. ,
A semantic security architecture for web services, ARES, pp.222-227, 2010. ,
A privacy preserving repository for data integration across data sharing services, IEEE T. Services Computing, vol.1, issue.3, pp.130-140, 2008. ,
A view-based Monitoring for Privacy-aware Web services, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010), pp.1129-1132, 2010. ,
DOI : 10.1109/ICDE.2010.5447762
Enforcing privacy within an enterprise using ibm tivoli privacy manager for e-business, VLDB, pp.108-119, 2003. ,
Panagiotis Reveliotis, and Sachin Thatte. Data service modeling in the aqualogic data services platform, SERVICES I, pp.78-80, 2008. ,
Adorbac: an administration model for or-bac, International Journal of Computer Systems Science & Engineering, vol.19, issue.3, pp.151-162, 2004. ,
MotOrBAC 2: A Security Policy Tool, Proceedings the 3rd Conference on Security in Network Architecture and Information Systems (SARSSI'08), p.117, 2008. ,
Aspect-oriented programming, p.118, 1997. ,
Design patterns: Elements of reusable object-oriented software, p.120, 1995. ,
Combination of building blocks, (b) Illustration , (c) Processing flow, p.15 ,
Combination of building blocks, (b) Illustration , (c) Processing flow, p.17 ,