. Sec, Lecture notes in computer science, pp.146-161, 2010.

@. S. Oulmakhzoune, N. Cuppens-boulahia, F. Cuppens, and S. Morucci, Rewriting of SPARQL/update queries for securing data access Lecture notes in computer science, 12th International Conference on Information and Communications Security ICICS'2010, pp.4-15, 2010.

@. S. Oulmakhzoune, N. Cuppens-boulahia, F. Cuppens, and S. Morucci, SPARQL query rewriting instrumented by access control model, 1st International Symposium on Data-Driven Process Discovery and Analysis, pp.3-6, 2011.
DOI : 10.1007/s12243-013-0365-8

URL : https://hal.archives-ouvertes.fr/hal-00725606

@. S. Oulmakhzoune, N. Cuppens-boulahia, F. Cuppens, and S. Morucci, Privacy Policy Preferences Enforced by SPARQL Query Rewriting, 2012 Seventh International Conference on Availability, Reliability and Security, p.2012, 2012.
DOI : 10.1109/ARES.2012.86

URL : https://hal.archives-ouvertes.fr/hal-00948460

@. M. Barhamgi, D. Benslimane, S. Oulmakhzoune, N. Cuppens-boulahia, F. Cuppens et al., Secure and Privacy-Preserving Execution Model for Data Services, 25th International Conference on Advanced Information Systems Engineering CAiSE'13 LIST OF PUBLICATIONS International Journals, 2013.
DOI : 10.1007/978-3-642-38709-8_3

URL : https://hal.archives-ouvertes.fr/hal-00960863

@. S. Oulmakhzoune, N. Cuppens-boulahia, F. Cuppens, S. Morucci, M. Barhamgi et al., Privacy query rewriting algorithm instrumented by a privacyaware access control model, Lecture notes in computer science, vol.68, 2013.
DOI : 10.1007/s12243-013-0365-8

URL : https://hal.archives-ouvertes.fr/hal-00869138

@. D. Benslimane, M. Barhamgi, F. Cuppens, F. Morvan, B. Defude et al., PAIRSE, SIGMOD-RECORD 2013 -submitted ? S. Oulmakhzoune, N. Cuppens-Boulahia, F. Cuppens and S. Morucci, " SPARQL Query Rewriting Instrumented by the OrBAC Access Control Model " . Paper being submitted for publication at Transaction on Data Privacy
DOI : 10.1145/2536669.2536677

URL : https://hal.archives-ouvertes.fr/hal-01124429

N. Conferences, @. S. Oulmakhzoune, N. Cuppens-boulahia, F. Cuppens, and S. Morucci, fQuery: réécriture de requêtes SPARQL pour assurer la confidentialité des données " . XXIIIe congrès INFORSID, National Journals ? S. Oulmakhzoune, N. Cuppens-Boulahia, F. Cuppens and S. Morucci, " fQuery: réécriture de requêtes SPARQL pour assurer la confidentialité des données " . Génie logiciel, pp.20-25, 2010.

S. Chawathe, H. Garcia-molina, J. Hammer, K. Ireland, Y. Papakonstantinou et al., The tsimmis project: Integration of heterogenous information sources, p.10, 1994.

T. Kirk, A. Y. Levy, Y. Sagiv, and D. Srivastava, The information manifold, Proceedings of the AAAI 1995 Spring Symp. on Information Gathering from Heterogeneous, pp.85-91, 1995.

S. Adali and R. Emery, A uniform framework for integrating knowledge in heterogeneous knowledge systems, Proceedings of the Eleventh International Conference on Data Engineering, pp.513-520, 1995.
DOI : 10.1109/ICDE.1995.380362

A. Tomasic, L. Raschid, and P. Valduriez, Scaling heterogeneous databases and the design of Disco, Proceedings of 16th International Conference on Distributed Computing Systems, pp.449-457, 1996.
DOI : 10.1109/ICDCS.1996.507993

URL : https://hal.archives-ouvertes.fr/inria-00073986

M. T. Roth and P. Schwarz, Don?Äôt scrap it, wrap it! a wrapper architecture for legacy data sources, Proceedings of 23rd International Conference on Very Large Data Bases, pp.266-275, 1997.

C. Altenschmidt, J. Biskup, J. Freitag, and B. Sprick, Weakly Constraining Multimedia Types Based on a Type Embedding Ordering, Advances in Multimedia Information Systems, pp.121-129, 1998.
DOI : 10.1007/3-540-49651-3_12

L. Yang and R. K. Ege, Security enforced mediation systems for data integration, INFOCOMP Journal of Computer Science, vol.5, issue.1, pp.87-95, 2005.

A. A. Kalam, P. Baida, S. Balbiani, F. Benferhat, Y. Cuppens et al., Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003.
DOI : 10.1109/POLICY.2003.1206966

URL : https://hal.archives-ouvertes.fr/hal-01483818

N. Ajam, N. Cuppens-boulahia, and F. Cuppens, Contextual Privacy Management in Extended Role Based Access Control Model, DPM/SETOP, pp.21-35, 2009.
DOI : 10.1007/978-3-642-11207-2_10

G. Klyne and J. Carroll, Resource description framework (rdf): Concepts and abstract syntax, p.147, 2004.

E. Prud, A. Hommeaux, and . Seaborne, Sparql query language for rdf. http: //www.w3.org/TR/rdf-sparql-query, p.81, 2008.

E. Prud, A. Hommeaux, and . Seaborne, Sparql 1.1 federation extensions, 2010.

P. Gearon, A. Passant, and A. Polleres, Sparql query language for rdf, p.48, 2008.

G. Wiederhold, Mediators in the architecture of future information systems, Computer, vol.25, issue.3, pp.38-49, 1992.
DOI : 10.1109/2.121508

C. Altenschmidt, J. Biskup, U. Flegel, and Y. Karabulut, Secure mediation: requirements, design, and architecture, Journal of Computer Security, vol.11, issue.3, pp.365-398, 2003.
DOI : 10.3233/JCS-2003-11306

URL : http://doi.org/10.3233/jcs-2003-11306

L. Xu and D. W. Embley, Combining the best of global-as-view and local-asview for data integration, Proc. of the 3rd International Conference ISTA, pp.123-135, 2004.

S. Adali, K. S. Candan, Y. Papakonstantinou, and V. Subrahmanian, Query caching and optimization in distributed mediator systems, ACM SIGMOD Record, vol.25, issue.2, pp.137-146, 1996.
DOI : 10.1145/235968.233327

M. Friedman, A. Levy, and T. Millstein, Navigational plans for data integration, Proceedings of the National Conference on Artificial Intelligence, pp.67-73

A. Levy, A. Rajaraman, and J. Ordille, Querying heterogeneous information sources using source descriptions, 1996.

M. R. Genesereth, A. M. Keller, and O. M. Duschka, Infomaster, ACM SIGMOD Record, vol.26, issue.2, pp.539-542, 1997.
DOI : 10.1145/253262.253400

C. T. Kwok and D. S. Weld, Planning to gather information, PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, pp.32-39, 1996.

M. Genesereth, Data Integration: The Relational Logic Approach, Synthesis Lectures on Artificial Intelligence and Machine Learning, vol.4, issue.1, pp.1-97, 2010.
DOI : 10.2200/S00226ED1V01Y200911AIM008

I. Navas-delgado and J. F. Aldana-montes, A distributed semantic mediation architecture, Journal of Information and Organizational Sciences, vol.28, issue.12 10, pp.135-150, 2004.

S. Herschel and R. Heese, Humboldt discoverer: A semantic p2p index for pdms, International Workshop Data Integration and the Semantic Web (DISWeb)

I. W. Wicaksana, A peer-to-peer (p2p) based semantic agreement approach for spatial information interoperability, p.141, 2006.

F. Paulus, Aggrego server| semsoft. http://semsoft-corp.com/fr/content/ aggrego-server, pp.141-154, 2012.

Y. Papakonstantinou, H. Garcia-molina, and J. Widom, Object exchange across heterogeneous information sources, Proceedings of the Eleventh International Conference on Data Engineering, pp.251-260, 1995.
DOI : 10.1109/ICDE.1995.380386

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.47.5182

G. Kokkinidis and V. Christophides, Semantic Query Routing and Processing in P2P Database Systems: The ICS-FORTH SQPeer Middleware, Current Trends in Database Technology-EDBT 2004 Workshops, pp.433-436, 2005.
DOI : 10.1007/978-3-540-30192-9_48

W. Nejdl, B. Wolf, C. Qu, S. Decker, M. Sintek et al., EDUTELLA, Proceedings of the eleventh international conference on World Wide Web , WWW '02, pp.604-615, 2002.
DOI : 10.1145/511446.511525

P. Haase, J. Broekstra, M. Ehrig, M. Menken, P. Mika et al., Bibster: a semantics-based bibliographic peer-to-peer system. The Semantic Web?ISWC, pp.122-136, 2004.

M. Cai and M. Frank, RDFPeers, Proceedings of the 13th conference on World Wide Web , WWW '04, pp.650-657, 2004.
DOI : 10.1145/988672.988760

K. Aberer, P. Cudré-mauroux, M. Hauswirth, and T. Van-pelt, Gridvine: Building internet-scale semantic overlay networks. The Semantic Web?ISWC, pp.107-121, 2004.
DOI : 10.1007/978-3-540-30475-3_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.8877

I. Cruz, H. Xiao, and F. Hsu, Peer-to-peer semantic integration of xml and rdf data sources. Agents and Peer-to-Peer Computing, pp.108-119, 2005.

A. Y. Halevy, Z. G. Ives, J. Madhavan, P. Mork, D. Suciu et al., The piazza peer data management system. Knowledge and Data Engineering, IEEE Transactions on, vol.16, issue.7 11, pp.787-798, 2004.

C. Sartiani, P. Manghi, G. Ghelli, and G. Conforti, XPeer : A Self-Organizing XML P2P Database System, Current Trends in Database Technology-EDBT, 2004.
DOI : 10.1007/978-3-540-30192-9_45

R. Akbarinia, V. Martins, E. Pacitti, and P. Valduriez, Replication and query processing in the appa data management system, 2004.
URL : https://hal.archives-ouvertes.fr/hal-00688795

W. S. Ng, B. C. Ooi, K. L. Tan, and A. Zhou, PeerDB: a P2P-based system for distributed data sharing, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), pp.633-644, 2003.
DOI : 10.1109/ICDE.2003.1260827

P. Boncz and C. Treijtel, AmbientDB: Relational Query Processing in a P2P Network, Proceedings of the International Workshop on Databases, Information Systems and Peer-to-Peer Computing (DBISP2P), LNCS 2788. Citeseer, 2003.
DOI : 10.1007/978-3-540-24629-9_12

A. Kemper and C. Wiesner, Hyperqueries: Dynamic distributed query processing on the internet, PROCEEDINGS OF THE INTERNATIONAL CONFER- ENCE ON VERY LARGE DATA BASES, pp.551-560, 2001.

M. Arenas, V. Kantere, A. Kementsietsidis, I. Kiringa, R. J. Miller et al., The hyperion project, ACM SIGMOD Record, vol.32, issue.3, pp.53-58, 2003.
DOI : 10.1145/945721.945733

R. Huebsch and S. R. Jeffery, FREddies: DHT-based adaptive query processing via FedeRated Eddies. Citeseer, 2004.

Y. Zhou, B. C. Ooi, K. L. Tan, and W. H. Tok, An adaptable distributed query processing architecture, Data & Knowledge Engineering, vol.53, issue.3, pp.283-309, 2005.
DOI : 10.1016/j.datak.2004.08.004

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.3890

S. Dawson, S. Qian, and P. Samarati, Providing security and interoperation of heterogeneous systems. Distributed and Parallel Databases, pp.119-145, 2000.

N. Dagdee and R. Vijaywargiya, Credential Based Mediator Architecture for Access Control and Data Integration in Multiple Data Sources Environment, International Journal of Network Security & Its Applications, vol.3, issue.3, 2011.
DOI : 10.5121/ijnsa.2011.3304

L. Yang, R. K. Ege, and H. Yu, Mediation security specification and enforcement for heterogeneous databases, Proceedings of the 2005 ACM symposium on Applied computing , SAC '05, pp.354-358, 2005.
DOI : 10.1145/1066677.1066759

L. Yang, R. K. Ege, O. Ezenwoye, and Q. Kharma, A role-based access control model for information mediation, Information Reuse and Integration Proceedings of the 2004 IEEE International Conference on, pp.277-282, 2004.

M. Ezziyani, M. Bennouna, and L. Cherrat, An advanced xml mediator for heterogeneous information systems based on application domain specification, International journal of computer science and applications, vol.3, issue.2 10, 2006.

S. Dawson, P. Samarati, S. De-capitani-di-vimercati, P. Lincoln, G. Wiederhold et al., Secure access wrapper: mediating security between heterogeneous databases, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.308-322, 2000.
DOI : 10.1109/DISCEX.2000.821529

L. Rostad, O. Nytro, and P. Meland, Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges, The Second International Conference on Availability, Reliability and Security (ARES'07), pp.871-878, 2007.
DOI : 10.1109/ARES.2007.30

D. Liu, K. Law, and G. Wiederhold, CHAOS: An Active Security Mediation System, Advanced Information Systems Engineering, pp.232-246, 2000.
DOI : 10.1007/3-540-45140-4_16

J. Biskup and Y. Karabulut, A Hybrid PKI Model: Application to Secure Mediation, 16th Annual IFIP WG, pp.271-282, 2003.
DOI : 10.1007/978-0-387-35697-6_21

J. Biskup, U. Flegel, and Y. Karabulut, Towards Secure Mediation, Workshop Sicherheit und Electronic Commerce, p.11, 1998.
DOI : 10.1007/978-3-322-84901-4_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.6468

J. Biskup, C. Tsatedem, and L. Wiese, Secure Mediation of Join Queries by Processing Ciphertexts, 2007 IEEE 23rd International Conference on Data Engineering Workshop, pp.715-724, 2007.
DOI : 10.1109/ICDEW.2007.4401059

P. Mitra, C. C. Pan, P. Liu, and V. Atluri, Privacy-preserving semantic interoperation and access control of heterogeneous databases, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, pp.66-77, 2006.
DOI : 10.1145/1128817.1128831

G. Wiederhold, M. Bilello, V. Sarathy, and X. L. Qian, A security mediator for health care information, Proceedings of the AMIA Annual Fall Symposium, page 120. American Medical Informatics Association, 1996.

D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, p.146, 2001.
DOI : 10.1145/501978.501980

R. Whittaker, G. Argote-garcia, P. J. Clarke, and R. K. Ege, Decentralized mediation security, 2008 IEEE International Symposium on Parallel and Distributed Processing, pp.1-6, 2008.
DOI : 10.1109/IPDPS.2008.4536560

B. Luo, D. Lee, W. C. Lee, and P. Liu, A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms, Secure Data Management, VLDB 2004 Workshop, pp.133-147, 2004.
DOI : 10.1007/978-3-540-30073-1_10

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. Samarati, A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, p.14, 2002.
DOI : 10.1145/505586.505590

A. Gabillon, A Formal Access Control Model for XML Databases, Proc. Of the 2005 VLDB Workshop on Secure Data Management (SDM), p.14, 2005.
DOI : 10.1007/11552338_7

URL : https://hal.archives-ouvertes.fr/hal-00408570

B. Finance, S. Medjdoub, and P. Pucheral, The case for access control on XML relationships, Proceedings of the 14th ACM international conference on Information and knowledge management , CIKM '05, p.14, 2005.
DOI : 10.1145/1099554.1099576

URL : https://hal.archives-ouvertes.fr/hal-00489266

M. Kudo and S. Hada, XML document security based on provisional authorization, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, p.14, 2000.
DOI : 10.1145/352600.352613

A. Stoica and C. Farkas, Secure XML Views, Proc. of the 16th IFIP WG11.3 Working Conference on Database and Application Security, p.14, 2002.
DOI : 10.1007/978-0-387-35697-6_11

F. Cuppens, N. Cuppens-boulahia, and T. Sans, Protection of Relationships in XML Documents with the XML-BB Model, Proc. of ICISS2005, p.16, 2005.
DOI : 10.1007/11593980_11

M. Stonebraker and E. Wong, Access control in a relational data base management system by query modification, Proceedings of the 1974 annual conference on , ACM 74, pp.180-186, 1974.
DOI : 10.1145/800182.810400

P. Huey, Oracle database security guide : Chapter 7, using oracle virtual private database to control data access, p.89

Q. Wang, T. Yu, N. Li, J. Lobo, E. Bertino et al., On the correctness criteria of fine-grained access control in relational databases, Proceedings of the 33rd international conference on Very large data bases, pp.77-89, 2007.

K. Lefevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu et al., Limiting Disclosure in Hippocratic Databases, Proceedings of the Thirtieth international conference on Very large data bases, pp.108-119, 2004.
DOI : 10.1016/B978-012088469-8.50013-9

E. Damiani, M. Fansi, A. Gabillon, and S. Marrara, A general approach to securely querying XML, Proc. of the 5th International Workshop on Security in Information Systems, p.16, 2007.
DOI : 10.1016/j.csi.2008.03.006

URL : https://hal.archives-ouvertes.fr/hal-00994104

B. Luo, D. Lee, W. C. Lee, and P. Liu, QFilter, Proceedings of the Thirteenth ACM conference on Information and knowledge management , CIKM '04, pp.543-552, 2004.
DOI : 10.1145/1031171.1031273

B. Luo, D. Lee, W. C. Lee, and P. Liu, QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata, The VLDB Journal, vol.60, issue.2, pp.397-415, 2011.
DOI : 10.1007/s00778-010-0202-x

Y. Diao, P. Fischer, M. J. Franklin, and R. To, Yfilter: Efficient and scalable filtering of xml documents, Data Engineering Proceedings. 18th International Conference on, pp.341-342, 2002.

S. Oulmakhzoune, N. Cuppens-boulahia, F. Cuppens, and S. Morucci, fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality, Proc. of the 24th IFIP WG11.3 Working Conference on Data and Applications Security and Privacy, pp.21-23, 2010.
DOI : 10.1007/978-3-642-13739-6_10

URL : https://hal.archives-ouvertes.fr/hal-01056741

S. Rizvi, A. Mendelzon, S. Sudarshan, and P. Roy, Extending query rewriting techniques for fine-grained access control, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, p.71, 2004.
DOI : 10.1145/1007568.1007631

D. E. Bell and L. J. Padula, Secure computer system: Unified exposition and multics interpretation, p.47, 1976.

J. D. Ullman, Principles of Database and Knowledge-Base Systems: Volume II: The New Technologies, p.55, 1990.

F. Cuppens and N. Cuppens-boulahia, Modelling contextual security policies, International Journal of Information Security, vol.57, issue.58, p.92, 2007.
DOI : 10.1007/s10207-007-0051-9

F. Cuppens, N. Cuppens-boulahia, and A. Miège, Inheritance Hierarchies in the Or-BAC Model and Application in a Network Environment, Proceedings of the 3rd Workshop on Foundations of Computer Security (FCS?Äô04), p.58, 2004.

F. Cuppens, N. Cuppens-boulahia, and C. Coma, Multi-Granular Licences to Decentralize Security Administration, Proceedings of the First International Workshop on Reliability, Availability and Security (WRAS'07), p.59, 2007.

S. Oulmakhzoune, N. Cuppens-boulahia, F. Cuppens, and S. Morucci, Sparql query rewriting instrumented by access control model, 1st International Symposium on Data-Driven Process Discovery and Analysis 2011, pp.3-6, 2011.
DOI : 10.1007/s12243-013-0365-8

URL : https://hal.archives-ouvertes.fr/hal-00725606

Q. Ni, A. Trombetta, E. Bertino, and J. Lobo, Privacy-aware role based access control, Proceedings of the 12th ACM symposium on Access control models and technologies, pp.41-50, 2007.
DOI : 10.1109/msp.2009.102

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.566

N. Yang, H. Barringer, and N. Zhang, A purpose-based access control model, Information Assurance and Security IAS 2007. Third International Symposium on, pp.143-148, 2007.

A. Masoumzadeh and J. Joshi, Purbac: Purpose-aware role-based access control. On the Move to Meaningful Internet Systems: OTM, pp.1104-1121, 2008.
DOI : 10.1007/978-3-540-88873-4_12

M. Barhamgi, P. A. Champin, D. Benslimane, and A. Ouksel, Composing dataproviding web services in p2p-based collaboration environments, Advanced Information Systems Engineering, pp.531-545, 2007.

I. Stavrakantonakis, C. Tsinaraki, N. Bikakis, N. Gioldasis, and S. Christodoulakis, SPARQL2XQuery 2.0: Supporting Semantic-based queries over XML data, 2010 Fifth International Workshop Semantic Media Adaptation and Personalization, pp.76-84, 2010.
DOI : 10.1109/SMAP.2010.5706860

N. Bikakis, N. Gioldasis, C. Tsinaraki, and S. Christodoulakis, Semantic based access over xml data. Visioning and Engineering the Knowledge Society. A Web Science Perspective, pp.259-267, 2009.
DOI : 10.1007/978-3-642-04754-1_27

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

A. C. Squicciarini, M. Shehab, and F. Paci, Collective privacy management in social networks, Proceedings of the 18th international conference on World wide web, WWW '09, pp.521-530, 2009.
DOI : 10.1145/1526709.1526780

S. Harris, Sparql 1.1 query language, p.82, 2011.

L. Cranor, G. Hogben, M. Langheinrich, M. Marchiori, M. Presler-marshall et al., The platform for privacy preference 1.1(p3p 1.1) specification, Tech. Rep. Note, vol.13, issue.89, 2006.

M. Hilty, D. Basin, and A. Pretschner, On Obligations, 10th European Symposium on Research in Computer Security, pp.98-117, 2005.
DOI : 10.1007/11555827_7

E. Commission, Directive 97/66, the processing of personal data and the protection of privacy in the telecommunications sector, 1990.

S. Oulmakhzoune, N. Cuppens-boulahia, F. Cuppens, and S. Morucci, Privacy Policy Preferences Enforced by SPARQL Query Rewriting, 2012 Seventh International Conference on Availability, Reliability and Security, pp.335-342
DOI : 10.1109/ARES.2012.86

URL : https://hal.archives-ouvertes.fr/hal-00948460

M. Barhamgi, D. Benslimane, and B. Medjahed, A Query Rewriting Approach for Web Service Composition, IEEE Transactions on Services Computing, vol.3, issue.3, pp.206-222, 2010.
DOI : 10.1109/TSC.2010.4

URL : https://hal.archives-ouvertes.fr/hal-01381443

M. Barhamgi, D. Benslimane, and S. Oulmakhzoune, Frederic Cuppens, Michael Mrissa, and Hajer Taktak. Secure and privacy-preserving execution model for data services, 25th International Conference on Advanced Information Systems Engineering CAiSE'13, 2013.

M. J. Carey, N. Onose, and M. Petropoulos, Data services, Communications of the ACM, vol.55, issue.6, pp.86-97, 2012.
DOI : 10.1145/2184319.2184340

J. Michael and . Carey, Declarative data services: This is your data on soa, SOCA, p.4, 2007.

S. Dustdar, R. Pichler, V. Savenkov, and H. L. Truong, Quality-aware service-oriented data integration, ACM SIGMOD Record, vol.41, issue.1, pp.11-19, 2012.
DOI : 10.1145/2206869.2206873

V. Dwivedi and N. N. Kulkarni, Information as a Service in a Data Analytics Scenario - A Case Study, 2008 IEEE International Conference on Web Services, pp.615-620, 2008.
DOI : 10.1109/ICWS.2008.119

Q. Vu, T. Vu-pham, H. L. Truong, and S. Dustdar, DEMODS: A Description Model for Data-as-a-Service, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications, pp.5-12, 2012.
DOI : 10.1109/AINA.2012.91

M. Gilpin, N. Yuhanna, K. Smillie, G. Leganza, R. Heffner et al., Information-as-a-service: What's behind this hot new trend? Forrester Research, Research Report, vol.3, issue.3 103, pp.206-222, 2007.

A. Dogac, Interoperability in ehealth systems (tutorial) PVLDB, pp.2026-2027, 2012.

D. Agrawal, A. El-abbadi, S. Antony, and S. Das, Data Management Challenges in Cloud Computing Infrastructures, DNIS, pp.1-10, 2010.
DOI : 10.1007/978-3-642-12038-1_1

C. Thomas and . Rindfleisch, Privacy, information technology, and health care, Commun . ACM, vol.40, issue.8, pp.92-100, 1997.

D. Agrawal, S. Abbadi, and . Wang, Secure and privacypreserving data services in the cloud: A data centric view, VLDB 2012, pp.270-294, 2001.

E. Damiani, Web service security, Encyclopedia of Cryptography and Security, pp.1365-1377, 2011.

S. Durbeck, C. Fritsch, G. Pernul, and R. Schillinger, A semantic security architecture for web services, ARES, pp.222-227, 2010.

S. Stephen, Y. Yau, and . Yin, A privacy preserving repository for data integration across data sharing services, IEEE T. Services Computing, vol.1, issue.3, pp.130-140, 2008.

H. Meziane, S. Benbernou, and M. P. Papazoglou, A view-based Monitoring for Privacy-aware Web services, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010), pp.1129-1132, 2010.
DOI : 10.1109/ICDE.2010.5447762

P. Ashley and D. Moore, Enforcing privacy within an enterprise using ibm tivoli privacy manager for e-business, VLDB, pp.108-119, 2003.

J. Michael and . Carey, Panagiotis Reveliotis, and Sachin Thatte. Data service modeling in the aqualogic data services platform, SERVICES I, pp.78-80, 2008.

F. Cuppens and A. Miege, Adorbac: an administration model for or-bac, International Journal of Computer Systems Science & Engineering, vol.19, issue.3, pp.151-162, 2004.

F. Autrel, F. Cuppens, N. Cuppens, and C. Coma, MotOrBAC 2: A Security Policy Tool, Proceedings the 3rd Conference on Security in Network Architecture and Information Systems (SARSSI'08), p.117, 2008.

G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. Lopes et al., Aspect-oriented programming, p.118, 1997.

J. Vlissides, . Helm, E. Johnson, and . Gamma, Design patterns: Elements of reusable object-oriented software, p.120, 1995.

.. Pre-processing-approach, Combination of building blocks, (b) Illustration , (c) Processing flow, p.15

.. Post-processing-approach, Combination of building blocks, (b) Illustration , (c) Processing flow, p.17