Foundations of databases, pp.47-49, 1995. ,
The effectiveness of output modification by rounding for protection of statistical databases. INFOR, Canadian Journal of Operational Research and Information Processing, vol.17, issue.3, 1979. ,
Privacy and rationality in individual decision making, IEEE Security and Privacy Magazine, vol.3, issue.1, pp.24-30, 2005. ,
DOI : 10.1109/MSP.2005.22
Security-control methods for statistical databases: a comparative study, ACM Computing Surveys (CSUR), vol.21, issue.4, pp.515-556, 1989. ,
Hippocratic databases, Proceedings of the 28th international conference on Very Large Data Bases, pp.143-154, 2002. ,
Auditing Compliance with a Hippocratic Database, Proceedings of the Thirtieth international conference on Very large data bases, pp.516-527, 2004. ,
DOI : 10.1016/B978-012088469-8.50047-4
The RSL99 language for rolebased separation of duty constraints, Proceedings of the fourth ACM workshop on Role-based access control, pp.43-54, 1999. ,
The theory of joins in relational databases, ACM Transactions on Database Systems (TODS), vol.4, issue.69, pp.297-314, 1979. ,
Enterprise privacy authorization language (EPAL 1.2) Submission to W3C, 2003. ,
UCI Machine Learning Repository, 2013. ,
A security machanism for statistical database, ACM Transactions on Database Systems (TODS), vol.5, issue.3, pp.316-3338, 1980. ,
Cassandra: Distributed access control policies with tunable expressiveness, Policies for Distributed Systems and Networks Proceedings. Fifth IEEE International Workshop on, pp.159-168, 2004. ,
Secure computer systems: Mathematical foundations. Rapport technique, DTIC Document, 1973. ,
Information integration: the MOMIS project demonstration, VLDB, pp.611-614, 2000. ,
A flexible authorization mechanism for relational data management systems, ACM Transactions on Information Systems, vol.17, issue.2, pp.101-140, 1999. ,
DOI : 10.1145/306686.306687
TRBAC: A temporal role-based access control model, ACM Transactions on Information and System Security, vol.4, issue.3, pp.191-233, 2001. ,
DOI : 10.1145/501978.501979
Database security-concepts, approaches, and challenges. Dependable and Secure Computing, IEEE Transactions on, vol.2, issue.1, pp.2-19, 2005. ,
Access Control for Databases: Concepts and Systems, Foundations and Trends in Databases, vol.3, issue.1-2, 2011. ,
DOI : 10.1561/1900000014
Dominating sets for split and bipartite graphs, Information Processing Letters, vol.19, issue.1, pp.37-40, 1984. ,
DOI : 10.1016/0020-0190(84)90126-1
Integrity considerations for secure computer systems . Rapport technique, DTIC Document, 1977. ,
Merging heterogeneous security orderings, Journal of Computer Security, vol.5, issue.1, pp.3-29, 1997. ,
Dragutin Petkovicet al. Towards heterogeneous multimedia information systems: The Garlic approach, Distributed Object Management, Proceedings . RIDE-DOM'95. Fifth International Workshop on, pp.124-131, 1995. ,
Inclusion dependencies and their interaction with functional dependencies, Proceedings of the 1st ACM SIGACT-SIGMOD symposium on Principles of database systems, pp.171-176, 1982. ,
Correctness of query execution strategies in distributed databases, ACM Transactions on Database Systems, vol.8, issue.4, pp.577-607, 1983. ,
DOI : 10.1145/319996.320009
Remote password authentication with smart cards. Computers and Digital Techniques, IEE Proceedings E, vol.138, issue.3, pp.165-168, 1991. ,
The TSIMMIS project: Integration of heterogenous information sources, p.17, 1994. ,
The entity-relationship model---toward a unified view of data, ACM Transactions on Database Systems, vol.1, issue.1, pp.9-36, 1976. ,
DOI : 10.1145/320434.320440
Privacy-preserving data integration and sharing, Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery , DMKD '04, pp.19-26, 2004. ,
DOI : 10.1145/1008694.1008698
A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, pp.169-202, 2002. ,
DOI : 10.1145/505586.505590
Data integration in distributed databases. Software Engineering, IEEE Transactions, issue.7, pp.860-864, 1987. ,
Wizard: A database inference analysis and detection system, Knowledge and Data Engineering IEEE Transactions on, vol.8, issue.35, pp.56-66, 1996. ,
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
Secure statistical databases with random sample queries, ACM Transactions on Database Systems (TODS), vol.5, issue.3, pp.291-315, 1980. ,
Inference controls for statistical databases, Computer, vol.16, issue.7, pp.69-82, 1983. ,
New directions in cryptography . Information Theory, IEEE Transactions on, vol.22, issue.6, pp.644-654, 1976. ,
A critique of k-anonymity and some of its enhancements, Availability, Reliability and Security ARES 08. Third International Conference on, pp.990-993, 2008. ,
Specifying and reasoning about dynamic access-control policies, Automated Reasoning, pp.632-646, 2006. ,
Recursive query plans for data integration, The Journal of Logic Programming, vol.43, issue.1, pp.49-73, 2000. ,
Data exchange: semantics and query answering, Theoretical Computer Science, vol.336, issue.1, pp.89-124, 2005. ,
DOI : 10.1016/j.tcs.2004.10.033
On the question of statistical confidentiality, Journal of the American Statistical Association, vol.67, issue.337, pp.7-18, 1972. ,
Statistical Confidentiality: Some Theory and Application to Data Dissemination, In Annals of Economic and Social Measurement, vol.3, issue.29, pp.101-112, 1974. ,
A model for evaluation and administration of security in object-oriented databases. Knowledge and Data Engineering, IEEE Transactions on, vol.6, issue.2, pp.275-292, 1994. ,
Rolebased access control (RBAC): Features and motivations, Proceedings of 11th Annual Computer Security Application Conference, pp.241-289, 1995. ,
Towards a failsafe approach to secure databases, IEEE Symposium on Security and Privacy, p.18, 1980. ,
Navigational plans for data integration, AAAI/IAAI, vol.1999, pp.67-73, 1999. ,
Computers and intractability, 2002. ,
Unwinding and inference control, 1984. ,
Context interchange: New features and formalisms for the intelligent integration of information, ACM Transactions on Information Systems (TOIS), vol.17, issue.3, pp.270-293, 1999. ,
Protection, Proceedings of the November 16-18, 1971, fall joint computer conference on, AFIPS '71 (Fall), pp.417-429, 1972. ,
DOI : 10.1145/1478873.1478928
Tableau techniques for querying information sources through global schemas, Database Theory-ICDT 99, pp.332-347, 1999. ,
An authorization mechanism for a relational database system, ACM Transactions on Database Systems (TODS), vol.1, issue.3, pp.242-255, 1976. ,
Data Integration in Presence of Authorization Policies, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.92-99, 2012. ,
DOI : 10.1109/TrustCom.2012.116
URL : https://hal.archives-ouvertes.fr/hal-01352994
Contrôles d'accès pour l'intégration de données, 29eme journées Bases de Données Avancées (BDA), young researcher article. Fsrench conference, 2013. ,
Yannis Velegrakis and Mohand-Said Hacid. Access Control for Data Integration project Homepagel, 2013. ,
Yannis Velegrakis and Mohand-Saïd Hacid Access Control for Data Integration in Presence of Data Dependencies, Database Systems for Advanced Applications -19th International Conference Proceedings, Part II, pp.203-217, 2014. ,
Data integration: the teenage years, Proceedings of the 32nd international conference on Very large data bases, pp.9-16, 2006. ,
Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976. ,
Generalized additive models, 1990. ,
Getting a personal dossier from a statistical data bank, Datamation, vol.16, issue.5, pp.74-75, 1970. ,
Tane: An Efficient Algorithm for Discovering Functional and Approximate Dependencies, The Computer Journal, vol.42, issue.2, pp.100-111, 1999. ,
DOI : 10.1093/comjnl/42.2.100
A framework for supporting data integration using the materialized and virtual approaches, p.16, 1996. ,
Attribute-based access control with efficient revocation in data outsourcing systems. Parallel and Distributed Systems, IEEE Transactions on, vol.22, issue.7, pp.1214-1221, 2011. ,
Requirements of role-based access control for collaborative systems, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, p.16, 1996. ,
DOI : 10.1145/270152.270183
Toward a multilevel secure relational data model, In ACM SIGMOD Record, vol.20, pp.50-59, 1991. ,
A unified framework for enforcing multiple access control policies, In ACM Sigmod Record, vol.26, pp.474-485, 1997. ,
Flexible support for multiple access control policies, ACM Transactions on Database Systems (TODS), vol.26, issue.39, pp.214-260, 2001. ,
An approach for building secure database federations, Proceedings of the 20th International Conference on Very Large Data Bases, pp.24-35, 1994. ,
Efficient auditing for complex SQL queries, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, pp.697-708, 2011. ,
DOI : 10.1145/1989323.1989396
Divesh Srivastavaet al. The information manifold, Proceedings of the AAAI 1995 Spring Symp. on Information Gathering from Heterogeneous, pp.85-91, 1995. ,
Formal models for computer security, ACM Computing Surveys (CSUR), vol.13, issue.3, pp.247-278, 1981. ,
Limiting Disclosure in Hippocratic Databases, Proceedings of the Thirtieth international conference on Very large data bases, pp.108-119, 2004. ,
DOI : 10.1016/B978-012088469-8.50013-9
A guided tour of relational databases and beyond, p.47, 1999. ,
Distributed credential chain discovery in trust management*, Journal of Computer Security, vol.11, issue.1, pp.35-86, 2003. ,
DOI : 10.3233/JCS-2003-11102
A data distortion by probability distribution, ACM Transactions on Database Systems (TODS), vol.10, issue.3, pp.395-411, 1985. ,
Interoperability of multiple autonomous databases, ACM Computing Surveys, vol.22, issue.3, pp.267-293, 1990. ,
DOI : 10.1145/96602.96608
Toward a fully de-identified biomedical information warehouse, AMIA Annual Symposium Proceedings, p.370, 2009. ,
Database security, ACM SIGMOD Record, vol.19, issue.4, pp.90-97, 1990. ,
-diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, p.3, 2007. ,
DOI : 10.1145/1217299.1217302
A formal analysis of information disclosure in data exchange, Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp.575-586, 2004. ,
Schema Mapping as Query Discovery, VLDB, pp.77-88, 2000. ,
Auditing SQL Queries, 2008 IEEE 24th International Conference on Data Engineering, pp.287-296, 2008. ,
DOI : 10.1109/ICDE.2008.4497437
Integrating Multilevel Security Policies in Multilevel Federated Database Systems, Data and Application Security, pp.135-147, 2001. ,
DOI : 10.1007/0-306-47008-X_13
Configuring role-based access control to enforce mandatory and discretionary access control policies, ACM Transactions on Information and System Security, vol.3, issue.2, pp.85-106, 2000. ,
DOI : 10.1145/354876.354878
Rounding and Inference Controlin Conceptual Models for Statistical Databases, 1985. ,
Translating Web Data, Proceedings of the 28th international conference on Very Large Data Bases, pp.598-609, 2002. ,
DOI : 10.1016/B978-155860869-6/50059-7
Practical data-swapping: The first steps, ACM Transactions on Database Systems (TODS), vol.9, issue.1, pp.20-37, 1984. ,
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
Extending query rewriting techniques for fine-grained access control, Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp.551-562, 2004. ,
Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Rapport technique, p.28, 1998. ,
Protecting respondents identities in microdata release Knowledge and Data Engineering, IEEE Transactions on, vol.13, issue.6, pp.1010-1027, 2001. ,
Authentication, access control, and audit, ACM Computing Surveys, vol.28, issue.1, pp.241-243, 1996. ,
DOI : 10.1145/234313.234412
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.5643
Role-Based Access Control Models yz, IEEE computer, vol.29, issue.2, pp.38-47, 1996. ,
Role-based access control, INSA de Lyon, tous droits réservés, pp.237-286, 1998. ,
The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, 2000. ,
DOI : 10.1145/344287.344301
Secure interoperation in a multidomain environment employing RBAC policies. Knowledge and Data Engineering, IEEE Transactions on, vol.17, issue.11, pp.1557-1577, 2005. ,
Secure collaboration in mediator-free environments, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.58-67, 2005. ,
DOI : 10.1145/1102120.1102130
Federated database systems for managing distributed, heterogeneous, and autonomous databases, ACM Computing Surveys (CSUR), vol.22, issue.16, pp.183-236, 1990. ,
Database research, ACM SIGMOD Record, vol.25, issue.1, pp.52-63, 1996. ,
DOI : 10.1145/381854.381886
ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION, these.pdf © [M. Haddad], pp.571-588, 2002. ,
DOI : 10.1142/S021848850200165X
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
Multilevel security issues in distributed database management systems III, Computers & Security, vol.11, issue.7, pp.661-674, 1992. ,
The statistical security of a statistical database, ACM Transactions on Database Systems (TODS), vol.9, issue.4, pp.672-679, 1984. ,
Yucel Saygin and Yannis Theodoridis. State-of-the-art in privacy preserving data mining, ACM Sigmod Record, vol.33, issue.1, pp.50-57, 2004. ,
INSA de Lyon, tous droits réservés Randomized response: A survey technique for eliminating evasive answer bias, Journal of the American Statistical Association, vol.60, issue.309, pp.63-69, 1965. ,
Attributed based access control (ABAC) for Web services, IEEE International Conference on Web Services (ICWS'05), 2005. ,
DOI : 10.1109/ICWS.2005.25
Using Object Matching and Materialization to Integrate Heterogeneous Databases, CoopIS, pp.4-18, 1995. ,
View maintenance in a warehousing environment, ACM SIGMOD Record, vol.24, issue.2, pp.316-327, 1995. ,
DOI : 10.1145/568271.223848