R. Abiteboul-1995-]-serge-abiteboul, V. Hull, and . Vianu, Foundations of databases, pp.47-49, 1995.

O. James, . Achugbue, Y. Francis, and . Chin, The effectiveness of output modification by rounding for protection of statistical databases. INFOR, Canadian Journal of Operational Research and Information Processing, vol.17, issue.3, 1979.

A. Acquisti, J. Acquisti, and . Grossklags, Privacy and rationality in individual decision making, IEEE Security and Privacy Magazine, vol.3, issue.1, pp.24-30, 2005.
DOI : 10.1109/MSP.2005.22

A. Nabil, R. Adam, C. John, and . Worthmann, Security-control methods for statistical databases: a comparative study, ACM Computing Surveys (CSUR), vol.21, issue.4, pp.515-556, 1989.

J. Rakesh-agrawal, R. Kiernan, Y. Srikant, and . Xu, Hippocratic databases, Proceedings of the 28th international conference on Very Large Data Bases, pp.143-154, 2002.

R. Agrawal, R. Bayardo, C. Faloutsos, J. Kiernan, R. Rantzau et al., Auditing Compliance with a Hippocratic Database, Proceedings of the Thirtieth international conference on Very large data bases, pp.516-527, 2004.
DOI : 10.1016/B978-012088469-8.50047-4

]. Ahn and R. Sandhu, The RSL99 language for rolebased separation of duty constraints, Proceedings of the fourth ACM workshop on Role-based access control, pp.43-54, 1999.

V. Alfred, C. Aho, . Beeri, D. Jeffrey, and . Ullman, The theory of joins in relational databases, ACM Transactions on Database Systems (TODS), vol.4, issue.69, pp.297-314, 1979.

A. Ashley, S. Hada, G. Karjoth, C. Powers, and M. Schunter, Enterprise privacy authorization language (EPAL 1.2) Submission to W3C, 2003.

]. K. Bache and M. Lichman, UCI Machine Learning Repository, 2013.

L. Leland and . Beck, A security machanism for statistical database, ACM Transactions on Database Systems (TODS), vol.5, issue.3, pp.316-3338, 1980.

Y. Moritz, P. Becker, and . Sewell, Cassandra: Distributed access control policies with tunable expressiveness, Policies for Distributed Systems and Networks Proceedings. Fifth IEEE International Workshop on, pp.159-168, 2004.

E. Bell, J. Leonard, and . Lapadula, Secure computer systems: Mathematical foundations. Rapport technique, DTIC Document, 1973.

]. Beneventano, S. Bergamaschi, S. Castano, A. Corni, . Guidetti et al., Information integration: the MOMIS project demonstration, VLDB, pp.611-614, 2000.

E. Bertino, S. Jajodia, and P. Samarati, A flexible authorization mechanism for relational data management systems, ACM Transactions on Information Systems, vol.17, issue.2, pp.101-140, 1999.
DOI : 10.1145/306686.306687

E. Bertino, P. A. Bonatti, and E. Ferrari, TRBAC: A temporal role-based access control model, ACM Transactions on Information and System Security, vol.4, issue.3, pp.191-233, 2001.
DOI : 10.1145/501978.501979

E. Bertino and R. Sandhu, Database security-concepts, approaches, and challenges. Dependable and Secure Computing, IEEE Transactions on, vol.2, issue.1, pp.2-19, 2005.

]. Bertino, G. Ghinita, and A. Kamra, Access Control for Databases: Concepts and Systems, Foundations and Trends in Databases, vol.3, issue.1-2, 2011.
DOI : 10.1561/1900000014

A. A. Bertossi, Dominating sets for split and bipartite graphs, Information Processing Letters, vol.19, issue.1, pp.37-40, 1984.
DOI : 10.1016/0020-0190(84)90126-1

J. Kenneth and . Biba, Integrity considerations for secure computer systems . Rapport technique, DTIC Document, 1977.

A. Piero, M. L. Bonatti, V. Sapino, and . Subrahmanian, Merging heterogeneous security orderings, Journal of Computer Security, vol.5, issue.1, pp.3-29, 1997.

J. Michael, . Carey, M. Laura, . Haas, M. Peter et al., Dragutin Petkovicet al. Towards heterogeneous multimedia information systems: The Garlic approach, Distributed Object Management, Proceedings . RIDE-DOM'95. Fifth International Workshop on, pp.124-131, 1995.

A. Marco, R. Casanova, C. H. Fagin, and . Papadimitriou, Inclusion dependencies and their interaction with functional dependencies, Proceedings of the 1st ACM SIGACT-SIGMOD symposium on Principles of database systems, pp.171-176, 1982.

S. Ceri and G. Pelagatti, Correctness of query execution strategies in distributed databases, ACM Transactions on Database Systems, vol.8, issue.4, pp.577-607, 1983.
DOI : 10.1145/319996.320009

]. Chang and T. Wu, Remote password authentication with smart cards. Computers and Digital Techniques, IEE Proceedings E, vol.138, issue.3, pp.165-168, 1991.

S. Chawathe, H. Garcia-molina, J. Hammer, K. Ireland, Y. Papakonstantinou et al., The TSIMMIS project: Integration of heterogenous information sources, p.17, 1994.

. Peter-pin-shan-chen, The entity-relationship model---toward a unified view of data, ACM Transactions on Database Systems, vol.1, issue.1, pp.9-36, 1976.
DOI : 10.1145/320434.320440

C. Clifton, M. Kantarcioç-§lu, A. Doan, G. Schadow, J. Vaidya et al., Privacy-preserving data integration and sharing, Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery , DMKD '04, pp.19-26, 2004.
DOI : 10.1145/1008694.1008698

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. Samarati, A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, pp.169-202, 2002.
DOI : 10.1145/505586.505590

]. S. Misbah-deen, R. Amin, and M. C. Taylor, Data integration in distributed databases. Software Engineering, IEEE Transactions, issue.7, pp.860-864, 1987.

S. Harry, T. H. Delugach, and . Hinke, Wizard: A database inference analysis and detection system, Knowledge and Data Engineering IEEE Transactions on, vol.8, issue.35, pp.56-66, 1996.

E. Dorothy and . Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.

E. Dorothy and . Denning, Secure statistical databases with random sample queries, ACM Transactions on Database Systems (TODS), vol.5, issue.3, pp.291-315, 1980.

E. Dorothy, J. Denning, and . Schlorer, Inference controls for statistical databases, Computer, vol.16, issue.7, pp.69-82, 1983.

. Whitfield-diffie, E. Martin, and . Hellman, New directions in cryptography . Information Theory, IEEE Transactions on, vol.22, issue.6, pp.644-654, 1976.

V. Ferrer and . Torra, A critique of k-anonymity and some of its enhancements, Availability, Reliability and Security ARES 08. Third International Conference on, pp.990-993, 2008.

J. Daniel, K. Dougherty, S. Fisler, and . Krishnamurthi, Specifying and reasoning about dynamic access-control policies, Automated Reasoning, pp.632-646, 2006.

M. Oliver, . Duschka, R. Michael, . Genesereth, Y. Alon et al., Recursive query plans for data integration, The Journal of Logic Programming, vol.43, issue.1, pp.49-73, 2000.

. Ronald-fagin, G. Phokion, . Kolaitis, J. Renée, L. Miller et al., Data exchange: semantics and query answering, Theoretical Computer Science, vol.336, issue.1, pp.89-124, 2005.
DOI : 10.1016/j.tcs.2004.10.033

P. Ivan and . Fellegi, On the question of statistical confidentiality, Journal of the American Statistical Association, vol.67, issue.337, pp.7-18, 1972.

J. Ip-fellegi and . Phillips, Statistical Confidentiality: Some Theory and Application to Data Dissemination, In Annals of Economic and Social Measurement, vol.3, issue.29, pp.101-112, 1974.

E. Fernandez, H. Gudes, and . Song, A model for evaluation and administration of security in object-oriented databases. Knowledge and Data Engineering, IEEE Transactions on, vol.6, issue.2, pp.275-292, 1994.

J. David-ferraiolo, D. Cugini, and . Kuhn, Rolebased access control (RBAC): Features and motivations, Proceedings of 11th Annual Computer Security Application Conference, pp.241-289, 1995.

D. Arthur, . Friedman, J. Lance, and . Hoffman, Towards a failsafe approach to secure databases, IEEE Symposium on Security and Privacy, p.18, 1980.

. Marc-friedman, Y. Alon, . Levy, D. Todd, and . Millstein, Navigational plans for data integration, AAAI/IAAI, vol.1999, pp.67-73, 1999.

R. Michael, . Garey, S. David, and . Johnson, Computers and intractability, 2002.

A. Joseph, J. Goguen, and . Meseguer, Unwinding and inference control, 1984.

S. Cheng-hian-goh, S. Bressan, M. Madnick, and . Siegel, Context interchange: New features and formalisms for the intelligent integration of information, ACM Transactions on Information Systems (TOIS), vol.17, issue.3, pp.270-293, 1999.

S. Graham, J. Peter, and . Denning, Protection, Proceedings of the November 16-18, 1971, fall joint computer conference on, AFIPS '71 (Fall), pp.417-429, 1972.
DOI : 10.1145/1478873.1478928

A. O. Grahne-1999-]-gosta-grahne and . Mendelzon, Tableau techniques for querying information sources through global schemas, Database Theory-ICDT 99, pp.332-347, 1999.

P. Patricia, . Griffiths, W. Bradford, and . Wade, An authorization mechanism for a relational database system, ACM Transactions on Database Systems (TODS), vol.1, issue.3, pp.242-255, 1976.

]. Haddad, M. Hacid, and R. Laurini, Data Integration in Presence of Authorization Policies, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.92-99, 2012.
DOI : 10.1109/TrustCom.2012.116

URL : https://hal.archives-ouvertes.fr/hal-01352994

]. Haddad, Contrôles d'accès pour l'intégration de données, 29eme journées Bases de Données Avancées (BDA), young researcher article. Fsrench conference, 2013.

]. Haddad, J. Stevovic, and A. Chiasera, Yannis Velegrakis and Mohand-Said Hacid. Access Control for Data Integration project Homepagel, 2013.

J. Haddad, A. Stevovic, and . Chiasera, Yannis Velegrakis and Mohand-Saïd Hacid Access Control for Data Integration in Presence of Data Dependencies, Database Systems for Advanced Applications -19th International Conference Proceedings, Part II, pp.203-217, 2014.

A. Halevy, A. Rajaraman, and J. Ordille, Data integration: the teenage years, Proceedings of the 32nd international conference on Very large data bases, pp.9-16, 2006.

A. Michael, . Harrison, L. Walter, . Ruzzo, D. Jeffrey et al., Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976.

]. T. Hastie-1990, R. J. Hastie, and . Tibshirani, Generalized additive models, 1990.

J. Lance, W. Hoffman, and . Miller, Getting a personal dossier from a statistical data bank, Datamation, vol.16, issue.5, pp.74-75, 1970.

]. Y. Huhtala, J. Kärkkäinen, P. Porkka, and H. Toivonen, Tane: An Efficient Algorithm for Discovering Functional and Approximate Dependencies, The Computer Journal, vol.42, issue.2, pp.100-111, 1999.
DOI : 10.1093/comjnl/42.2.100

R. Hull and G. Zhou, A framework for supporting data integration using the materialized and virtual approaches, p.16, 1996.

J. Hur and D. K. Noh, Attribute-based access control with efficient revocation in data outsourcing systems. Parallel and Distributed Systems, IEEE Transactions on, vol.22, issue.7, pp.1214-1221, 2011.

T. Jaeger and A. Prakash, Requirements of role-based access control for collaborative systems, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, p.16, 1996.
DOI : 10.1145/270152.270183

J. and R. Sandhu, Toward a multilevel secure relational data model, In ACM SIGMOD Record, vol.20, pp.50-59, 1991.

P. Samarati, E. Vs-subrahmanian, and . Bertino, A unified framework for enforcing multiple access control policies, In ACM Sigmod Record, vol.26, pp.474-485, 1997.

P. Samarati, M. L. Sapino, and V. Subrahmanian, Flexible support for multiple access control policies, ACM Transactions on Database Systems (TODS), vol.26, issue.39, pp.214-260, 2001.

D. Jonscher, R. Klaus, and . Dittrich, An approach for building secure database federations, Proceedings of the 20th International Conference on Very Large Data Bases, pp.24-35, 1994.

R. Kaushik and R. Ramamurthy, Efficient auditing for complex SQL queries, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, pp.697-708, 2011.
DOI : 10.1145/1989323.1989396

]. Kirk, Y. Alon, Y. Levy, and . Sagiv, Divesh Srivastavaet al. The information manifold, Proceedings of the AAAI 1995 Spring Symp. on Information Gathering from Heterogeneous, pp.85-91, 1995.

E. Carl and . Landwehr, Formal models for computer security, ACM Computing Surveys (CSUR), vol.13, issue.3, pp.247-278, 1981.

K. Lefevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu et al., Limiting Disclosure in Hippocratic Databases, Proceedings of the Thirtieth international conference on Very large data bases, pp.108-119, 2004.
DOI : 10.1016/B978-012088469-8.50013-9

L. Mark and G. Loizou, A guided tour of relational databases and beyond, p.47, 1999.

]. Li, H. William, . Winsborough, C. John, and . Mitchell, Distributed credential chain discovery in trust management*, Journal of Computer Security, vol.11, issue.1, pp.35-86, 2003.
DOI : 10.3233/JCS-2003-11102

K. Chong, . Liew, J. Uinam, . Choi, J. Chung et al., A data distortion by probability distribution, ACM Transactions on Database Systems (TODS), vol.10, issue.3, pp.395-411, 1985.

L. Witold-litwin, N. Mark, and . Roussopoulos, Interoperability of multiple autonomous databases, ACM Computing Surveys, vol.22, issue.3, pp.267-293, 1990.
DOI : 10.1145/96602.96608

J. Liu, S. Erdal, A. Scott, J. Silvey, . Ding et al., Toward a fully de-identified biomedical information warehouse, AMIA Annual Symposium Proceedings, p.370, 2009.

F. Teresa, E. B. Lunt, and . Fernandez, Database security, ACM SIGMOD Record, vol.19, issue.4, pp.90-97, 1990.

A. Machanavajjhala and D. Kifer, -diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, p.3, 2007.
DOI : 10.1145/1217299.1217302

G. Miklau and D. Suciu, A formal analysis of information disclosure in data exchange, Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp.575-586, 2004.

J. Renée, . Miller, M. Laura, M. A. Haas, and . Hernández, Schema Mapping as Query Discovery, VLDB, pp.77-88, 2000.

]. Motwani, U. Shubha, D. Nabar, and . Thomas, Auditing SQL Queries, 2008 IEEE 24th International Conference on Data Engineering, pp.287-296, 2008.
DOI : 10.1109/ICDE.2008.4497437

M. Oliva and F. Saltor, Integrating Multilevel Security Policies in Multilevel Federated Database Systems, Data and Application Security, pp.135-147, 2001.
DOI : 10.1007/0-306-47008-X_13

S. Osborn, R. Sandhu, and Q. Munawer, Configuring role-based access control to enforce mandatory and discretionary access control policies, ACM Transactions on Information and System Security, vol.3, issue.2, pp.85-106, 2000.
DOI : 10.1145/354876.354878

T. Su, Rounding and Inference Controlin Conceptual Models for Statistical Databases, 1985.

]. Popa, Y. Velegrakis, A. Mauricio, . Hernández, J. Renée et al., Translating Web Data, Proceedings of the 28th international conference on Very Large Data Bases, pp.598-609, 2002.
DOI : 10.1016/B978-155860869-6/50059-7

P. Steven and . Reiss, Practical data-swapping: The first steps, ACM Transactions on Database Systems (TODS), vol.9, issue.1, pp.20-37, 1984.

L. Ronald, A. Rivest, L. Shamir, and . Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.

A. Shariq-rizvi, S. Mendelzon, P. Sudarshan, and . Roy, Extending query rewriting techniques for fine-grained access control, Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp.551-562, 2004.

P. Samarati and L. Sweeney, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Rapport technique, p.28, 1998.

]. Samarati, Protecting respondents identities in microdata release Knowledge and Data Engineering, IEEE Transactions on, vol.13, issue.6, pp.1010-1027, 2001.

R. Sandhu and P. Samarati, Authentication, access control, and audit, ACM Computing Surveys, vol.28, issue.1, pp.241-243, 1996.
DOI : 10.1145/234313.234412

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.5643

S. Ravi, . Sandhu, J. Edward, . Coynek, L. Hal et al., Role-Based Access Control Models yz, IEEE computer, vol.29, issue.2, pp.38-47, 1996.

S. Ravi and . Sandhu, Role-based access control, INSA de Lyon, tous droits réservés, pp.237-286, 1998.

]. Sandhu, D. Ferraiolo, and R. Kuhn, The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, 2000.
DOI : 10.1145/344287.344301

]. Shafiq, B. James, E. Joshi, A. Bertino, and . Ghafoor, Secure interoperation in a multidomain environment employing RBAC policies. Knowledge and Data Engineering, IEEE Transactions on, vol.17, issue.11, pp.1557-1577, 2005.

M. Shehab, E. Bertino, and A. Ghafoor, Secure collaboration in mediator-free environments, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.58-67, 2005.
DOI : 10.1145/1102120.1102130

P. Amit, . Sheth, A. James, and . Larson, Federated database systems for managing distributed, heterogeneous, and autonomous databases, ACM Computing Surveys (CSUR), vol.22, issue.16, pp.183-236, 1990.

]. Silberschatz, M. Stonebraker, and J. Ullman, Database research, ACM SIGMOD Record, vol.25, issue.1, pp.52-63, 1996.
DOI : 10.1145/381854.381886

]. Sweeney, ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION, these.pdf © [M. Haddad], pp.571-588, 2002.
DOI : 10.1142/S021848850200165X

]. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

T. Bhavani, H. Harvey, and . Rubinovitz, Multilevel security issues in distributed database management systems III, Computers & Security, vol.11, issue.7, pp.661-674, 1992.

F. Joseph, Y. Traub, H. Yemini, and . Wo?niakowski, The statistical security of a statistical database, ACM Transactions on Database Systems (TODS), vol.9, issue.4, pp.672-679, 1984.

S. Vassilios, E. Verykios, I. N. Bertino, L. Fovino, and . Parasiliti-provenza, Yucel Saygin and Yannis Theodoridis. State-of-the-art in privacy preserving data mining, ACM Sigmod Record, vol.33, issue.1, pp.50-57, 2004.

L. Stanley and . Warner, INSA de Lyon, tous droits réservés Randomized response: A survey technique for eliminating evasive answer bias, Journal of the American Statistical Association, vol.60, issue.309, pp.63-69, 1965.

E. Yuan and J. Tong, Attributed based access control (ABAC) for Web services, IEEE International Conference on Web Services (ICWS'05), 2005.
DOI : 10.1109/ICWS.2005.25

]. Zhou, R. Hull, R. King, and J. Franchitti, Using Object Matching and Materialization to Integrate Heterogeneous Databases, CoopIS, pp.4-18, 1995.

H. Yue-zhuge, J. Garcia-molina, J. Hammer, and . Widom, View maintenance in a warehousing environment, ACM SIGMOD Record, vol.24, issue.2, pp.316-327, 1995.
DOI : 10.1145/568271.223848