S. Abiteboul, R. Hull, and V. Vianu, Foundations of Databases, 1995.

N. Foto, C. Afrati, P. Li, and . Mitra, Rewriting queries using views in the presence of arithmetic comparisons

N. Foto, V. Afrati, and . Pavlaki, Rewriting queries using views with negation

[. Bertino, P. A. Bonatti, and E. Ferrari, TRBAC, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, p.2130, 2000.
DOI : 10.1145/344287.344298

[. Bertino, C. Bettini, E. Ferrari, and P. Samarati, An access control model supporting periodicity constraints and temporal reasoning, ACM Transactions on Database Systems, vol.23, issue.3, pp.231-285, 1998.
DOI : 10.1145/293910.293151

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.9748

E. Bertino and E. Ferrari, Administration policies in a multipolicy autorization system, DBSec, p.341355, 1997.

E. D. Bell and J. L. Padula, Secure computer system : Unied exposition and multics interpretation, 1976.

E. Bertino and R. Sandhu, Database security - concepts, approaches, and challenges, IEEE Transactions on Dependable and Secure Computing, vol.2, issue.1, pp.219-74, 2005.
DOI : 10.1109/TDSC.2005.9

[. Chaves, E. Buchmann, F. Hueske, and K. Böhm, Towards materialized view selection for distributed databases, Proceedings of the 12th International Conference on Extending Database Technology Advances in Database Technology, EDBT '09, p.10881099, 2009.
DOI : 10.1145/1516360.1516484

S. Upen, J. Chakravarthy, J. Grant, and . Minker, Logic-based approach to semantic query optimization, ACM Trans. Database Syst, vol.15, issue.2, p.162207, 1990.

[. Cuzzocrea, M. Hacid, and N. Grillo, Eectively and eciently selecting access control rules on materialized views over relational databases, IDEAS, p.225235, 2010.

[. Chaudhuri, R. Krishnamurthy, S. Potamianos, and K. Shim, Optimizing queries with materialized views, Proceedings of the Eleventh International Conference on Data Engineering, 1995.
DOI : 10.1109/ICDE.1995.380392

K. Ashok, P. M. Chandra, and . Merlin, Optimal implementation of conjunctive queries in relational data bases, STOC, p.7790, 1977.

F. Cuppens and A. Miège, Adorbac : an administration model for or-bac, Comput. Syst. Sci. Eng, vol.19, issue.3, 2004.

S. Cohen, W. Nutt, and Y. Sagiv, Rewriting queries with arbitrary aggregation functions using views, ACM Transactions on Database Systems, vol.31, issue.2
DOI : 10.1145/1138394.1138400

M. L. Damiani, E. Bertino, B. Catania, and P. Perlasca, GEO-RBAC, ACM Transactions on Information and System Security, vol.10, issue.1, 2007.
DOI : 10.1145/1210263.1210265

M. Oliver, M. R. Duschka, and . Genesereth, Answering recursive queries using views, PODS, p.109116, 1997.

S. De-capitani-di-vimercati, S. Foresti, S. Paraboschi, and P. Samarati, Assessing query privileges via safe and ecient permission composition, ACM Conference on Computer and Communications Security, p.311322, 2008.

E. Commissionoftheeuropeancommunities, Information Technology Security Evaluation Criteria (ITSEC) Commission of the European Communities, 1991.

[. Fan, M. N. Chee-yong-chan, and . Garofalakis, Secure XML querying with security views, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, p.587598, 2004.
DOI : 10.1145/1007568.1007634

F. David, D. R. Ferraiolo, and . Kuhn, Role-based access controls. CoRR, abs/0903, 2009.

F. David, R. S. Ferraiolo, S. I. Sandhu, D. R. Gavrila, R. Kuhn et al., Proposed nist standard for role-based access control, ACM Trans. Inf. Syst. Secur, vol.4, issue.3, p.224274, 2001.

G. , S. Graham, and P. J. Denning, Protection : principles and practice, AFIPS Spring Joint Computing Conference, p.417429, 1972.

A. Gupta, I. Singh-mumick, and K. A. Ross, Adapting materialized views after redenitions
DOI : 10.1145/568271.223817

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.7060

. Bibliographie, S. Groz, A. Staworko, Y. Caron, S. Roos et al., Xml security views revisited, DBPL, p.5267, 2009.

P. Patricia, B. W. Griths, and . Wade, An authorization mechanism for a relational database system, ACM Trans. Database Syst, vol.1, issue.3, p.242255, 1976.

Y. Alon and . Halevy, Answering queries using views : A survey, VLDB J, vol.10, issue.4, p.270294, 2001.

A. Michael, W. L. Harrison, J. D. Ruzzo, and . Ullman, Protection in operating systems, Commun. ACM, vol.19, issue.8, p.461471, 1976.

A. K. Jones, R. J. Lipton, and L. Snyder, A Linear time algorithm for deciding security, 17th Annual Symposium on Foundations of Computer Science (sfcs 1976), p.3341, 1976.
DOI : 10.1109/SFCS.1976.1

D. and R. Kuhn, Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems, Proceedings of the second ACM workshop on Role-based access control , RBAC '97
DOI : 10.1145/266741.266749

Y. Alon, A. Levy, J. J. Rajaraman, and . Ordille, Querying heterogeneous information sources using source descriptions, VLDB, pp.251262-251278, 1996.

A. Motro, An access authorization model for relational databases based on algebraic manipulation of view denitions, ICDE, p.339347, 1989.

L. E. Olson, C. A. Gunter, and P. Madhusudan, A formal framework for reective database access control policies, ACM Conference on Computer and Communications Security, p.289298, 2008.

G. Pernul, Database security Advances in Computers, pp.1-72, 1994.

A. Y. Pottinger and . Levy, A scalable algorithm for answering queries using views, VLDB, pp.484495-484517, 2000.

T. Priebe and G. Pernul, A Pragmatic Approach to Conceptual Modeling of OLAP Security, Proc. ER, p.311
DOI : 10.1007/3-540-45581-7_24

X. Qian, Query folding, ICDE, p.4855, 1996.

[. Rizvi, A. O. Mendelzon, S. Sudarshan, and P. Roy, Extending query rewriting techniques for ne-grained access control, SIGMOD Conference, pp.551562-77, 2004.

A. Rosenthal and E. Sciore, View security as the basis for data warehouse security, DMDW, page 8, 2000.

A. Rosenthal and E. Sciore, Administering Permissions for Distributed Data: Factoring and Automated Inference, DB- Sec, p.91104, 2001.
DOI : 10.1007/978-0-387-35587-0_7

A. Rosenthal, E. Sciore, and V. Doshi, Security Administration for Federations, Warehouses, and Other Derived Data
DOI : 10.1007/978-0-387-35508-5_14

R. S. Sandhu, Lattice-based access control models, Computer, vol.26, issue.11, p.919, 1993.
DOI : 10.1109/2.241422

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.5742

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.3847-77, 1996.
DOI : 10.1109/2.485845

[. Srivastava, S. Dar, H. V. Jagadish, and A. Y. Levy, Answering queries with aggregation using views, VLDB, p.318329, 1996.

[. Steger and H. Günzel, Identifying Security Holes in OLAP Applications, DBSec, volume 201 of IFIP Conference Proceedings, p.283294, 2000.
DOI : 10.1007/0-306-47008-X_25

M. Stonebraker and E. Wong, Access control in a relational data base management system by query modication, Proceedings of the, p.180186, 1974.

Y. Sagiv and M. Yannakakis, Equivalence among relational expressions with the union and dierence operation, VLDB, p.535548, 1978.

K. Roshan, R. S. Thomas, and . Sandhu, Task-based authorization controls (tbac) : A family of models for active and enterpriseoriented autorization management

D. Theodoratos and T. Sellis, Dynamic Data Warehouse Design, 1st Int. Conf. on DaWak '99, 1999.
DOI : 10.1007/3-540-48298-9_1

G. Odysseas, M. H. Tsatalos, Y. E. Solomon, and . Ioannidis, The gmap : A versatile tool for physical data independence

D. Jerey and . Ullman, Information integration using logical views, ICDT, 1940.

[. Wang, M. Maher, and R. Topor, Rewriting Unions of General Conjunctive Queries Using Views, Proc. Conf. on Extending Database Technology, 2002.
DOI : 10.1007/3-540-45876-X_6

Q. Wang, T. Yu, N. Li, J. Lobo, E. Bertino et al., On the correctness criteria of ne-grained access control in relational databases, VLDB '07 : Proceedings of the 33rd international conference on Very large data bases, p.555566, 2007.

J. Yang, K. Karlapalem, and Q. Li, Algorithms for materialized view design in data warehousing environment, VLDB, p.136145, 1997.

H. Z. Yang and P. Larson, Query transformation for psjqueries, Proceedings of 13th International Conference on Very Large Data Bases, p.245254, 1987.