A. Bruggemann-klein, A. Makoto-murata, and D. Wood, « Regular Tree and Regular Hedge Languages over Unranked Alphabets, 2001.

J. Bryans, M. Koutny, L. Mazaré, and P. Y. Ryan, Opacity generalised to transition systems, International Journal of Information Security, vol.79, issue.3???4, pp.421-435, 2008.
DOI : 10.1007/s10207-008-0058-x

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.7966

D. Cohn and R. Hull, A Data-centric Approach to Modeling Business Operations and Processes, 2009.

S. Ginsburgh and «. , The Mathematical Theory of Context-Free Languages, 1966.

S. Ginsburgh, E. H. Spanier, and . Semigroups, Semigroups, Presburger formulas, and languages, Pacific Journal of Mathematics, vol.16, issue.2, pp.285-296, 1966.
DOI : 10.2140/pjm.1966.16.285

F. Lin and «. , Opacity of discrete event systems and its applications, Automatica, vol.47, issue.3, pp.496-500, 2011.
DOI : 10.1016/j.automatica.2011.01.002

C. Reutenauer and «. , Aspects mathématiques des réseaux de Petri, 1988.

M. Veanes and «. On, Computational Complexity of Basic Decision Problems of Finite Tree Automata, Computing Science Department, 1997.

D. Hughes and V. Shmatikov, Information hiding, anonymity and privacy: a modular approach, Journal of Computer Security, vol.12, issue.1, pp.3-36, 2004.
DOI : 10.3233/JCS-2004-12102

H. Hosoya, J. C. Vouillon-and-b, and . Pierce, « Regular expression types for XML, ACM Trans. Program. Lang. Syst, vol.2790, issue.1 46, 2005.
DOI : 10.1145/1053468.1053470

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.177.6653

B. Bouchou, D. Duarte-and, M. Halfeld, A. D. Ferrari-alves, A. M. Laurent-and et al., Schema Evolution for XML: A Consistency-Preserving Approach, Mathematical Foundations of Computer Science, vol.3153, pp.876-888, 2004.
DOI : 10.1007/978-3-540-28629-5_69

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.99.2464

D. Bell-and-l and . Lapadula, Unified Exposition and Multics Inter-pretation , Secure Computer Systems, MITRE, 1975.

D. Bell-and-l, . Lapadula, and . Secure, Computer Systems : Unified Exposition and Multics Inter-pretation, MITRE, 1975.

B. E. , C. S. Ferrari, and . M. And-mesiti, Author-X : A java-Based System for XML Data Protection, Proc. Of the 14 th Annual IFIP WG 11.3 Working Conference on Database Security, 2000.

C. , S. Amer-yahia, S. Lakshmanan, L. And-srivastava, and D. , « Optimizing the secure evaluation of twig queries, 2002.

S. Medjdoub, «. Modèle-de-contrôle-d-'accés-pour, and X. , Application à la protection des données personnelles, 2005.