F. Abel, J. Luca-de-coi, N. Henze, A. W. Koesling, D. Krause et al., Enabling Advanced and Context-Dependent Access Control in RDF Stores, The Semantic Web, pp.1-14, 2007.
DOI : 10.1007/978-3-540-76298-0_1

R. Nabil, J. C. Adam, and . Wortmann, Security-Control Methods for Statistical Databases: A Comparative Study, ACM Comput. Surv, vol.21, issue.4, pp.515-556, 1989.

R. Agrawal, R. Bayardo, C. Faloutsos, J. Kiernan, R. Rantzau et al., Auditing Compliance with a Hippocratic Database, Proceedings of the Thirtieth international conference on Very large data bases, pp.516-527, 2004.
DOI : 10.1016/B978-012088469-8.50047-4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.9249

V. Atre-2010-]-medha-atre, M. J. Chaoji, J. A. Zaki, . Hendler, and . Matrix, Bit " loaded: a scalable lightweight join query processor for RDF data, Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp.41-50, 2010.

R. W. Baldwin, Naming and grouping privileges to simplify security management in large databases, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.116-132, 1990.
DOI : 10.1109/RISP.1990.63844

E. Bell, J. Leonard, and . Lapadula, Secure computer systems: Mathematical foundations. Rapport technique, DTIC Document, 1973.

E. Bertino, P. Samarati, and S. Jajodia, An extended authorization model for relational databases, IEEE Transactions on Knowledge and Data Engineering, vol.9, issue.1, pp.85-101, 1997.
DOI : 10.1109/69.567051

]. Bizer, T. Heath, and T. Berners-lee, Linked Data - The Story So Far, International Journal on Semantic Web and Information Systems, vol.5, issue.3, pp.1-22, 2009.
DOI : 10.4018/jswis.2009081901

L. Costabello, S. Villata, N. Delaforge, and F. Gandon, Linked data access goes mobile: Context-aware authorization for graph stores, LDOW-5th WWW Workshop on Linked Data on the Web, pp.34-37, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00691256

]. Cyganiak, D. Wood, and M. Lanthaler, RDF 1.1 concepts and abstract syntax. W3C Recommendation, 2014.

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. Samarati, A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, pp.169-202, 2002.
DOI : 10.1145/505586.505590

E. Dorothy and . Denning, A Lattice Model of Secure Information Flow, Commun. ACM, vol.19, issue.5, pp.236-243, 1976.

. Whitfield-diffie, E. Martin, and . Hellman, New directions in cryptography . Information Theory, IEEE Transactions on, vol.22, issue.6, pp.644-654, 1976.

F. David, R. S. Ferraiolo, S. I. Sandhu, D. R. Gavrila, R. Kuhn et al., Proposed NIST standard for role-based access control, ACM Trans. Inf. Syst. Secur, vol.4, issue.3, pp.224-274, 2001.

P. Patricia, B. W. Griffiths, and . Wade, An Authorization Mechanism for a Relational Database System, ACM Trans. Database Syst, vol.1, issue.3, pp.242-255, 1976.

J. Patrick, . Hayes, F. Peter, and . Patel-schneider, RDF 1.1 Semantics . W3C Recommendation, pp.16-17, 2014.

]. A. Kahn, Topological sorting of large networks, Communications of the ACM, vol.5, issue.11, pp.558-562, 1962.
DOI : 10.1145/368996.369025

T. Georgi-kobilarov, Y. Scott, S. Raimond, C. Oliver, M. Sizemore et al., Media Meets Semantic Web ??? How the BBC Uses DBpedia and Linked Data to Make Connections, The Semantic Web: Research and Applications, 6th European Semantic Web Conference Proceedings, pp.723-737, 2009.
DOI : 10.1007/978-3-642-02121-3_53

V. Kolovski, Z. Wu, and G. Eadon, Optimizing Enterprise-Scale OWL 2 RL Reasoning in a Relational Database System, The Semantic Web -ISWC 2010 -9th International Semantic Web Conference, ISWC 2010, pp.436-452, 2010.
DOI : 10.1007/BFb0023449

]. V. Livshits and M. S. Lam, Finding Security Vulnerabilities in Java Applications with Static Analysis, Proceedings of the 14th USENIX Security Symposium, 2005.

A. Martelli and U. Montanari, An Efficient Unification Algorithm, ACM Transactions on Programming Languages and Systems, vol.4, issue.2, pp.258-282, 1982.
DOI : 10.1145/357162.357169

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.96.6119

]. Mclean, Security models and information flow, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.180-189, 1990.
DOI : 10.1109/RISP.1990.63849

V. Papakonstantinou, M. Michou, and I. Fundulaki, Giorgos Flouris and Grigoris Antoniou Access control for RDF graphs using abstract models, SACMAT, pp.103-112, 2012.

]. Pérez, M. Arenas, and C. Gutierrez, Semantics and complexity of SPARQL, ACM Transactions on Database Systems, vol.34, issue.3, pp.1-16, 2009.
DOI : 10.1145/1567274.1567278

J. E. Hommeaux, L. Gayo, and H. R. Solbrig, Shape expressions: an RDF validation and transformation language, Proceedings of the 10th International Conference on Semantic Systems, SEMANTICS 2014, pp.32-40, 2014.

E. Fausto-rabitti, W. Bertino, D. Kim, and . Woelk, A model of authorization for next-generation database systems, ACM Transactions on Database Systems, vol.16, issue.1, pp.88-131, 1991.
DOI : 10.1145/103140.103144

V. Jyothsna-rachapalli, M. Khadilkar, B. Kantarcioglu, and . Thuraisingham, Towards Fine Grained RDF Access Control, SACMAT, pp.165-176, 2014.

T. Pavan-reddivari, A. Finin, and . Joshi, Policybased access control for an RDF store, WWW, pp.78-81, 2005.

L. Ronald, A. Rivest, L. Shamir, and . Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.

S. Ravi, E. J. Sandhu, H. L. Coyne, C. E. Feinstein, and . Youman, Role-Based Access Control Models, IEEE Computer, vol.29, issue.2, pp.38-47, 1996.

S. Ravi, D. F. Sandhu, D. R. Ferraiolo, and . Kuhn, The NIST model for role-based access control: towards a unified standard, ACM Workshop on Role-Based Access Control, pp.47-63, 2000.

. Tzong-an, G. Su, and . Gultekin¨ozsoyoglu, Data Dependencies and Inference Control in Multilevel Relational Database Systems, Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp.202-211, 1987.

J. Herman and . Horst, Completeness, decidability and complexity of entailment for RDF Schema and a semantic extension involving the OWL vocabulary, J. Web Sem, vol.3, issue.2-3, pp.79-115, 2005.

M. Bhavani and . Thuraisingham, Security checking in relational database management systems augmented with inference engines, Computers & Security, vol.6, issue.6, pp.479-492, 1987.