Enabling Advanced and Context-Dependent Access Control in RDF Stores, The Semantic Web, pp.1-14, 2007. ,
DOI : 10.1007/978-3-540-76298-0_1
Security-Control Methods for Statistical Databases: A Comparative Study, ACM Comput. Surv, vol.21, issue.4, pp.515-556, 1989. ,
Auditing Compliance with a Hippocratic Database, Proceedings of the Thirtieth international conference on Very large data bases, pp.516-527, 2004. ,
DOI : 10.1016/B978-012088469-8.50047-4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.9249
Bit " loaded: a scalable lightweight join query processor for RDF data, Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp.41-50, 2010. ,
Naming and grouping privileges to simplify security management in large databases, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.116-132, 1990. ,
DOI : 10.1109/RISP.1990.63844
Secure computer systems: Mathematical foundations. Rapport technique, DTIC Document, 1973. ,
An extended authorization model for relational databases, IEEE Transactions on Knowledge and Data Engineering, vol.9, issue.1, pp.85-101, 1997. ,
DOI : 10.1109/69.567051
Linked Data - The Story So Far, International Journal on Semantic Web and Information Systems, vol.5, issue.3, pp.1-22, 2009. ,
DOI : 10.4018/jswis.2009081901
Linked data access goes mobile: Context-aware authorization for graph stores, LDOW-5th WWW Workshop on Linked Data on the Web, pp.34-37, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00691256
RDF 1.1 concepts and abstract syntax. W3C Recommendation, 2014. ,
A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, pp.169-202, 2002. ,
DOI : 10.1145/505586.505590
A Lattice Model of Secure Information Flow, Commun. ACM, vol.19, issue.5, pp.236-243, 1976. ,
New directions in cryptography . Information Theory, IEEE Transactions on, vol.22, issue.6, pp.644-654, 1976. ,
Proposed NIST standard for role-based access control, ACM Trans. Inf. Syst. Secur, vol.4, issue.3, pp.224-274, 2001. ,
An Authorization Mechanism for a Relational Database System, ACM Trans. Database Syst, vol.1, issue.3, pp.242-255, 1976. ,
RDF 1.1 Semantics . W3C Recommendation, pp.16-17, 2014. ,
Topological sorting of large networks, Communications of the ACM, vol.5, issue.11, pp.558-562, 1962. ,
DOI : 10.1145/368996.369025
Media Meets Semantic Web ??? How the BBC Uses DBpedia and Linked Data to Make Connections, The Semantic Web: Research and Applications, 6th European Semantic Web Conference Proceedings, pp.723-737, 2009. ,
DOI : 10.1007/978-3-642-02121-3_53
Optimizing Enterprise-Scale OWL 2 RL Reasoning in a Relational Database System, The Semantic Web -ISWC 2010 -9th International Semantic Web Conference, ISWC 2010, pp.436-452, 2010. ,
DOI : 10.1007/BFb0023449
Finding Security Vulnerabilities in Java Applications with Static Analysis, Proceedings of the 14th USENIX Security Symposium, 2005. ,
An Efficient Unification Algorithm, ACM Transactions on Programming Languages and Systems, vol.4, issue.2, pp.258-282, 1982. ,
DOI : 10.1145/357162.357169
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.96.6119
Security models and information flow, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.180-189, 1990. ,
DOI : 10.1109/RISP.1990.63849
Giorgos Flouris and Grigoris Antoniou Access control for RDF graphs using abstract models, SACMAT, pp.103-112, 2012. ,
Semantics and complexity of SPARQL, ACM Transactions on Database Systems, vol.34, issue.3, pp.1-16, 2009. ,
DOI : 10.1145/1567274.1567278
Shape expressions: an RDF validation and transformation language, Proceedings of the 10th International Conference on Semantic Systems, SEMANTICS 2014, pp.32-40, 2014. ,
A model of authorization for next-generation database systems, ACM Transactions on Database Systems, vol.16, issue.1, pp.88-131, 1991. ,
DOI : 10.1145/103140.103144
Towards Fine Grained RDF Access Control, SACMAT, pp.165-176, 2014. ,
Policybased access control for an RDF store, WWW, pp.78-81, 2005. ,
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
Role-Based Access Control Models, IEEE Computer, vol.29, issue.2, pp.38-47, 1996. ,
The NIST model for role-based access control: towards a unified standard, ACM Workshop on Role-Based Access Control, pp.47-63, 2000. ,
Data Dependencies and Inference Control in Multilevel Relational Database Systems, Proceedings of the 1987 IEEE Symposium on Security and Privacy, pp.202-211, 1987. ,
Completeness, decidability and complexity of entailment for RDF Schema and a semantic extension involving the OWL vocabulary, J. Web Sem, vol.3, issue.2-3, pp.79-115, 2005. ,
Security checking in relational database management systems augmented with inference engines, Computers & Security, vol.6, issue.6, pp.479-492, 1987. ,