V. Atluri and J. Warner, Supporting conditional delegation in secure workflow management systems, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.49-58, 2005.
DOI : 10.1145/1063979.1063990

E. Barka and R. Sandhu, Framework for role-based delegation models, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), pp.168-176, 2000.
DOI : 10.1109/ACSAC.2000.898870

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.9343

E. Bertino, E. Ferrari, and V. Atluri, The specification and enforcement of authorization constraints in workflow management systems, ACM Transactions on Information and System Security, vol.2, issue.1, pp.65-104, 1999.
DOI : 10.1145/300830.300837

R. A. Botha and J. H. Eloff, Separation of duties for access control enforcement in workflow environments, IBM Systems Journal, vol.40, issue.3, pp.666-682, 2001.
DOI : 10.1147/sj.403.0666

D. W. Chadwick, S. Otenko, and T. Nguyen, Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains, Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, pp.19-2167, 2006.
DOI : 10.3233/JCS-2003-11102

M. Clavel, V. Silva, C. Braga, and M. Egea, Model-Driven Security in Practice: An Industrial Experience, ECMDA-FA '08: Proceedings of the 4th European Conference on Model Driven Architecture, pp.326-337, 2008.
DOI : 10.1007/978-3-540-69100-6_22

J. Crampton and H. Khambhammettu, Delegation in role-based access control, Proceedings of the Computer Security ? ESORICS 2006, 11th European Symposium on Research in Computer Security Lecture Notes in Computer Science Springer, pp.174-191, 2006.

J. Crampton and H. Khambhammettu, Delegation and satisfiability in workflow systems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.31-40, 2008.
DOI : 10.1145/1377836.1377842

J. Crampton and H. Khambhammettu, On delegation and workflow execution models, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, pp.2137-2144, 2008.
DOI : 10.1145/1363686.1364199

E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti, dRBAC: distributed role-based access control for dynamic coalition environments, Proceedings 22nd International Conference on Distributed Computing Systems, p.411, 2002.
DOI : 10.1109/ICDCS.2002.1022279

K. Gaaloul, A secure framework for dynamic task delegation in workflow management systems, 2010.
URL : https://hal.archives-ouvertes.fr/tel-00542850

K. Gaaloul, P. Miseldine, and F. Charoy, Towards Proactive Policies Supporting Event-Based Task Delegation, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp.99-104, 2009.
DOI : 10.1109/SECURWARE.2009.23

URL : https://hal.archives-ouvertes.fr/inria-00431494

K. Gaaloul, E. Zahoor, F. Charoy, and C. Godart, Dynamic Authorisation Policies for Event-Based Task Delegation, Advanced Information Systems Engineering, 22nd International Conference, pp.7-9135, 2010.
DOI : 10.1007/978-3-642-13094-6_12

URL : https://hal.archives-ouvertes.fr/inria-00466220

A. Hagstrom, S. Jajodia, F. Parisi-presicce, and D. Wijesekera, Revocations -a classification, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., p.44, 2001.
DOI : 10.1109/CSFW.2001.930135

P. C. Hung and K. Karlapalem, A secure workflow model, ACSW Frontiers '03: Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers, pp.33-41, 2003.

R. Kowalski and M. Sergot, A logic-based calculus of events, New Generation Computing, vol.10, issue.No. 2, pp.67-95, 1986.
DOI : 10.1007/BF03037383

E. T. Mueller, Commonsense Reasoning, 2006.

T. R4egov and . Annex, Towards e-administration in the large, 2006.

N. Russell, W. M. Van-der-aalst, A. H. Hofstede, and D. Edmond, Workflow Resource Patterns: Identification, Representation and Tool Support, Proceedings of the Advanced Information Systems Engineering, 17th International Conference, pp.216-232, 2005.
DOI : 10.1007/11431855_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.5143

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

A. Schaad, A framework for organisational control principles, 18th Annual Computer Security Applications Conference, 2002. Proceedings., 2003.
DOI : 10.1109/CSAC.2002.1176294

L. Seitz, E. Rissanen, T. Sandholm, B. S. Firozabadi, and O. Mulmo, Policy administration control and delegation using XACML and Delegent, The 6th IEEE/ACM International Workshop on Grid Computing, 2005., pp.49-54, 2005.
DOI : 10.1109/GRID.2005.1542723

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.360.2520

K. Venter, A model for the dynamic delegation of authorisation rights in a secure workflow management system, 2003.

J. Wainer, A. Kumar, and P. Barthelmess, DW-RBAC: A formal security model of delegation and revocation in workflow systems, Information Systems, vol.32, issue.3, pp.365-384, 2007.
DOI : 10.1016/j.is.2005.11.008

L. Zhang, G. Ahn, and B. Chu, A rule-based framework for role-based delegation and revocation, ACM Transactions on Information and System Security, vol.6, issue.3, pp.404-441, 2003.
DOI : 10.1145/937527.937530

Z. Muehlen and M. , Workflow-based Process Controlling. Foundation, Design, and Application of Workflow-driven Process Information Systems, 2004.