F. Abel, J. L. Coi, N. Henze, A. W. Koesling, D. Krause et al., Enabling Advanced and Context-Dependent Access Control in RDF Stores, Proc. of ISWC, pp.1-14, 2007.
DOI : 10.1007/978-3-540-76298-0_1

C. Bolchini, C. Curino, E. Quintarelli, F. A. Schreiber, and L. Tanca, A data-oriented survey of context models, ACM SIGMOD Record, vol.36, issue.4, pp.19-26, 2007.
DOI : 10.1145/1361348.1361353

J. J. Carroll, C. Bizer, P. J. Hayes, and P. Stickler, Named graphs, Web Semantics: Science, Services and Agents on the World Wide Web, vol.3, issue.4, pp.247-267, 2005.
DOI : 10.1016/j.websem.2005.09.001

O. Corby and C. Faron-zucker, The KGRAM Abstract Machine for Knowledge Graph Querying, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp.338-341, 2010.
DOI : 10.1109/WI-IAT.2010.144

A. Corradi, R. Montanari, and D. Tibaldi, Context-based access control management in ubiquitous environments, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings., pp.253-260, 2004.
DOI : 10.1109/NCA.2004.1347784

L. Costabello, DC Proposal: PRISSMA, Towards Mobile Adaptive Presentation of the Web of Data, Proc. of ISWC, pp.269-276, 2011.
DOI : 10.1007/11926078_12

URL : https://hal.archives-ouvertes.fr/hal-00691359

L. Costabello, S. Villata, N. Delaforge, and F. Gandon, Linked Data Access Goes Mobile: Context-Aware Authorization for Graph Stores, Proc. of LDOW, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00691256

M. J. Covington, W. Long, S. Srinivasan, A. K. Dey, M. Ahamad et al., Securing context-aware applications using environment roles, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.10-20, 2001.
DOI : 10.1145/373256.373258

F. Cuppens and N. Cuppens-boulahia, Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008.
DOI : 10.1007/s10207-007-0051-9

URL : https://hal.archives-ouvertes.fr/hal-01207773

A. K. Dey, Understanding and using context. Personal and Ubiquitous Computing, pp.4-7, 2001.

T. W. Finin, A. Joshi, L. Kagal, J. Niu, R. S. Sandhu et al., BAC, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.73-82, 2008.
DOI : 10.1145/1377836.1377849

G. Flouris, I. Fundulaki, M. Michou, and G. Antoniou, Controlling Access to RDF Graphs, Proc. of FIS, pp.107-117, 2010.
DOI : 10.1007/11926078_3

F. Giunchiglia, R. Zhang, and B. Crispo, Ontology driven community access control, Proc. of SPOT, 2009.

T. Heath and C. Bizer, Linked Data: Evolving the Web into a Global Data Space, Synthesis Lectures on the Semantic Web: Theory and Technology, vol.1, issue.1, 2011.
DOI : 10.2200/S00334ED1V01Y201102WBE001

R. J. Hulsebosch, A. H. Salden, M. S. Bargh, P. W. Ebben, and J. Reitsma, Context sensitive access control, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.111-119, 2005.
DOI : 10.1145/1063979.1064000

P. Korpipää and J. Mäntyjärvi, An Ontology for Mobile Device Sensor-Based Context Awareness, Proc. of CONTEXT, pp.451-458, 2003.
DOI : 10.1007/3-540-44958-2_37

D. Kulkarni and A. Tripathi, Context-aware role-based access control in pervasive computing systems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.113-122, 2008.
DOI : 10.1145/1377836.1377854

O. Sacco, A. Passant, and S. Decker, An Access Control Framework for the Web of Data, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp.456-463, 2011.
DOI : 10.1109/TrustCom.2011.59

A. Toninelli, R. Montanari, L. Kagal, and O. Lassila, A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments, Proc. of ISWC, pp.473-486, 2006.
DOI : 10.1007/11926078_34