Enabling Advanced and Context-Dependent Access Control in RDF Stores, Proc. of ISWC, pp.1-14, 2007. ,
DOI : 10.1007/978-3-540-76298-0_1
A data-oriented survey of context models, ACM SIGMOD Record, vol.36, issue.4, pp.19-26, 2007. ,
DOI : 10.1145/1361348.1361353
Named graphs, Web Semantics: Science, Services and Agents on the World Wide Web, vol.3, issue.4, pp.247-267, 2005. ,
DOI : 10.1016/j.websem.2005.09.001
The KGRAM Abstract Machine for Knowledge Graph Querying, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp.338-341, 2010. ,
DOI : 10.1109/WI-IAT.2010.144
Context-based access control management in ubiquitous environments, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings., pp.253-260, 2004. ,
DOI : 10.1109/NCA.2004.1347784
DC Proposal: PRISSMA, Towards Mobile Adaptive Presentation of the Web of Data, Proc. of ISWC, pp.269-276, 2011. ,
DOI : 10.1007/11926078_12
URL : https://hal.archives-ouvertes.fr/hal-00691359
Linked Data Access Goes Mobile: Context-Aware Authorization for Graph Stores, Proc. of LDOW, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00691256
Securing context-aware applications using environment roles, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.10-20, 2001. ,
DOI : 10.1145/373256.373258
Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008. ,
DOI : 10.1007/s10207-007-0051-9
URL : https://hal.archives-ouvertes.fr/hal-01207773
Understanding and using context. Personal and Ubiquitous Computing, pp.4-7, 2001. ,
BAC, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.73-82, 2008. ,
DOI : 10.1145/1377836.1377849
Controlling Access to RDF Graphs, Proc. of FIS, pp.107-117, 2010. ,
DOI : 10.1007/11926078_3
Ontology driven community access control, Proc. of SPOT, 2009. ,
Linked Data: Evolving the Web into a Global Data Space, Synthesis Lectures on the Semantic Web: Theory and Technology, vol.1, issue.1, 2011. ,
DOI : 10.2200/S00334ED1V01Y201102WBE001
Context sensitive access control, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.111-119, 2005. ,
DOI : 10.1145/1063979.1064000
An Ontology for Mobile Device Sensor-Based Context Awareness, Proc. of CONTEXT, pp.451-458, 2003. ,
DOI : 10.1007/3-540-44958-2_37
Context-aware role-based access control in pervasive computing systems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.113-122, 2008. ,
DOI : 10.1145/1377836.1377854
An Access Control Framework for the Web of Data, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp.456-463, 2011. ,
DOI : 10.1109/TrustCom.2011.59
A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments, Proc. of ISWC, pp.473-486, 2006. ,
DOI : 10.1007/11926078_34