F. Abel, J. L. De-coi, N. Henze, A. W. Koesling, D. Krause et al., Enabling Advanced and Context-Dependent Access Control in RDF Stores, Procs of ISWC, pp.1-14, 2007.
DOI : 10.1007/978-3-540-76298-0_1

O. Corby and C. Faron-zucker, The KGRAM Abstract Machine for Knowledge Graph Querying, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp.338-341, 2010.
DOI : 10.1109/WI-IAT.2010.144

A. Corradi, R. Montanari, and D. Tibaldi, Context-based access control management in ubiquitous environments, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings., pp.253-260, 2004.
DOI : 10.1109/NCA.2004.1347784

L. Costabello, S. Villata, and F. Gandon, Context-aware access control for rdf graph stores, Procs of ECAI, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00724041

. Abowd, Securing context-aware applications using environment roles, Procs of SACMAT, pp.10-20, 2001.

F. Cuppens and N. Cuppens-boulahia, Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008.
DOI : 10.1007/s10207-007-0051-9

URL : https://hal.archives-ouvertes.fr/hal-01207773

A. K. Dey, Understanding and using context. Personal Ubiquitous Computing, pp.4-7, 2001.
DOI : 10.1007/s007790170019

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.9786

M. Duckham, Moving forward, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.1-3, 2010.
DOI : 10.1145/1868470.1868472

T. W. Finin, A. Joshi, L. Kagal, J. Niu, R. S. Sandhu et al., BAC, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.73-82, 2008.
DOI : 10.1145/1377836.1377849

G. Flouris, I. Fundulaki, M. Michou, and G. Antoniou, Controlling Access to RDF Graphs, Procs of FIS, pp.107-117, 2010.
DOI : 10.1007/11926078_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.5998

M. Giereth, On Partial Encryption of RDF-Graphs, Procs of ISWC, pp.308-322, 2005.
DOI : 10.1007/11574620_24

F. Giunchiglia, R. Zhang, and B. Crispo, Ontology driven community access control, Procs of SPOT, 2009.

J. Hollenbach, J. Presbrey, and T. Berners-lee, Using RDF Metadata To Enable Access Control on the Social Semantic Web, Procs, 2009.

R. J. Hulsebosch, A. H. Salden, M. S. Bargh, P. W. Ebben, and J. Reitsma, Context sensitive access control, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.111-119, 2005.
DOI : 10.1145/1063979.1064000

J. Krumm, A survey of computational location privacy, Personal and Ubiquitous Computing, vol.10, issue.5, pp.391-399, 2009.
DOI : 10.1007/s00779-008-0212-5

D. Kulkarni and A. Tripathi, Context-aware role-based access control in pervasive computing systems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.113-122, 2008.
DOI : 10.1145/1377836.1377854

H. Muhleisen, M. Kost, and J. Freytag, SWRL-based Access Policies for Linked Data, Procs of SPOT, 2010.

T. Priebe, E. B. Fernández, J. I. Mehlau, and G. Pernul, A Pattern System for Access Control, Procs of DBSec, pp.235-249, 2004.
DOI : 10.1007/1-4020-8128-6_16

O. Sacco, A. Passant, and S. Decker, An Access Control Framework for the Web of Data, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp.456-463, 2011.
DOI : 10.1109/TrustCom.2011.59

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

H. Shen and Y. Cheng, A Context-Aware Semantic-Based Access Control Model for Mobile Web Services, J. Computer Network and Information Security, vol.18, issue.3, pp.18-25, 2011.
DOI : 10.1007/978-3-642-13136-3_20

A. Toninelli, R. Montanari, L. Kagal, and O. Lassila, A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments, Procs of ISWC, pp.473-486, 2006.
DOI : 10.1007/11926078_34