Enabling Advanced and Context-Dependent Access Control in RDF Stores, Procs of ISWC, pp.1-14, 2007. ,
DOI : 10.1007/978-3-540-76298-0_1
The KGRAM Abstract Machine for Knowledge Graph Querying, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp.338-341, 2010. ,
DOI : 10.1109/WI-IAT.2010.144
Context-based access control management in ubiquitous environments, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings., pp.253-260, 2004. ,
DOI : 10.1109/NCA.2004.1347784
Context-aware access control for rdf graph stores, Procs of ECAI, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00724041
Securing context-aware applications using environment roles, Procs of SACMAT, pp.10-20, 2001. ,
Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008. ,
DOI : 10.1007/s10207-007-0051-9
URL : https://hal.archives-ouvertes.fr/hal-01207773
Understanding and using context. Personal Ubiquitous Computing, pp.4-7, 2001. ,
DOI : 10.1007/s007790170019
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.9786
Moving forward, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.1-3, 2010. ,
DOI : 10.1145/1868470.1868472
BAC, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.73-82, 2008. ,
DOI : 10.1145/1377836.1377849
Controlling Access to RDF Graphs, Procs of FIS, pp.107-117, 2010. ,
DOI : 10.1007/11926078_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.5998
On Partial Encryption of RDF-Graphs, Procs of ISWC, pp.308-322, 2005. ,
DOI : 10.1007/11574620_24
Ontology driven community access control, Procs of SPOT, 2009. ,
Using RDF Metadata To Enable Access Control on the Social Semantic Web, Procs, 2009. ,
Context sensitive access control, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.111-119, 2005. ,
DOI : 10.1145/1063979.1064000
A survey of computational location privacy, Personal and Ubiquitous Computing, vol.10, issue.5, pp.391-399, 2009. ,
DOI : 10.1007/s00779-008-0212-5
Context-aware role-based access control in pervasive computing systems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.113-122, 2008. ,
DOI : 10.1145/1377836.1377854
SWRL-based Access Policies for Linked Data, Procs of SPOT, 2010. ,
A Pattern System for Access Control, Procs of DBSec, pp.235-249, 2004. ,
DOI : 10.1007/1-4020-8128-6_16
An Access Control Framework for the Web of Data, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp.456-463, 2011. ,
DOI : 10.1109/TrustCom.2011.59
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
A Context-Aware Semantic-Based Access Control Model for Mobile Web Services, J. Computer Network and Information Security, vol.18, issue.3, pp.18-25, 2011. ,
DOI : 10.1007/978-3-642-13136-3_20
A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments, Procs of ISWC, pp.473-486, 2006. ,
DOI : 10.1007/11926078_34