The TLS protocol version 1, 1999. ,
DOI : 10.17487/rfc2246
Open source, open standards and re-use: Government action plan, 2009. ,
Towards a common API for publish/subscribe, Proceedings of the 2007 inaugural international conference on Distributed event-based systems , DEBS '07, pp.152-157, 2007. ,
DOI : 10.1145/1266894.1266924
Secure computer systems: Mathematical foundations and model, The MITRE Corp, 1973. ,
Protecting privacy using the decentralized label model, ACM Transactions on Software Engineering and Methodology, vol.9, issue.4, pp.410-442, 2000. ,
DOI : 10.1145/363516.363526
Information flow control for standard OS abstractions, SOSP '07, pp.321-334, 2007. ,
High-performance event processing with information security, USENIX Annual Technical Conference, pp.1-15, 2010. ,
A model of OASIS role-based access control and its support for active security, ACM Transactions on Information and System Security, vol.5, issue.4, pp.492-540, 2002. ,
DOI : 10.1145/581271.581276
A model for controlling data flow in distributed healthcare environments, The Proceedings of the Second ICST International Conference on Pervasive Computing Technologies for Healthcare, pp.188-191, 2008. ,
DOI : 10.4108/ICST.PERVASIVEHEALTH2008.2572
RFC 4120: The Kerberos network authentication service (V5), 2005. ,
PERMIS: a modular authorization infrastructure, Concurrency and Computation: Practice and Experience, vol.23, issue.4, pp.1341-1357, 2008. ,
DOI : 10.1002/cpe.1284
Security assertion markup language (SAML) V2.0 technical overview, Committee Draft, p.2, 2008. ,
RFC 5849: The OAuth 1.0 protocol, 2010. ,
Controlling historical information dissemination in publish/subscribe, Proceedings of the 2008 workshop on Middleware security, MidSec '08, pp.34-39, 2008. ,
DOI : 10.1145/1463342.1463349
App Engine Java overview, 2010. ,
Distributed Middleware Enforcement of Event Flow Security Policy, 11th International ACM/IFIP/USENIX Middleware Conference, 2010. ,
DOI : 10.1007/978-3-642-16955-7_17
URL : https://hal.archives-ouvertes.fr/hal-01055277
Security in multi-domain event-based systems, it -Information Technology, vol.51, issue.5, pp.277-284, 2009. ,
Stock traders find speed pays, in milliseconds. The New York Times, 2009. ,
Exchange hosting. http://www.londonstockexchange. com/traders-and-brokers/products-services, 2010. ,
Enforcing user privacy in web applications using Erlang, 2010. ,
Efficient Policy Checking across Administrative Domains, 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, 2010. ,
DOI : 10.1109/POLICY.2010.36
Linking Policies to the Spatial Environment, 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, 2010. ,
DOI : 10.1109/POLICY.2010.31
Deontic Logic in Computer Science, 1993. ,
Deontic logic for modelling data flow and use compliance, Proceedings of the 6th international workshop on Middleware for pervasive and ad-hoc computing, MPAC '08, pp.19-24, 2008. ,
DOI : 10.1145/1462789.1462793