N. Aschenbruck, E. Gerhards-padilla, M. Gerharz, M. Frank, and P. Martini, Modelling mobility in disaster area scenarios, Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems , MSWiM '07, pp.4-12, 2007.
DOI : 10.1145/1298126.1298131

C. Bettini, S. Jajodia, X. Wang, and D. Wijesekera, Obligation monitoring in policy management, Proceedings Third International Workshop on Policies for Distributed Systems and Networks, 2002.
DOI : 10.1109/POLICY.2002.1011288

D. Gelernter, Generative communication in Linda, ACM Transactions on Programming Languages and Systems, vol.7, issue.1, pp.80-112, 1985.
DOI : 10.1145/2363.2433

R. Graubart, On the need for a third form of access control, 12th National Computing Security Conferece, pp.296-304, 1989.

M. Kudo and S. Hada, XML document security based on provisional authorization, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, 2000.
DOI : 10.1145/352600.352613

L. Lilien, Z. H. Kamal, V. Bhuse, and A. Gupta, The Concept of Opportunistic Networks and their Research Challenges in Privacy and Security, Proc. of Intl. Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks, 2006.
DOI : 10.1007/978-0-387-71058-7_5

M. Mamei, F. Zambonelli, and L. Leonardi, Tuples on the air: a middleware for context-aware computing in dynamic networks, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings., p.342, 2003.
DOI : 10.1109/ICDCSW.2003.1203577

J. Park and R. Sandhu, usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004.
DOI : 10.1145/984334.984339

G. P. Picco, A. L. Murphy, and G. Roman, LIME, Proceedings of the 21st international conference on Software engineering, ICSE '99, pp.368-377, 1999.
DOI : 10.1145/302405.302659

A. Rowstron and A. Wood, Solving the Linda multiple rd problem, Coordination Languages and Models, pp.357-367, 1996.
DOI : 10.1007/3-540-61052-9_56

G. Russello, C. Dong, and N. Dulay, Authorisation and Conflict Resolution for Hierarchical Domains, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), pp.201-210, 2007.
DOI : 10.1109/POLICY.2007.8

E. Scalavino, G. Russello, R. Ball, V. Gowadia, and E. C. Lupu, An opportunistic authority evaluation scheme for data security in crisis management scenarios, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010.
DOI : 10.1145/1755688.1755709

R. Sen, G. Hackmann, M. Haitjema, G. Roman, and C. Gill, Coordinating Workflow Allocation and Execution in Mobile Environments, Proceeding of the 9th Int'l Conf. on Coordination Models and Languages, pp.249-267, 2007.
DOI : 10.1007/978-3-540-72794-1_14

R. Thomas, G. Russello, and S. Tsang, Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, pp.76-83, 2009.
DOI : 10.1109/POLICY.2009.38

X. Wang, G. Lao, T. Demartini, H. Reddy, M. Nguyen et al., XrML -- eXtensible rights Markup Language, Proceedings of the 2002 ACM workshop on XML security , XMLSEC '02, pp.71-79, 2002.
DOI : 10.1145/764792.764803