W. Li, Overview of fine granularity scalability in MPEG-4 video standard, IEEE Transactions on Circuits and Systems for Video Technology, vol.11, issue.3, pp.301-317, 2001.

C. Christopoulos, A. Skodras, and T. Ebrahimi, The JPEG2000 still image coding system: an overview, IEEE Transactions on Consumer Electronics, vol.46, issue.4, pp.1103-1127, 2000.
DOI : 10.1109/30.920468

B. Zhu, S. Feng, and S. Li, An efficient key scheme for layered access control of MPEG-4 FGS video, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763), pp.443-446, 2004.
DOI : 10.1109/ICME.2004.1394224

N. Hashimoto, S. Imaizumi, M. Fujiyoshi, and H. Kiya, Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images, 2008 15th IEEE International Conference on Image Processing, pp.3116-3119, 2008.
DOI : 10.1109/ICIP.2008.4712455

S. Imaizumi, M. Fujiyoshi, Y. Abe, and H. Kiya, Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control, 2007 IEEE International Conference on Image Processing, pp.137-140, 2007.
DOI : 10.1109/ICIP.2007.4379111

S. Imaizumi, O. Watanabe, M. Fujiyoshi, and H. Kiya, Generalized hierarchical encryption of JPEG 2000 codestreams for access control, IEEE International Conference on Image Processing 2005, pp.1094-1097, 2005.
DOI : 10.1109/ICIP.2005.1530250

J. Crampton, R. Daud, and K. Martin, Constructing Key Assignment Schemes from Chain Partitions, 2010.
DOI : 10.1007/978-3-642-13739-6_9

URL : https://hal.archives-ouvertes.fr/hal-01056664

J. Crampton, K. Martin, and P. Wild, On Key Assignment for Hierarchical Access Control, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.98-111, 2006.
DOI : 10.1109/CSFW.2006.20

B. Davey and H. Priestley, Introduction to Lattices and Order, 1990.
DOI : 10.1017/CBO9780511809088

J. Katz and Y. Lindell, Introduction to Modern Cryptography, 2007.

D. Bell and L. Lapadula, Secure computer systems: Unified exposition and Multics interpretation, 1976.

D. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

M. Atallah, M. Blanton, N. Fazio, and K. Frikken, Dynamic and Efficient Key Management for Access Hierarchies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-43, 2009.
DOI : 10.1145/1455526.1455531

R. Dilworth, A Decomposition Theorem for Partially Ordered Sets, The Annals of Mathematics, vol.51, issue.1, pp.161-166, 1950.
DOI : 10.2307/1969503

S. Akl and P. Taylor, Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer Systems, vol.1, issue.3, pp.239-248, 1983.
DOI : 10.1145/357369.357372

M. Atallah, M. Blanton, and K. Frikken, Key management for non-tree access hierarchies, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.11-18, 2006.
DOI : 10.1145/1133058.1133062

M. Atallah, M. Blanton, and K. Frikken, Efficient techniques for realizing geo-spatial access control, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, pp.82-92, 2007.
DOI : 10.1145/1229285.1229301