K. Kinsella and W. He, An Aging World, Int. Population Reports, 2008.

A. Kalam, R. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003.
DOI : 10.1109/POLICY.2003.1206966

URL : https://hal.archives-ouvertes.fr/hal-01483818

D. F. Brewer and M. J. Nash, The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.206-214, 1989.
DOI : 10.1109/SECPRI.1989.36295

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

F. Cuppens and N. Cuppens-boulahia, Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, 2008.
DOI : 10.1007/s10207-007-0051-9

URL : https://hal.archives-ouvertes.fr/hal-01207773

L. Habib, M. Jaume, and C. Morisset, Formal definition and comparison of access control models, Journal of Information Assurance and Security, vol.4, issue.4, pp.372-381, 2009.
URL : https://hal.archives-ouvertes.fr/hal-01195856

N. Boustia and A. Mokhtari, Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions Approach, 2008 Third International Conference on Availability, Reliability and Security, 2008.
DOI : 10.1109/ARES.2008.144

N. Bena¨?ssabena¨?ssa and D. Méry, Proof-based design patterns, final report of the RIMEL project (ANR-06-SETI-015, 2008.

A. Miege, Definition d'un environnement formel d'expression de politiques de securite . Modele Or-BAC et extensions' PhD Dissertation in IT Security, 2005.
URL : https://hal.archives-ouvertes.fr/pastel-00001376

D. Jackson, Software Abstractions Logic, Language, and Analysis, 2006.

A. Van-lamsweerde, R. Darimont, and E. Letier, Managing conflicts in goal-driven requirements engineering, IEEE Transactions on Software Engineering, vol.24, issue.11, pp.908-926, 1998.
DOI : 10.1109/32.730542