S. D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Psaila et al., Integrating trust management and access control in data-intensive Web applications, ACM Transactions on the Web, vol.6, issue.2, pp.1-643, 2012.
DOI : 10.1145/2180861.2180863

L. Bauer, L. Jia, and D. Sharma, Constraining Credential Usage in Logic-Based Access Control, 2010 23rd IEEE Computer Security Foundations Symposium, pp.154-168, 2010.
DOI : 10.1109/CSF.2010.18

J. Hu, K. M. Khan, Y. Bai, and Y. Zhang, Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems, In: ISC, pp.290-305, 2012.
DOI : 10.1007/978-3-642-33383-5_18

A. J. Lee and M. Winslett, Towards an efficient and language-agnostic compliance checker for trust negotiation systems, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.228-239, 2008.
DOI : 10.1145/1368310.1368343

Z. J. Oster, G. R. Santhanam, S. Basu, and V. Honavar, Model Checking of Qualitative Sensitivity Preferences to Minimize Credential Disclosure, In: FACS, pp.205-223, 2012.
DOI : 10.1007/978-3-642-35861-6_13

L. Bauer, Access Control for the Web via Proof-carrying Authorization, 2003.

N. Li, W. H. Winsborough, and J. C. Mitchell, Distributed credential chain discovery in trust management*, Journal of Computer Security, vol.11, issue.1, pp.35-86, 2003.
DOI : 10.3233/JCS-2003-11102

M. L. Mazurek, Y. Liang, W. Melicher, M. Sleeper, L. Bauer et al., Toward strong, usable access control for shared distributed data, Proceedings of the 12th USENIX Conference on File and Storage Technologies, 2014.

K. E. Seamons, M. Winslett, T. Yu, . Smith, E. Child et al., Requirements for policy languages for trust negotiation, Proceedings Third International Workshop on Policies for Distributed Systems and Networks, pp.68-79, 2002.
DOI : 10.1109/POLICY.2002.1011295