Multi-level authorisation model and framework for distributed semantic-aware environments, IET Information Security, vol.4, issue.4, p.301, 2010. ,
DOI : 10.1049/iet-ifs.2009.0198
Survey of graph database models, ACM Computing Surveys, vol.40, issue.1, 2008. ,
DOI : 10.1145/1322432.1322433
System R : Relational Management Approach to Database, pp.97-137, 1976. ,
Creating a Policy-Aware Web: Discretionary, Rule-based Access for the World Wide Web, 2006. ,
Database security - concepts, approaches, and challenges, IEEE Transactions on Dependable and Secure Computing, vol.2, issue.1, pp.2-19, 2005. ,
DOI : 10.1109/TDSC.2005.9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.2176
Securing XML documents with Author-X, IEEE Internet Computing, vol.5, issue.3, pp.21-31, 2001. ,
DOI : 10.1109/4236.935172
Authorizations in relational database management systems, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.130-139, 1993. ,
DOI : 10.1145/168588.168605
Sushil Jajodia, and Senior Member. An Extended Authorization Model for Relational Databases, pp.85-101, 1997. ,
Linked data access goes mobile: Context-aware authorization for graph stores, LDOW -5th WWW Workshop on Linked Data on the Web, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00691256
The Ponder Policy Specification Language, Proceedings of the International Workshop on Policies for Distributed Systems and Networks, pp.29-31, 2001. ,
DOI : 10.1007/3-540-44569-2_2
Access control on RDF triple stores from a semantic wiki perspective, ESWC Workshop on Scripting for the Semantic Web, 2006. ,
On an authorization mechanism, ACM Transactions on Database Systems, vol.3, issue.3, pp.310-319, 1978. ,
DOI : 10.1145/320263.320288
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.5540
An authorization model for XML databases, Proceedings of the 2004 workshop on Secure web service , SWS '04, pp.16-28, 2004. ,
DOI : 10.1145/1111348.1111351
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.560.9964
An authorization mechanism for a relational database system, ACM Transactions on Database Systems, vol.1, issue.3, pp.242-255, 1976. ,
DOI : 10.1145/320473.320482
Secure resource description framework, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.121-129, 2006. ,
DOI : 10.1145/1133058.1133076
SBAC:A SemanticBased Access Control Model, 11th Nordic Workshop on Secure IT-systems (NordSec'06), 2006. ,
Multimedia Access Control Using RDF Metadata, 2003. ,
DOI : 10.1007/978-3-540-39962-9_73
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.6320
Design and application of rule based access control policies, Proc of the Semantic Web and Policy Workshop, pp.34-41, 2005. ,
Axel Polleres, and Alessandra Mileo. A Logic Programming approach for Access Control over RDF, Technical Communications of ICLP'12, 2012. ,
Concept-level access control for the Semantic Web, Proceedings of the 2003 ACM workshop on XML security , XMLSEC '03, p.94, 2003. ,
DOI : 10.1145/968559.968575
Access Control Policies for Semantic Networks, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, pp.150-157, 2009. ,
DOI : 10.1109/POLICY.2009.11
Protect Your RDF Data!, Proceedings of the 2nd Joint International Semantic Technology Conference, 2012. ,
DOI : 10.1007/978-3-642-37996-3_6
An Access Control Framework for the Web of Data, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 2011. ,
DOI : 10.1109/TrustCom.2011.59
Access control: Policies, models, and mechanisms. Foundations of Security Analysis and Design, 2001. ,
Access control: principle and practice, IEEE Communications Magazine, vol.32, issue.9, 1994. ,
DOI : 10.1109/35.312842
Depth-First Search and Linear Graph Algorithms, SIAM Journal on Computing, vol.1, issue.2, pp.146-160, 1972. ,
DOI : 10.1137/0201010
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.327.8418