M. Amini and R. Jalili, Multi-level authorisation model and framework for distributed semantic-aware environments, IET Information Security, vol.4, issue.4, p.301, 2010.
DOI : 10.1049/iet-ifs.2009.0198

R. Angles and C. Gutierrez, Survey of graph database models, ACM Computing Surveys, vol.40, issue.1, 2008.
DOI : 10.1145/1322432.1322433

M. M-astrahan, D. Blasgen, K. Chamberlin, J. Eswaran, P. Gray et al., System R : Relational Management Approach to Database, pp.97-137, 1976.

T. Berners-lee, D. J. Weitzner, and J. Hendler, Creating a Policy-Aware Web: Discretionary, Rule-based Access for the World Wide Web, 2006.

E. Bertino and R. Sandhu, Database security - concepts, approaches, and challenges, IEEE Transactions on Dependable and Secure Computing, vol.2, issue.1, pp.2-19, 2005.
DOI : 10.1109/TDSC.2005.9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

E. Bertino, E. Castano, and . Ferrari, Securing XML documents with Author-X, IEEE Internet Computing, vol.5, issue.3, pp.21-31, 2001.
DOI : 10.1109/4236.935172

E. Bertino, P. Samarati, and S. Jajodia, Authorizations in relational database management systems, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.130-139, 1993.
DOI : 10.1145/168588.168605

E. Bertino and P. Samarati, Sushil Jajodia, and Senior Member. An Extended Authorization Model for Relational Databases, pp.85-101, 1997.

L. Costabello, S. Villata, and N. Delaforge, Linked data access goes mobile: Context-aware authorization for graph stores, LDOW -5th WWW Workshop on Linked Data on the Web, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00691256

N. Damianou, N. Dulay, E. Lupu, and M. Sloman, The Ponder Policy Specification Language, Proceedings of the International Workshop on Policies for Distributed Systems and Networks, pp.29-31, 2001.
DOI : 10.1007/3-540-44569-2_2

S. Dietzold and S. Auer, Access control on RDF triple stores from a semantic wiki perspective, ESWC Workshop on Scripting for the Semantic Web, 2006.

R. Fagin, On an authorization mechanism, ACM Transactions on Database Systems, vol.3, issue.3, pp.310-319, 1978.
DOI : 10.1145/320263.320288

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Gabillon, An authorization model for XML databases, Proceedings of the 2004 workshop on Secure web service , SWS '04, pp.16-28, 2004.
DOI : 10.1145/1111348.1111351

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

P. Griffiths and B. Wade, An authorization mechanism for a relational database system, ACM Transactions on Database Systems, vol.1, issue.3, pp.242-255, 1976.
DOI : 10.1145/320473.320482

A. Jain and C. Farkas, Secure resource description framework, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.121-129, 2006.
DOI : 10.1145/1133058.1133076

S. Javanmardi, . Amini, Y. Jalili, and . Ganjisaffar, SBAC:A SemanticBased Access Control Model, 11th Nordic Workshop on Secure IT-systems (NordSec'06), 2006.

N. Kodali, C. Farkas, and D. Wijesekera, Multimedia Access Control Using RDF Metadata, 2003.
DOI : 10.1007/978-3-540-39962-9_73

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

H. Li, X. Zhang, H. Wu, and Y. Qu, Design and application of rule based access control policies, Proc of the Semantic Web and Policy Workshop, pp.34-41, 2005.

N. Lopes, S. Kirrane, and A. Zimmermann, Axel Polleres, and Alessandra Mileo. A Logic Programming approach for Access Control over RDF, Technical Communications of ICLP'12, 2012.

L. Qin and V. Atluri, Concept-level access control for the Semantic Web, Proceedings of the 2003 ACM workshop on XML security , XMLSEC '03, p.94, 2003.
DOI : 10.1145/968559.968575

T. Ryutov, T. Kichkaylo, and R. Neches, Access Control Policies for Semantic Networks, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, pp.150-157, 2009.
DOI : 10.1109/POLICY.2009.11

A. M. , S. Kirrane, N. Lopes, and S. Decker, Protect Your RDF Data!, Proceedings of the 2nd Joint International Semantic Technology Conference, 2012.
DOI : 10.1007/978-3-642-37996-3_6

O. Sacco, A. Passant, and S. Decker, An Access Control Framework for the Web of Data, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 2011.
DOI : 10.1109/TrustCom.2011.59

P. Samarati, Access control: Policies, models, and mechanisms. Foundations of Security Analysis and Design, 2001.

R. Sandhu and P. Samarati, Access control: principle and practice, IEEE Communications Magazine, vol.32, issue.9, 1994.
DOI : 10.1109/35.312842

R. Tarjan, Depth-First Search and Linear Graph Algorithms, SIAM Journal on Computing, vol.1, issue.2, pp.146-160, 1972.
DOI : 10.1137/0201010

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=