J. Park, X. Zhang, and R. Sandhu, Attribute Mutability in Usage Control, 18th IFIP WG 11.3 Working Conference on Data and Applications Security, 2004.
DOI : 10.1007/1-4020-8128-6_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.2342

A. Lazouski, F. Martinelli, and P. Mori, Usage control in computer security: A survey, Computer Science Review, vol.4, issue.2, pp.81-99, 2010.
DOI : 10.1016/j.cosrev.2010.02.002

X. Zhang, F. Parisi-presicce, R. Sandhu, and J. Park, Formal model and policy specification of usage control, ACM Transactions on Information and System Security, vol.8, issue.4, pp.351-387, 2005.
DOI : 10.1145/1108906.1108908

G. Goncalves and A. Poniszewska-maranda, Role engineering: from design to evaluation of security schemas, Journal of Systems and Software, vol.8, p.81

A. Poniszewska-maranda, Conception approach of access control in??heterogeneous??information systems using UML, Telecommunication Systems, vol.81, issue.9, pp.177-190, 2010.
DOI : 10.1109/2.485845

G. Neumann and M. Strembeck, A scenario-driven role engineering process for functional RBAC roles, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, 2002.
DOI : 10.1145/507711.507717

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.1495

M. Strembeck, Scenario-Driven Role Engineering, IEEE Security & Privacy Magazine, vol.8, issue.1, 2010.
DOI : 10.1109/MSP.2010.46

M. Strembeck and G. Neumann, An integrated approach to engineer and enforce context constraints in RBAC environments, ACM Transactions on Information and System Security, vol.7, issue.3, 2004.
DOI : 10.1145/1015040.1015043

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.7854

E. Bertino, E. Ferrari, and V. Atluri, The specification and enforcement of authorization constraints in workflow management systems, ACM Transactions on Information and System Security, vol.2, issue.1
DOI : 10.1145/300830.300837

E. B. Fernandez and J. C. Hawkins, Determining role rights from use cases, Proceedings of the second ACM workshop on Role-based access control , RBAC '97, 1997.
DOI : 10.1145/266741.266767

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.22.5696

D. Basin, J. Doser, and T. Lodderstedt, Model driven security, ACM Transactions on Software Engineering and Methodology, vol.15, issue.1, p.3991, 2006.
DOI : 10.1145/1125808.1125810

E. J. Coyne, Role engineering, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, 1996.
DOI : 10.1145/270152.270159

P. Epstein and R. Sandhu, Towards a UML based approach to role engineering, Proceedings of the fourth ACM workshop on Role-based access control , RBAC '99, 1999.
DOI : 10.1145/319171.319184

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.4070

P. Epstein and R. Sandhu, Engineering of Role-Permission Assignment to Role Engineering, Proc. of 17th ACSAC, 2001.

H. Roeckle, G. Schimpf, and R. Weidinger, Process-oriented approach for rolefinding to implement role-based security administration in a large industrial organization, Proc. of ACM Workshop on role-Based Access Control, 2000.

A. Poniszewska-maranda, Implementation of Access Control Model for Distributed Information Systems Using Usage Control, SIIS 2011, 2011.
DOI : 10.1145/1108906.1108908

A. Poniszewska-maranda, Administration of access control in information systems using URBAC model, Journal of Applied Computer Science, vol.19, issue.2, 2011.