Towards a digital library theory: a formal digital library ontology, International Journal on Digital Libraries, vol.23, issue.2, pp.91-114, 2008. ,
DOI : 10.1007/s00799-008-0033-1
A content-based authorization model for digital libraries, IEEE Transactions on Knowledge and Data Engineering, vol.14, issue.2, pp.296-315, 2002. ,
DOI : 10.1109/69.991718
URL : http://cimic.rutgers.edu/~atluri/diglib.pdf
A Framework for Flexible Access Control in Digital Library Systems, Lecture Notes in Computer Science, vol.14, issue.2, pp.252-266, 2006. ,
DOI : 10.1007/11593980_7
Controlled Access over Documents for Concepts Having Multiple Parents in a Digital Library Ontology, Communications in Computer and Information Science, vol.26, issue.2, pp.277-285, 2011. ,
DOI : 10.1145/383891.383894
Handbook of graph grammars and computing by graph transformation: applications, languages, and tools, 1999. ,
DOI : 10.1142/4180
ALGEBRAIC APPROACHES TO GRAPH TRANSFORMATION ??? PART I: BASIC CONCEPTS AND DOUBLE PUSHOUT APPROACH, pp.163-245, 1997. ,
DOI : 10.1142/9789812384720_0003
Graph-based specification of access control policies, Journal of Computer and System Sciences, vol.71, issue.1, pp.1-33, 2005. ,
DOI : 10.1016/j.jcss.2004.11.002
URL : http://doi.org/10.1016/j.jcss.2004.11.002
On the specification and evolution of access control policies, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.121-130, 2001. ,
DOI : 10.1145/373256.373280
Semantic and schematic similarities between database objects: a context-based approach, The VLDB Journal The International Journal on Very Large Data Bases, vol.5, issue.4, pp.276-304, 1996. ,
DOI : 10.1007/s007780050029
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.6848
Semantics-aware security policy specification for the semantic web data, International Journal of Information and Computer Security, vol.4, issue.1, pp.52-75, 2010. ,
DOI : 10.1504/IJICS.2010.031859
Ontologies are not the panacea in data integration: A flexible coordinator to mediate context construction. Distributed and Parallel Databases, pp.7-35, 1023. ,
Modality conflicts in semantics aware access control, Proceedings of the 6th international conference on Web engineering , ICWE '06, pp.249-256, 2006. ,
DOI : 10.1145/1145581.1145632
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.257.6103
A Formal Access Control Model for XML Databases, Secure Data Management ,
DOI : 10.1007/11552338_7
URL : https://hal.archives-ouvertes.fr/hal-00408570
Policy-based dissemination of partial web-ontologies, Proceedings of the 2005 workshop on Secure web services , SWS '05, pp.43-52, 2005. ,
DOI : 10.1145/1103022.1103030
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.125.6293
An algebra for composing access control policies, ACM Transactions on Information and System Security, vol.5, issue.1, pp.1-35, 2002. ,
DOI : 10.1145/504909.504910
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.543.2075