R. Alfieri, R. Cecchini, V. Ciaschini, L. Dell-'agnello, A. Frohner et al., VOMS, an Authorization System for Virtual Organizations, Grid Computing, pp.33-40, 2004.
DOI : 10.1007/978-3-540-24689-3_5

A. National, S. Institute, and I. , Ansi incits 359-2004, role based access control, 2004.

M. Benantar, Access Control Systems: Security, Identity Management and Trust Models, 2005.

D. Chadwick, Authorisation in Grid computing, Information Security Technical Report, vol.10, issue.1, pp.33-40, 2005.
DOI : 10.1016/j.istr.2004.11.004

D. Chadwick, A. Otenko, and E. Ball, Role-based access control with X.509 attribute certificates, IEEE Internet Computing, vol.7, issue.2, pp.62-69, 2003.
DOI : 10.1109/MIC.2003.1189190

L. Chen and J. Crampton, Inter-domain role mapping and least privilege, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.157-162, 2007.
DOI : 10.1145/1266840.1266866

D. C. Chu and M. Humphrey, Mobile ogsi.net: Grid computing on mobile devices. Grid Computing, IEEE/ACM International Workshop on, vol.0, pp.182-191, 2004.

D. F. Ferraiolo, D. R. Kuhn, and R. Chandramouli, Role-Based Access Control, 2003.

I. Foster, C. Kesselman, and S. Tuecke, The Anatomy of the Grid: Enabling Scalable Virtual Organizations, The International Journal of High Performance Computing Applications, vol.10, issue.3, p.200, 2001.
DOI : 10.1109/65.494559

L. Gong and X. Qian, Computational issues in secure interoperation, IEEE Transactions on Software Engineering, vol.22, issue.1, pp.43-52, 1996.
DOI : 10.1109/32.481533

A. Gouglidis and I. Mavridis, On the Definition of Access Control Requirements for Grid and Cloud Computing Systems, In: Networks for Grid Applications, LNICST, pp.19-26, 2010.
DOI : 10.1145/1057977.1057979

J. L. Gross and J. Y. , Handbook of Graph Theory (Discrete Mathematics and Its Applications). CRC, 1 edn, 2003.

G. Neumann and M. Strembeck, An approach to engineer and enforce context constraints in an RBAC environment, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, pp.65-79, 2003.
DOI : 10.1145/775412.775421

J. Park and R. Sandhu, usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004.
DOI : 10.1145/984334.984339

L. Pearlman, V. Welch, I. Foster, C. Kesselman, and S. Tuecke, A community authorization service for group collaboration, Proceedings Third International Workshop on Policies for Distributed Systems and Networks, pp.50-59, 2002.
DOI : 10.1109/POLICY.2002.1011293

URL : http://arxiv.org/abs/cs/0306053

T. Phan, L. Huang, and C. Dulan, Challenge:, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, p.278, 2002.
DOI : 10.1145/570645.570679

P. Racz, J. Burgos, N. Inacio, C. Morariu, V. Olmedo et al., Mobility and QoS Support for a Commercial Mobile Grid in Akogrimo, 2007 16th IST Mobile and Wireless Communications Summit, pp.16-17, 2007.
DOI : 10.1109/ISTMWC.2007.4299247

R. Sandhu and J. Park, Usage Control: A Vision for Next Generation Access Control, Computer Network Security, pp.17-31, 2003.
DOI : 10.1007/978-3-540-45215-7_2

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3867

B. Shafiq, J. B. Joshi, E. Bertino, and A. Ghafoor, Secure interoperation in a multidomain environment employing RBAC policies, IEEE Transactions on Knowledge and Data Engineering, vol.17, issue.11, pp.1557-1577, 2005.
DOI : 10.1109/TKDE.2005.185

M. Shehab, E. Bertino, and A. Ghafoor, SERAT, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.159-167, 2005.
DOI : 10.1145/1063979.1064007

M. Thompson, A. Essiari, and S. Mudumbai, Certificate-based authorization policy in a PKI environment, ACM Transactions on Information and System Security, vol.6, issue.4, pp.566-588, 2003.
DOI : 10.1145/950191.950196

W. Tolone, G. J. Ahn, T. Pai, and S. P. Hong, Access control in collaborative systems, ACM Computing Surveys, vol.37, issue.1, pp.29-41, 2005.
DOI : 10.1145/1057977.1057979

M. Waldburger and B. Stiller, Regulatory issues for mobile grid computing in the european union, 17th European Regional ITS Conference, pp.1-9, 2006.

G. Zhang and M. Parashar, Dynamic context-aware access control for grid applications, Proceedings. First Latin American Web Congress, pp.101-108, 2004.
DOI : 10.1109/GRID.2003.1261704

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.6396

X. Zhang, M. Nakae, M. Covington, and R. Sandhu, A usage-based authorization framework for collaborative computing systems, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.180-189, 2006.
DOI : 10.1145/1133058.1133084

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.5117

X. Zhang, M. Nakae, M. J. Covington, and R. Sandhu, Toward a Usage-Based Security Framework for Collaborative Computing Systems, ACM Transactions on Information and System Security, vol.11, issue.1, pp.1-36, 2008.
DOI : 10.1145/1330295.1330298