H. Abie, P. Spilling, and B. Foyn, A distributed digital rights management model for secure information-distribution systems, International Journal of Information Security, vol.paper, issue.2, pp.113-128, 2004.
DOI : 10.1007/978-3-540-30191-2_42

H. Abie, P. Spilling, and B. Foyn, Rights-carrying and self-enforcing information objects for information distribution systems. Information and Communications Security pp, pp.546-561, 2004.

M. Alam, J. Seifert, Q. Li, and X. Zhang, Usage control platformization via trustworthy SELinux, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.245-248, 2008.
DOI : 10.1145/1368310.1368345

M. Alam, X. Zhang, M. Nauman, and T. Ali, Behavioral attestation for web services (BA4WS), Proceedings of the 2008 ACM workshop on Secure web services, SWS '08, pp.21-28, 2008.
DOI : 10.1145/1456492.1456496

J. Brunel, F. Cuppens, N. Cuppens, T. Sans, and J. Bodeveix, Security policy compliance with violation management, Proceedings of the 2007 ACM workshop on Formal methods in security engineering , FMSE '07, pp.31-40, 2007.
DOI : 10.1145/1314436.1314441

J. C. Brustoloni, R. Villamarín-salomón, P. Djalaliev, and D. Kyle, Evaluating the usability of usage controls in electronic collaboration, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08, pp.85-92, 2008.
DOI : 10.1145/1408664.1408676

J. Cederquist, R. Corin, M. Dekker, S. Etalle, J. Den-hartog et al., Audit-based compliance control, International Journal of Information Security, vol.13, issue.1, pp.133-151, 2007.
DOI : 10.3233/JCS-2005-13107

R. Corin, D. Galindo, and J. H. Hoepman, Securing data accountability in decentralized systems. On the Move to Meaningful Internet Systems, pp.626-635, 2006.

P. Djalaliev and J. C. Brustoloni, Secure web-based retrieval of documents with usage controls, Proceedings of the 2009 ACM symposium on Applied Computing, SAC '09, pp.2062-2069, 2009.
DOI : 10.1145/1529282.1529738

S. Etalle and W. H. Winsborough, A posteriori compliance control, Proceedings of the 12th ACM symposium on Access control models and technologies, pp.11-20, 2007.

G. Gheorghe, P. Mori, B. Crispo, and F. Martinelli, Enforcing UCON Policies on the Enterprise Service Bus, On the Move to Meaningful Internet Systems, pp.876-893, 2010.
DOI : 10.1145/1108906.1108908

M. Hilty, A. Pretschner, D. Basin, C. Schaefer, and T. Walter, Monitors for usage control. Trust Management pp, pp.411-414, 2007.

H. Hu, H. Li, and D. Feng, L-UCON: Towards Layered Access Control with UCON, 2009 International Conference on Computational Science and Engineering, pp.823-829, 2009.
DOI : 10.1109/CSE.2009.163

B. Katt, X. Zhang, R. Breu, M. Hafner, and J. Seifert, A general obligation model and continuity, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.123-132, 2008.
DOI : 10.1145/1377836.1377856

B. Kitchenham and S. Charters, Guidelines for performing systematic literature reviews in software engineering, 2007.

R. Korthaus, A. Sadeghi, C. Stüble, J. Zhan, and . Id, A practical property-based bootstrap architecture, Proceedings of the 2009 ACM workshop on Scalable trusted computing, STC '09, pp.29-38, 2009.
DOI : 10.1145/1655108.1655114

L. Krautsevich, A. Lazouski, F. Martinelli, P. Mori, and A. Yautsiukhin, Usage Control, Risk and Trust, Trust, Privacy and Security in Digital Business, pp.1-12, 2010.
DOI : 10.1145/1108906.1108908

P. Kumari, A. Pretschner, J. Peschla, and J. Kuhn, Distributed data usage control for web applications, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.85-96, 2011.
DOI : 10.1145/1943513.1943526

D. Kyle and J. Brustoloni, Uclinux, Proceedings of the 2007 ACM workshop on Scalable trusted computing , STC '07, pp.63-70, 2007.
DOI : 10.1145/1314354.1314371

A. Lazouski, F. Martinelli, and P. Mori, Usage control in computer security: A survey, Computer Science Review, vol.4, issue.2, pp.81-99, 2010.
DOI : 10.1016/j.cosrev.2010.02.002

Q. Liu, R. Safavi-naini, and N. P. Sheppard, Digital rights management for content distribution, Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, pp.49-58, 2003.

J. Lopez, R. Oppliger, and G. Pernul, Why have public key infrastructures failed so far?, Internet Research, vol.15, issue.5, pp.544-556, 2005.
DOI : 10.1007/BFb0055482

F. Massacci, Infringo ergo sum, Proceedings of the FSE/SDP workshop on Future of software engineering research, FoSER '10, pp.233-238, 2010.
DOI : 10.1145/1882362.1882411

M. Matson and M. Ulieru, The 'how' and 'why' of persistent information security, Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Services, PST '06, pp.1-4, 2006.
DOI : 10.1145/1501434.1501500

M. Nauman and T. Ali, HUE: A hardware UCON engine for fine-grained continuous usage control, 2008 IEEE International Multitopic Conference, pp.59-64, 2008.
DOI : 10.1109/INMIC.2008.4777708

A. A. Nyre and M. G. Jaatun, A probabilistic approach to information control, Journal of Internet Technology, vol.11, issue.3, pp.407-416, 2010.

J. Park and R. Sandhu, usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004.
DOI : 10.1145/984334.984339

A. Pretschner, M. Hilty, and D. Basin, Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006.
DOI : 10.1145/1151030.1151053

A. Pretschner, M. Hilty, F. Schutz, C. Schaefer, and T. Walter, Usage Control Enforcement: Present and Future, IEEE Security & Privacy Magazine, vol.6, issue.4, pp.44-53, 2008.
DOI : 10.1109/MSP.2008.101

A. Pretschner, F. Massacci, and M. Hilty, Usage control in service-oriented architectures . Trust, Privacy and Security in Digital Business pp, pp.83-93, 2007.

R. Sandhu, X. Zhang, K. Ranganathan, and M. J. Covington, Client-side access control enforcement using trusted computing and pei models, Journal of High Speed Networks, vol.15, issue.3, pp.229-245, 2006.

X. Zhang, J. Park, F. Parisi-presicce, and R. Sandhu, A logical specification for usage control, Proceedings of the ninth ACM symposium on Access control models and technologies , SACMAT '04, pp.1-10, 2004.
DOI : 10.1145/990036.990038

X. Zhang, J. P. Seifert, and R. Sandhu, Security Enforcement Model for Distributed Usage Control, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008), pp.10-18, 2008.
DOI : 10.1109/SUTC.2008.79