An authorization model for temporal and derived data: securing information portals, ACM Transactions on Information and System Security, vol.5, issue.1, pp.62-94, 2002. ,
DOI : 10.1145/504909.504912
Axiomatics Policy Server 4.0. http://www.axiomatics.com/ products/axiomatics-policy-server.html, 2010. ,
PERMIS: a modular authorization infrastructure, Concurrency and Computation: Practice and Experience, vol.23, issue.4, pp.1341-1357, 2008. ,
DOI : 10.1108/10650740610704153
URL : http://kar.kent.ac.uk/14877/1/PERMISChadwick.pdf
Coordinating access control in grid services, Concurrency and Computation: Practice and Experience, vol.7, issue.9, pp.1071-1094, 2008. ,
DOI : 10.1002/cpe.1284
URL : http://kar.kent.ac.uk/14878/1/Coordinating_Access_Control_in_Grid_Services.pdf
A Proposal on Enhancing XACML with Continuous Usage Control Features, Grids, P2P and Services Computing, pp.133-146, 2010. ,
DOI : 10.1007/978-1-4419-6794-7_11
A note on the anatomy of federation, BT Technology Journal, vol.6, issue.6, pp.89-106, 2005. ,
DOI : 10.1007/s10550-006-0011-3
A policy deployment model for the Ponder language, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470), pp.529-543, 2001. ,
DOI : 10.1109/INM.2001.918064
Solving Non-Boolean Satisfiability Problems with Stochastic Local Search: A Comparison of Encodings, Journal of Automated Reasoning, vol.1, issue.1-3, pp.143-179, 2005. ,
DOI : 10.1007/3-540-48369-1
Authentication and TOCTOU, 2011. ,
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement, In: IFIPTM, vol.321, pp.63-78, 2010. ,
DOI : 10.1007/978-3-642-13446-3_5
URL : https://hal.archives-ouvertes.fr/hal-01061319
Scalable Authorization Middleware for Service Oriented Architectures, 2011. ,
DOI : 10.1109/ICWS.2005.25
http://www-01.ibm.com/software/tivoli/ products/access-mgr-e-bus, 2010. ,
Shibboleth 2. https://wiki.shibboleth. net/confluence, 2011. ,
Virtual private services: Coordinated policy enforcement for distributed applications, I. J. Network Security, vol.4, issue.1, pp.69-80, 2007. ,
eBay identity assertion framework. http://www.slideshare.net/ farhangkassaei/ebay-identity-assertion-framework-iaf, 2010. ,
Inside Facebook's Open Source Infrastructure, 2010. ,
The art of computer programming, 1997. ,
The Facebook Data Center FAQ, 2010. ,
Scalability best practices -Lessons from eBay InfoQ http://www. infoq.com/articles/ebay-scalability-best-practices, 2008. ,
More Best Practices from Large Scale Websites -Lessons from eBay. Talk at QCon San Francisco, p.2010, 2010. ,
Frontend Performance Engineering in Facebook. O'Reilly Velocity , Web Performance and Operations Conference, 2009. ,
Towards Improving the Availability and Performance of Enterprise Authorization Systems, 2009. ,