V. Atluri and A. Gal, An authorization model for temporal and derived data: securing information portals, ACM Transactions on Information and System Security, vol.5, issue.1, pp.62-94, 2002.
DOI : 10.1145/504909.504912

. Axiomatics, Axiomatics Policy Server 4.0. http://www.axiomatics.com/ products/axiomatics-policy-server.html, 2010.

D. Chadwick, G. Zhao, S. Otenko, R. Laborde, L. Su et al., PERMIS: a modular authorization infrastructure, Concurrency and Computation: Practice and Experience, vol.23, issue.4, pp.1341-1357, 2008.
DOI : 10.1108/10650740610704153

URL : http://kar.kent.ac.uk/14877/1/PERMISChadwick.pdf

D. W. Chadwick, L. Su, and R. Laborde, Coordinating access control in grid services, Concurrency and Computation: Practice and Experience, vol.7, issue.9, pp.1071-1094, 2008.
DOI : 10.1002/cpe.1284

URL : http://kar.kent.ac.uk/14878/1/Coordinating_Access_Control_in_Grid_Services.pdf

M. Colombo, A. Lazouski, F. Martinelli, and P. Mori, A Proposal on Enhancing XACML with Continuous Usage Control Features, Grids, P2P and Services Computing, pp.133-146, 2010.
DOI : 10.1007/978-1-4419-6794-7_11

I. Djordjevic and T. Dimitrakos, A note on the anatomy of federation, BT Technology Journal, vol.6, issue.6, pp.89-106, 2005.
DOI : 10.1007/s10550-006-0011-3

N. Dulay, E. Lupu, M. Sloman, and N. Damianou, A policy deployment model for the Ponder language, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470), pp.529-543, 2001.
DOI : 10.1109/INM.2001.918064

A. M. Frisch, T. J. Peugniez, A. J. Doggett, and P. W. Nightingale, Solving Non-Boolean Satisfiability Problems with Stochastic Local Search: A Comparison of Encodings, Journal of Automated Reasoning, vol.1, issue.1-3, pp.143-179, 2005.
DOI : 10.1007/3-540-48369-1

G. Gebel and G. Peterson, Authentication and TOCTOU, 2011.

G. Gheorghe, S. Neuhaus, and B. Crispo, xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement, In: IFIPTM, vol.321, pp.63-78, 2010.
DOI : 10.1007/978-3-642-13446-3_5

URL : https://hal.archives-ouvertes.fr/hal-01061319

T. Goovaerts, L. Desmet, and W. Joosen, Scalable Authorization Middleware for Service Oriented Architectures, 2011.
DOI : 10.1109/ICWS.2005.25

I. Manager, http://www-01.ibm.com/software/tivoli/ products/access-mgr-e-bus, 2010.

/. Internet2middlewareinitiative and . Mace, Shibboleth 2. https://wiki.shibboleth. net/confluence, 2011.

S. Ioannidis, S. M. Bellovin, J. Ioannidis, A. D. Keromytis, K. G. Anagnostakis et al., Virtual private services: Coordinated policy enforcement for distributed applications, I. J. Network Security, vol.4, issue.1, pp.69-80, 2007.

F. Kassaei, eBay identity assertion framework. http://www.slideshare.net/ farhangkassaei/ebay-identity-assertion-framework-iaf, 2010.

S. M. Kerner, Inside Facebook's Open Source Infrastructure, 2010.

D. E. Knuth, The art of computer programming, 1997.

R. Miller, The Facebook Data Center FAQ, 2010.

R. Shoup, Scalability best practices -Lessons from eBay InfoQ http://www. infoq.com/articles/ebay-scalability-best-practices, 2008.

R. Shoup, More Best Practices from Large Scale Websites -Lessons from eBay. Talk at QCon San Francisco, p.2010, 2010.

D. Wei and C. Jiang, Frontend Performance Engineering in Facebook. O'Reilly Velocity , Web Performance and Operations Conference, 2009.

Q. Wei, Towards Improving the Availability and Performance of Enterprise Authorization Systems, 2009.