A. Armando, SMT-based Enforcement and Analysis of NATO Content-based Protection and Release Policies, Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, ABAC '16, pp.35-46, 2016.
DOI : 10.1016/j.jcs.2006.10.007

P. Biswas, R. Sandhu, and R. Krishnan, Label-Based Access Control, Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, ABAC '16, 2016.
DOI : 10.1145/1029133.1029140

URL : http://dl.acm.org/ft_gateway.cfm?id=2875498&type=pdf

P. Bonatti and P. Samarati, Regulating service access and information release on the Web, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.134-143, 2000.
DOI : 10.1145/352600.352620

E. Damiani, S. D. Di-vimercati, and P. Samarati, New paradigms for access control in open environments, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005., 2005.
DOI : 10.1109/ISSPIT.2005.1577155

D. Ferraiolo, The Policy Machine: A novel architecture and framework for access control policy specification and enforcement, Journal of Systems Architecture, vol.57, issue.4, pp.412-424, 2011.
DOI : 10.1016/j.sysarc.2010.04.005

V. C. Hu, Guide to attribute based access control (ABAC) definition and considerations, NIST Special Publication, vol.800, p.162, 2014.
DOI : 10.6028/NIST.SP.800-162

X. Jin, R. Krishnan, and R. S. Sandhu, A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC, pp.41-55, 2012.
DOI : 10.1145/501983.502004

URL : https://hal.archives-ouvertes.fr/hal-01534757

B. Lang, A Flexible Attribute Based Access Control Method for Grid Computing, Journal of Grid Computing, vol.19, issue.2, pp.169-180, 2009.
DOI : 10.3233/JCS-2002-10303

T. Moses, Extensible access control markup language (XACML) version 2.0. Oasis Standard, 2005.

J. Park and R. Sandhu, The UCON ABC usage control model, TISSEC, 2004.

T. Priebe, W. Dobmeier, and N. Kamprath, Supporting attribute-based access control with ontologies, First International Conference on Availability, Reliability and Security (ARES'06), p.8, 2006.
DOI : 10.1109/ARES.2006.127

R. S. Sandhu, Lattice-based access control models, Computer, vol.26, issue.11, pp.9-19, 1993.
DOI : 10.1109/2.241422

URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf

R. S. Sandhu and P. Samarati, Access control: principle and practice, IEEE Communications Magazine, vol.32, issue.9, pp.40-48, 1994.
DOI : 10.1109/35.312842

D. Servos and S. L. Osborn, HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control, FPS, pp.187-204, 2014.
DOI : 10.1007/978-3-319-17040-4_12

H. Shen and F. Hong, An Attribute-Based Access Control Model for Web Services, 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), pp.74-79, 2006.
DOI : 10.1109/PDCAT.2006.28

M. V. Tripunitara and N. Li, A theory for comparing the expressive power of access control models1, Journal of Computer Security, vol.15, issue.2, pp.231-272, 2007.
DOI : 10.3233/JCS-2007-15202

L. Wang, D. Wijesekera, and S. Jajodia, A logic-based framework for attribute based access control, Proceedings of the 2004 ACM workshop on Formal methods in security engineering , FMSE '04, pp.45-55, 2004.
DOI : 10.1145/1029133.1029140

URL : http://users.encs.concordia.ca/~wang/papers/fmse04.pdf

E. Yuan and J. Tong, Attributed based access control (ABAC) for Web services, IEEE International Conference on Web Services (ICWS'05), 2005.
DOI : 10.1109/ICWS.2005.25