L. Boursas and V. A. Danciu, Dynamic inter-organizational cooperation setup in Circle-of-Trust environments, NOMS 2008, 2008 IEEE Network Operations and Management Symposium, pp.113-120, 2008.
DOI : 10.1109/NOMS.2008.4575124

F. Cuppens, N. Cuppens-boulahia, and C. Coma, O2O: Virtual Private Organizations to Manage Security Policy Interoperability, Information Systems Security, pp.101-115, 2006.
DOI : 10.1007/11961635_7

D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001.
DOI : 10.1145/501978.501980

URL : http://csrc.nist.gov/rbac/rbacSTD-ACM.pdf

V. C. Hu and D. Ferraiolo, Guide to attribute based access control (ABAC) definition and considerations, NIST Special Publication, vol.800, p.162, 2014.
DOI : 10.6028/NIST.SP.800-162

V. C. Hu, D. R. Kuhn, and D. F. Ferraiolo, Attribute-Based Access Control, Computer, vol.48, issue.2, pp.85-88, 2015.
DOI : 10.1109/MC.2015.33

X. Jin, R. Sandhu, and R. Krishnan, RABAC: Role-Centric Attribute-Based Access Control, Computer Network Security, pp.84-96, 2012.
DOI : 10.1007/978-3-642-33704-8_8

D. R. Kuhn, E. J. Coyne, and T. R. Weil, Adding Attributes to Role-Based Access Control, Computer, vol.43, issue.6, pp.79-81, 2010.
DOI : 10.1109/MC.2010.155

U. Kylau, I. Thomas, M. Menzel, and C. Meinel, Trust Requirements in Identity Federation Topologies, 2009 International Conference on Advanced Information Networking and Applications, pp.137-145, 2009.
DOI : 10.1109/AINA.2009.80

Q. Li, X. Zhang, M. Xu, and J. Wu, Towards secure dynamic collaborations with group-based RBAC model, Computers & Security, vol.28, issue.5, pp.260-275, 2009.
DOI : 10.1016/j.cose.2008.12.004

P. Mell and T. Grance, The NIST definition of cloud computing, 2011.
DOI : 10.6028/NIST.SP.800-145

N. Pustchi, R. Krishnan, and R. Sandhu, Authorization Federation in IaaS Multi Cloud, Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC '15, pp.63-71, 2015.
DOI : 10.1145/775412.775431

N. Pustchi and R. Sandhu, MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust, Network and System Security, pp.206-220, 2015.
DOI : 10.1007/978-3-319-25645-0_14

R. Sandhu, The authorization leap from rights to attributes, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, pp.69-70, 2012.
DOI : 10.1145/2295136.2295150

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf

B. Tang and R. Sandhu, Cross-tenant trust models in cloud computing, 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI), pp.129-136, 2013.
DOI : 10.1109/IRI.2013.6642463

B. Tang, R. Sandhu, and Q. Li, Multi-tenancy authorization models for collaborative cloud services, Proc. of CTS, pp.132-138, 2013.
DOI : 10.1002/cpe.3446

J. Warner, V. Atluri, and R. Mukkamala, A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions, Data and Applications Security XIX, pp.252-266, 2005.
DOI : 10.1145/605434.605435

T. Wason, S. Cantor, J. Hodges, J. Kemp, and P. Thompson, Liberty id-ff architecture overview, 2004.

Z. Zhang, X. Zhang, and R. Sandhu, ROBAC: Scalable Role and Organization Based Access Control Models, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.1-9, 2006.
DOI : 10.1109/COLCOM.2006.361879