U. V. Albrecht, Transparency of Health-Apps for Trust and Decision Making, Journal of Medical Internet Research, vol.2, issue.2 Suppl, p.277, 2013.
DOI : 10.2196/jmir.2446

URL : http://doi.org/10.2196/jmir.2981

S. Damen, J. Den-hartog, and N. Zannone, CollAC: Collaborative access control, 2014 International Conference on Collaboration Technologies and Systems (CTS), pp.142-149, 2014.
DOI : 10.1109/CTS.2014.6867557

S. Damen and N. Zannone, Privacy Implications of Privacy Settings and Tagging in Facebook, LNCS, vol.8425, pp.121-138, 2013.
DOI : 10.1007/978-3-319-06811-4_16

J. De-fine-licht, Transparency actually: how transparency affects public perceptions of political decision-making, European Political Science Review, vol.14, issue.02, pp.309-330, 2014.
DOI : 10.1111/j.1467-9477.2011.00268.x

S. K. Ghai, P. Nigam, and P. Kumaraguru, Cue, Proceedings of the 3rd ACM workshop on Assurable and usable security configuration, SafeConfig '10, pp.9-16, 2010.
DOI : 10.1145/1866898.1866901

P. Guarda and N. Zannone, Towards the development of privacy-aware systems, Information and Software Technology, vol.51, issue.2, pp.337-350, 2009.
DOI : 10.1016/j.infsof.2008.04.004

H. Hu, G. J. Ahn, and J. Jorgensen, Multiparty Access Control for Online Social Networks: Model and Mechanisms, IEEE Transactions on Knowledge and Data Engineering, vol.25, issue.7, pp.1614-1627, 2013.
DOI : 10.1109/TKDE.2012.97

URL : http://sefcom.asu.edu/publications/multiparty-access-control-tkde2013.pdf

S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian, Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001.
DOI : 10.1145/383891.383894

A. Joshi, L. Bollen, and H. Hassink, An Empirical Assessment of IT Governance Transparency: Evidence from Commercial Banking, Information Systems Management, vol.11, issue.3, pp.116-136, 2013.
DOI : 10.1080/07421222.2004.11045797

S. P. Kaluvuri, A. I. Egner, J. Den-hartog, and N. Zannone, SAFAX ???????? An Extensible Authorization Service for Cloud Environments, Frontiers in ICT, vol.19, issue.9, 2015.
DOI : 10.1016/j.jisa.2014.04.003

URL : https://doi.org/10.3389/fict.2015.00009

N. Li, Q. Wang, W. Qardaji, E. Bertino, P. Rao et al., Access control policy combining, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.135-144, 2009.
DOI : 10.1145/1542207.1542229

I. Matteucci, P. Mori, and M. Petrocchi, Prioritized Execution of Privacy Policies, LNCS, vol.7731, pp.133-145, 2012.
DOI : 10.1007/978-3-642-35890-6_10

R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, and K. Vaniea, Effects of access-control policy conflict-resolution methods on policy-authoring usability, p.12, 2009.

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf

H. Shen and P. Dewan, Access control for collaborative environments, Proceedings of the 1992 ACM conference on Computer-supported cooperative work , CSCW '92, pp.51-58, 1992.
DOI : 10.1145/143457.143461

URL : http://www.cs.purdue.edu/serc/TechReports/abstracts/catagory/../../files/TR123P.PS

A. C. Squicciarini, M. Shehab, and F. Paci, Collective privacy management in social networks, Proceedings of the 18th international conference on World wide web, WWW '09, pp.521-530, 2009.
DOI : 10.1145/1526709.1526780

URL : http://www.sis.uncc.edu/%7Emshehab/papers/www09.pdf

R. K. Thomas, Team-based access control (TMAC), Proceedings of the second ACM workshop on Role-based access control , RBAC '97, pp.13-19, 1997.
DOI : 10.1145/266741.266748

R. K. Thomas and R. S. Sandhu, Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management, pp.166-181, 1997.
DOI : 10.1007/978-0-387-35285-5_10

W. Tolone, G. J. Ahn, T. Pai, and S. P. Hong, Access control in collaborative systems, ACM Computing Surveys, vol.37, issue.1, pp.29-41, 2005.
DOI : 10.1145/1057977.1057979