B. Carminati, E. Ferrari, and A. Perego, Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, vol.13, issue.1, 2009.
DOI : 10.1145/1609956.1609962

Y. Cheng, J. Park, and R. S. Sandhu, A User-to-User Relationship-Based Access Control Model for Online Social Networks, Lecture Notes in Computer Science, vol.7371, pp.8-24, 2012.
DOI : 10.1145/363347.363387

URL : https://hal.archives-ouvertes.fr/hal-01534764

J. Crampton, J. Sellwood, S. L. Osborn, M. V. Tripunitara, and I. Molloy, Path conditions and principal matching, Proceedings of the 19th ACM symposium on Access control models and technologies, SACMAT '14, pp.187-198, 2014.
DOI : 10.1145/2613087.2613094

URL : http://arxiv.org/pdf/1406.4988

J. Crampton and J. Sellwood, Relationships, paths and principal matching: a new approach to access control, p.7945, 2015.
DOI : 10.1145/2613087.2613094

URL : http://arxiv.org/pdf/1406.4988

J. Crampton, J. Sellwood, E. Bertino, R. Sandhu, and A. Pretschner, ARPPM: administration in the RPPM model, Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, pp.219-230, 2016.

P. W. Fong, Relationship-based access control, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.191-202, 2011.
DOI : 10.1145/1943513.1943539

L. Gong and X. Qian, Computational issues in secure interoperation, IEEE Transactions on Software Engineering, vol.22, issue.1, pp.43-52, 1996.
DOI : 10.1109/32.481533

S. Z. Rizvi, P. W. Fong, J. Crampton, and J. Sellwood, Relationship-Based Access Control for an Open-Source Medical Records System, Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, SACMAT '15, pp.113-124, 2015.
DOI : 10.1145/2613087.2613098

B. Shafiq, J. Joshi, E. Bertino, and A. Ghafoor, Secure interoperation in a multidomain environment employing RBAC policies, IEEE Transactions on Knowledge and Data Engineering, vol.17, issue.11, pp.1557-1577185, 2005.
DOI : 10.1109/TKDE.2005.185

M. Shehab, E. Bertino, and A. Ghafoor, SERAT, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.159-167, 2005.
DOI : 10.1145/1063979.1064007

L. G. and G. Determineleastcostpathtosystemgraph, G ? ) 2: if G ? reachable then 3: G.h ? IdentifyLocalHubForLCP