Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, vol.13, issue.1, 2009. ,
DOI : 10.1145/1609956.1609962
A User-to-User Relationship-Based Access Control Model for Online Social Networks, Lecture Notes in Computer Science, vol.7371, pp.8-24, 2012. ,
DOI : 10.1145/363347.363387
URL : https://hal.archives-ouvertes.fr/hal-01534764
Path conditions and principal matching, Proceedings of the 19th ACM symposium on Access control models and technologies, SACMAT '14, pp.187-198, 2014. ,
DOI : 10.1145/2613087.2613094
URL : http://arxiv.org/pdf/1406.4988
Relationships, paths and principal matching: a new approach to access control, p.7945, 2015. ,
DOI : 10.1145/2613087.2613094
URL : http://arxiv.org/pdf/1406.4988
ARPPM: administration in the RPPM model, Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, pp.219-230, 2016. ,
Relationship-based access control, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.191-202, 2011. ,
DOI : 10.1145/1943513.1943539
Computational issues in secure interoperation, IEEE Transactions on Software Engineering, vol.22, issue.1, pp.43-52, 1996. ,
DOI : 10.1109/32.481533
Relationship-Based Access Control for an Open-Source Medical Records System, Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, SACMAT '15, pp.113-124, 2015. ,
DOI : 10.1145/2613087.2613098
Secure interoperation in a multidomain environment employing RBAC policies, IEEE Transactions on Knowledge and Data Engineering, vol.17, issue.11, pp.1557-1577185, 2005. ,
DOI : 10.1109/TKDE.2005.185
SERAT, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.159-167, 2005. ,
DOI : 10.1145/1063979.1064007
G ? ) 2: if G ? reachable then 3: G.h ? IdentifyLocalHubForLCP ,