A. Armando, S. Ranise, R. Traverso, and K. Wrona, SMT-based Enforcement and Analysis of NATO Content-based Protection and Release Policies, Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, ABAC '16, pp.35-46, 2016.
DOI : 10.1016/j.jcs.2006.10.007

C. Bertolissi, D. Santos, D. R. Ranise, and S. , Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, pp.297-308, 2015.
DOI : 10.1023/A:1022883727209

D. De-capitani, S. Vimercati, S. Foresti, P. Samarati, and S. Jajodia, Access control policies and languages, International Journal of Computational Science and Engineering, vol.3, issue.2, pp.94-102, 2007.

D. Masellis, R. Ghidini, C. Ranise, and S. , A Declarative Framework for Specifying and??Enforcing Purpose-Aware Policies, International Workshop on Security and Trust Management, pp.55-71, 2015.
DOI : 10.1109/SP.2012.21

N. Ferry, H. Song, A. Rossini, F. Chauvel, and A. Solberg, CloudMF: Applying MDE to Tame the Complexity of Managing Multi-cloud Applications, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, pp.269-277, 2014.
DOI : 10.1109/UCC.2014.36

V. C. Hu, D. Ferraiolo, R. Kuhn, A. R. Friedman, A. J. Lang et al., Guide to attribute based access control (abac) definition and considerations (draft), NIST special publication, vol.800, issue.162, 2013.
DOI : 10.6028/nist.sp.800-162

X. Jin, R. Krishnan, and R. Sandhu, A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC, IFIP Annual Conference on Data and Applications Security and Privacy, pp.41-55, 2012.
DOI : 10.1145/501983.502004

URL : https://hal.archives-ouvertes.fr/hal-01534757

J. Perry, K. Arkoudas, J. Chiang, R. Chadha, D. Apgar et al., Modular natural language interfaces to logic-based policy frameworks, Computer Standards & Interfaces, vol.35, issue.5, pp.417-427, 2013.
DOI : 10.1016/j.csi.2013.02.002

B. Stepien, A. Felty, and S. Matwin, A Non-technical User-Oriented Display Notation for XACML Conditions, International Conference on E-Technologies, pp.53-64, 2009.
DOI : 10.1007/978-3-642-01187-0_5

URL : http://www.site.uottawa.ca/~afelty/dist/mcetech09.pdf

Z. Xu and S. D. Stoller, Mining attribute-based access control policies from rbac policies, Emerging Technologies for a Smarter World (CEWIT), 2013 10th International Conference and Expo on, pp.1-6, 2013.

Y. Zhang, F. Patwa, and R. Sandhu, Community-Based Secure Information and Resource Sharing in AWS Public Cloud, 2015 IEEE Conference on Collaboration and Internet Computing (CIC), pp.46-53, 2015.
DOI : 10.1109/CIC.2015.42

Y. Zhang, F. Patwa, R. Sandhu, and B. Tang, Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud, 2015 IEEE International Conference on Information Reuse and Integration, pp.419-426, 2015.
DOI : 10.1109/IRI.2015.71