S. Akhtar, S. Merz, and M. Quinson, A High-Level Language for Modeling Algorithms and Their Properties, 13th Brazilian Symp. on Formal Methods, 2010.
DOI : 10.1007/3-540-48153-2_6

URL : https://hal.archives-ouvertes.fr/inria-00537779

R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, Persona: an online social network with user-defined privacy, SIGCOMM, 2009.

A. Bouchami, O. Perrin, and E. Zahoor, Trust-Based Formal Delegation Framework for Enterprise Social Networks, 2015 IEEE Trustcom/BigDataSE/ISPA, 2015.
DOI : 10.1109/Trustcom.2015.366

URL : https://hal.archives-ouvertes.fr/hal-01240387

E. M. Clarke, Orna Grumberg, and Doron Peled. Model Checking, 1999.

F. Liang, An attributes-based access control architecture within largescale device collaboration systems using xacml, Green Communications and Networks, 2012.
DOI : 10.1007/978-94-007-2169-2_124

T. Wu, A distributed collaborative product design environment based on semantic norm model and role-based access control, Journal of Network and Computer Applications, vol.36, issue.6, 2013.
DOI : 10.1016/j.jnca.2013.02.018

N. Tuan and . Nguyen, Towards a flexible framework to support a generalized extension of xacml for spatio-temporal rbac model with reasoning ability, ICCSA, p.2013

C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas, Flexible team-based access control using contexts, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, 2001.
DOI : 10.1145/373256.373259

URL : http://infolab.gen.auth.gr/Phd/mavridis/SACMAT2001.pdf

D. Hardt, The oauth 2.0 authorization framework, 2012.
DOI : 10.17487/rfc6749

C. Vincent, D. Hu, R. Ferraiolo, A. Kuhn, K. Schnitzer et al., Guide to attribute based access control (abac) definition and considerations, NIST Special Publication, vol.800, p.162, 2014.

V. Kolovski, J. A. Hendler, and B. Parsia, Analyzing web access control policies, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.677-686, 2007.
DOI : 10.1145/1242572.1242664

L. Lamport, Specifying Systems, The TLA+ Language and Tools for Hardware and Software Engineers, 2002.

L. Lamport, The PlusCal Algorithm Language, 6th Intl. Coll. Theoretical Aspects of Computing, 2009.
DOI : 10.1145/359576.359585

K. Hannah, H. Lee, and . Luedemann, lightweight decentralized authorization model for inter-domain collaborations, SWS, 2007.

S. Joon, R. S. Park, G. Sandhu, and . Ahn, Role-based access control on the web, ACM Trans. Inf. Syst. Secur, vol.4, issue.1, pp.37-71, 2001.

C. Ruan and V. Varadharajan, Dynamic delegation framework for role based access control in distributed data management systems, Distributed and Parallel Databases, vol.2, issue.1, 2014.
DOI : 10.1145/300830.300839

G. Stei, S. Sprenger, and A. Rossmann, Enterprise Social Networks: Status Quo of Current Research and Future Research Directions, 2016.
DOI : 10.1002/bltj.21648

R. K. Thomas and R. S. Sandhu, Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management, DBSec, 1997.
DOI : 10.1007/978-0-387-35285-5_10

K. Roshan and . Thomas, Team-based access control (tmac): a primitive for applying role-based access controls in collaborative environments, ACM Workshop on Role-Based Access Control, pp.13-19, 1997.

A. Tootoonchian, S. Saroiu, Y. Ganjali, and A. Wolman, Lockr, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09, 2009.
DOI : 10.1145/1658939.1658959

P. Tsankov, S. Marinovic, M. T. Dashti, and D. A. Basin, Decentralized Composite Access Control, 2014.
DOI : 10.1007/978-3-642-54792-8_14

URL : http://people.inf.ethz.ch/basin/pubs/post14.pdf

Y. Yu, P. Manolios, and L. Lamport, Model Checking TLA+ Specifications, Correct Hardware Design and Verification Methods (CHARME'99), 1999.
DOI : 10.1007/3-540-48153-2_6

URL : http://www.cc.gatech.edu/fac/Pete.Manolios/pub/charme-proceedings.ps.gz

E. Zahoor, Z. Asma, and O. Perrin, A Formal Approach for the Verification of AWS IAM Access Control Policies, 6th European Conference on Service-Oriented and Cloud Computing, pp.59-74, 2017.
DOI : 10.1109/ICWS.2011.97

URL : https://hal.archives-ouvertes.fr/hal-01677620

E. Zahoor, O. Perrin, and A. Bouchami, CATT: A Cloud Based Authorization Framework with Trust and Temporal Aspects, Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing
DOI : 10.4108/icst.collaboratecom.2014.257312

URL : https://hal.archives-ouvertes.fr/hal-01103043