S. Yu, C. Wang, K. Ren, and W. Lou, Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, 2010 Proceedings IEEE INFOCOM, pp.2010-534
DOI : 10.1109/INFCOM.2010.5462174

Y. Zhu, D. Huang, C. Hu, and X. Wang, From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services, IEEE Transactions on Services Computing, vol.8, issue.4, pp.601-616, 2015.
DOI : 10.1109/TSC.2014.2363474

K. Yang and X. Jia, Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.7, pp.1735-1744, 2014.
DOI : 10.1109/TPDS.2013.253

H. He, R. Li, X. Dong, and Z. Zhang, Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud, IEEE Transactions on Cloud Computing, vol.2, issue.4, pp.471-484, 2014.
DOI : 10.1109/TCC.2014.2378788

W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud, IEEE Transactions on Parallel and Distributed Systems, vol.27, issue.4, pp.1187-1198, 2016.
DOI : 10.1109/TPDS.2014.2355202

J. S. Park, R. S. Sandhu, and G. J. Ahn, Role-based access control on the web, ACM Transactions on Information and System Security, vol.4, issue.1, pp.37-71, 2001.
DOI : 10.1145/383775.383777

A. Elliott and S. Knight, Role explosion: Acknowledging the problem, Proceedings of the 2010 International Conference on Software Engineering Research & Practice, SERP 2010, pp.349-355, 2010.

E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti, drbac: Distributed role-based access control for dynamic coalition environments, In: ICDCS, pp.411-420, 2002.
DOI : 10.21236/ada440599

URL : http://rlab.cs.utep.edu/~freudent/homepage/pubs/icdcs02-drbac.pdf

T. Wu, X. Pei, Y. Lu, C. Chen, and L. Gao, A distributed collaborative product design environment based on semantic norm model and role-based access control, Journal of Network and Computer Applications, vol.36, issue.6
DOI : 10.1016/j.jnca.2013.02.018

C. Ruan and V. Varadharajan, Dynamic delegation framework for role based access control in distributed data management systems, Distributed and Parallel Databases, vol.2, issue.1, pp.245-269, 2014.
DOI : 10.1145/300830.300839

H. K. Lee and H. Luedemann, lightweight decentralized authorization model for interdomain collaborations, In: SWS, pp.83-89, 2007.
DOI : 10.1145/1314418.1314431

V. C. Hu, D. Ferraiolo, R. Kuhn, A. Schnitzer, K. Sandlin et al., Guide to attribute based access control (abac) definition and considerations, NIST Special Publication, vol.800, p.162, 2014.
DOI : 10.6028/NIST.SP.800-162

J. Bryans, Reasoning about XACML policies using CSP, Proceedings of the 2005 workshop on Secure web services , SWS '05, pp.28-35, 2005.
DOI : 10.1145/1103022.1103028

URL : http://www.cs.ncl.ac.uk/research/pubs/trs/papers/924.pdf

T. N. Nguyen, K. T. Thi, A. T. Dang, H. D. Van, and T. K. Dang, Towards a Flexible Framework to Support a Generalized Extension of XACML for Spatio-temporal RBAC Model with Reasoning Ability, p.ICCSA, 2013.
DOI : 10.1007/978-3-642-39640-3_32

V. Kolovski, J. A. Hendler, and B. Parsia, Analyzing web access control policies, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.677-686, 2007.
DOI : 10.1145/1242572.1242664

F. Liang, H. Guo, S. Yi, X. Zhang, and S. Ma, An Attributes-Based Access Control Architecture within Large-Scale Device Collaboration Systems Using XACML, pp.1051-1059, 2012.
DOI : 10.1007/978-94-007-2169-2_124

P. Tsankov, S. Marinovic, M. T. Dashti, and D. A. Basin, Decentralized Composite Access Control, 2014.
DOI : 10.1007/978-3-642-54792-8_14

URL : http://people.inf.ethz.ch/basin/pubs/post14.pdf

D. Hardt, The oauth 2.0 authorization framework, 2012.
DOI : 10.17487/rfc6749

A. Tootoonchian, S. Saroiu, Y. Ganjali, and A. Wolman, Lockr, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09, 2009.
DOI : 10.1145/1658939.1658959

C. Newcombe, T. Rath, F. Zhang, B. Munteanu, M. Brooker et al., How Amazon web services uses formal methods, Communications of the ACM, vol.58, issue.4, 2015.
DOI : 10.1145/2185376.2185383

E. Zahoor, O. Perrin, and A. Bouchami, CATT: A Cloud Based Authorization Framework with Trust and Temporal Aspects, Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.285-294, 2014.
DOI : 10.4108/icst.collaboratecom.2014.257312

URL : https://hal.archives-ouvertes.fr/hal-01103043

A. Bouchami, O. Perrin, and E. Zahoor, Trust-Based Formal Delegation Framework for Enterprise Social Networks, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.127-134, 2015.
DOI : 10.1109/Trustcom.2015.366

URL : https://hal.archives-ouvertes.fr/hal-01240387

M. Montali, F. M. Maggi, F. Chesani, P. Mello, and W. M. Aalst, Monitoring business constraints with the event calculus, ACM Transactions on Intelligent Systems and Technology, vol.5, issue.1, pp.1-1730, 2014.
DOI : 10.1145/2542182.2542199

R. A. Kowalski and M. J. Sergot, A logic-based calculus of events, New Generation Comput, vol.4, issue.1, 1986.

E. T. Mueller, Commonsense Reasoning, 2006.

E. Zahoor, O. Perrin, and C. Godart, An Event-Based Reasoning Approach to Web Services Monitoring, 2011 IEEE International Conference on Web Services, 2011.
DOI : 10.1109/ICWS.2011.97

URL : https://hal.archives-ouvertes.fr/inria-00596461