M. A. Al-kahtani and R. Sandhu, A model for attribute-based user-role assignment, 18th Annual Computer Security Applications Conference, 2002. Proceedings., pp.353-362, 2002.
DOI : 10.1109/CSAC.2002.1176307

A. Armando, M. Bezzi, N. Metoui, and A. Sabetta, Risk-Based Privacy-Aware Information Disclosure, International Journal of Secure Software Engineering, vol.6, issue.2, pp.70-89, 2015.
DOI : 10.4018/IJSSE.2015040104

N. Badar, J. Vaidya, V. Atluri, and B. Shafiq, Risk Based Access Control Using Classification, pp.79-95, 2013.
DOI : 10.1007/978-3-319-01433-3_5

M. Barhamgi, D. Benslimane, S. Oulmakhzoune, N. Cuppens-boulahia, F. Cuppens et al., Secure and Privacy-Preserving Execution Model for Data Services, Proc. of CAISE, pp.35-50, 2013.
DOI : 10.1007/978-3-642-38709-8_3

URL : https://hal.archives-ouvertes.fr/hal-00960863

P. Colombo and E. Ferrari, Complementing mongodb with advanced access control features: Concepts and research challenges, Proc. of SEBD, p.2015, 2015.
DOI : 10.1109/tdsc.2015.2497680

P. Colombo and E. Ferrari, Privacy Aware Access Control for Big Data: A Research Roadmap, Big Data Research, vol.2, issue.4, pp.145-154, 2015.
DOI : 10.1016/j.bdr.2015.08.001

P. Derbeko, S. Dolev, E. Gudes, and S. Sharma, Security and privacy aspects in MapReduce on clouds: A survey, Computer Science Review, vol.20, pp.1-28, 2016.
DOI : 10.1016/j.cosrev.2016.05.001

D. Vimercati, S. D. Foresti, S. Paraboschi, S. Pelosi, G. Samarati et al., Protecting Access Confidentiality with Data Distribution and Swapping, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, pp.167-174, 2014.
DOI : 10.1109/BDCloud.2014.59

D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001.
DOI : 10.1145/501978.501980

URL : http://csrc.nist.gov/rbac/rbacSTD-ACM.pdf

M. Gupta, F. Patwa, J. Benson, and R. Sandhu, Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies , SACMAT '17 Abstracts, 2017.
DOI : 10.1109/2.485845

M. Gupta, F. Patwa, and R. Sandhu, POSTER, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies , SACMAT '17 Abstracts, 2017.
DOI : 10.1109/BigData.Congress.2014.16

M. Gupta and R. Sandhu, The GURAG administrative model for user and group attribute assignment, Proc. of NSS, pp.318-332, 2016.

A. C. Hsu and I. Ray, Specification and Enforcement of Location-Aware Attribute-Based Access Control for Online Social Networks, Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, ABAC '16, pp.25-34, 2016.
DOI : 10.1109/TNET.2006.886332

V. C. Hu, T. Grance, D. F. Ferraiolo, and D. R. Kuhn, An Access Control Scheme for Big Data Processing, Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.1-7, 2014.
DOI : 10.4108/icst.collaboratecom.2014.257649

V. C. Hu, D. R. Kuhn, and D. F. Ferraiolo, Attribute-Based Access Control, Computer, vol.48, issue.2, pp.85-88, 2015.
DOI : 10.1109/MC.2015.33

X. Jin, R. Krishnan, and R. Sandhu, A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC, Proc. of IFIP DBSec, pp.41-55, 2012.
DOI : 10.1145/501983.502004

URL : https://hal.archives-ouvertes.fr/hal-01534757

X. Jin, R. Sandhu, and R. Krishnan, RABAC: Role-Centric Attribute-Based Access Control, Proc. of MMM-ACNS, pp.84-96, 2012.
DOI : 10.1007/978-3-642-33704-8_8

L. Krautsevich, A. Lazouski, F. Martinelli, and A. Yautsiukhin, Towards attributebased access control policy engineering using risk, Proc. of RISK, pp.80-90, 2013.
DOI : 10.1007/978-3-319-07076-6_6

D. R. Kuhn, E. J. Coyne, and T. R. Weil, Adding Attributes to Role-Based Access Control, Computer, vol.43, issue.6, pp.79-81, 2010.
DOI : 10.1109/MC.2010.155

H. Lu, Y. Hong, Y. Yang, L. Duan, and N. Badar, Towards user-oriented RBAC model, Journal of Computer Security, vol.17, issue.2, pp.107-129, 2015.
DOI : 10.3233/JCS-2009-0341

URL : https://hal.archives-ouvertes.fr/hal-01490719

R. Lu, H. Zhu, X. Liu, J. K. Liu, and J. Shao, Toward efficient and privacy-preserving computing in big data era, IEEE Network, vol.28, issue.4, pp.46-50, 2014.
DOI : 10.1109/MNET.2014.6863131

F. Moyano, C. Fernandez-gago, and J. Lopez, A Conceptual Framework for Trust Models, Proc. of TrustBus, pp.93-104, 2012.
DOI : 10.1007/978-3-642-32287-7_8

D. Nunez, I. Agudo, and J. Lopez, Delegated Access for Hadoop Clusters in the Cloud, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, pp.374-379, 2014.
DOI : 10.1109/CloudCom.2014.50

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

URL : http://www.list.gmu.edu/journals/computer/pdf_ver/i93lbacm.pdf

J. Sänger, C. Richthammer, S. Hassan, and G. Pernul, Trust and Big Data: A Roadmap for Research, 2014 25th International Workshop on Database and Expert Systems Applications, pp.278-282, 2014.
DOI : 10.1109/DEXA.2014.63

D. Servos and S. L. Osborn, HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control, International Symposium on Foundations and Practice of Security, pp.187-204, 2014.
DOI : 10.1007/978-3-319-17040-4_12

P. P. Sharma and C. P. Navdeti, Securing big data Hadoop: a review of security issues, threats and solution, IJCSIT, vol.5, 2014.

J. Soria-comas and J. Domingo-ferrer, Big Data Privacy: Challenges to Privacy Principles and Models, Data Science and Engineering, vol.23, issue.5, pp.21-28, 2016.
DOI : 10.1145/2588555.2588573

O. Tene and J. Polonetsky, Big data for all: Privacy and user control in the age of analytics, Nw. J. Tech. & Intell. Prop, vol.11, p.xxvii, 2012.

H. Ulusoy, P. Colombo, E. Ferrari, M. Kantarcioglu, and E. Pattuk, GuardMR, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, pp.285-296, 2015.
DOI : 10.1145/2535505

H. Ulusoy, M. Kantarcioglu, E. Pattuk, and K. Hamlen, Vigiles: Fine-Grained Access Control for MapReduce Systems, 2014 IEEE International Congress on Big Data, pp.40-47, 2014.
DOI : 10.1109/BigData.Congress.2014.16

S. D. Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, and P. Samarati, Shuffle Index, ACM Transactions on Storage, vol.11, issue.4, p.19, 2015.
DOI : 10.1007/978-3-642-23822-2_29

URL : https://hal.archives-ouvertes.fr/hal-01633667

L. Wang, D. Wijesekera, and S. Jajodia, A logic-based framework for attribute based access control, Proceedings of the 2004 ACM workshop on Formal methods in security engineering , FMSE '04, pp.45-55, 2004.
DOI : 10.1145/1029133.1029140

URL : http://users.encs.concordia.ca/~wang/papers/fmse04.pdf

T. White, Hadoop: The Definitive Guide, 2012.

K. Wrona, S. Oudkerk, A. Armando, S. Ranise, R. Traverso et al., Assisted content-based labelling and classification of documents, 2016 International Conference on Military Communications and Information Systems (ICMCIS), pp.1-7, 2016.
DOI : 10.1109/ICMCIS.2016.7496589

S. Yu, C. Wang, K. Ren, and W. Lou, Attribute based data sharing with attribute revocation, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.261-270, 2010.
DOI : 10.1145/1755688.1755720

J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun et al., A security framework in G-Hadoop for big data computing across distributed Cloud data centres, Journal of Computer and System Sciences, vol.80, issue.5, pp.994-1007, 2014.
DOI : 10.1016/j.jcss.2014.02.006