B. Carminati, E. Ferrari, and A. Perego, Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, vol.13, issue.1, 2009.
DOI : 10.1145/1609956.1609962

Y. Cheng, J. Park, and R. S. Sandhu, A User-to-User Relationship-Based Access Control Model for Online Social Networks, Proc. 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), pp.8-24, 2012.
DOI : 10.1145/363347.363387

URL : https://hal.archives-ouvertes.fr/hal-01534764

J. Crampton and J. Sellwood, Caching and Auditing in the RPPM Model, Proc. 10th International Workshop on Security and Trust Management STM. Security and Cryptology, pp.49-64, 2014.
DOI : 10.1007/978-3-319-11851-2_4

J. Crampton and J. Sellwood, Path conditions and principal matching, Proceedings of the 19th ACM symposium on Access control models and technologies, SACMAT '14, pp.187-198, 2014.
DOI : 10.1145/2613087.2613094

URL : http://arxiv.org/pdf/1406.4988

P. W. Fong, Relationship-based access control, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.191-202, 2011.
DOI : 10.1145/1943513.1943539

P. W. Fong, M. Anwar, and Z. Zhao, A Privacy Preservation Model for Facebook-Style Social Network Systems, Proc. 14th European Symposium on Research In Computer Security (ESORICS'09, pp.303-320, 2009.
DOI : 10.1145/1609956.1609962

URL : http://www.cpsc.ucalgary.ca/~pwlfong/Pub/esorics2009.pdf

P. W. Fong and I. Siahaan, Relationship-based access control policies and their policy languages, Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pp.51-60, 2011.
DOI : 10.1145/1998441.1998450

C. E. Gates, Access control requirements for Web 2.0 security and privacy, IEEE Web 2.0 Security & Privacy Workshop, 2007.

P. Gupta, Verification of Security Policy Administration and Enforcement in Enterprise Systems, p.59677, 1951.

P. Gupta, S. D. Stoller, and Z. Xu, Abductive analysis of administrative policies in rule-based access control, IEEE Transactions on Dependable and Secure Computing, 2014.

H. Hu, G. J. Ahn, and J. Jorgensen, Multiparty Access Control for Online Social Networks: Model and Mechanisms, IEEE Transactions on Knowledge and Data Engineering, vol.25, issue.7, pp.1614-1627, 2013.
DOI : 10.1109/TKDE.2012.97

URL : http://sefcom.asu.edu/publications/multiparty-access-control-tkde2013.pdf

N. Li and Z. Mao, Administration in role-based access control, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, pp.127-138, 2007.
DOI : 10.1145/1229285.1229305

Y. A. Liu and S. D. Stoller, Querying Complex Graphs, Proc. Eighth International Symposium on Practical Aspects of Declarative Languages (PADL), pp.199-214, 2006.
DOI : 10.1007/11603023_14

URL : http://ftp.cs.sunysb.edu/pub/liu/GraphQL-PADL06.pdf

J. H. Saltzer and M. D. Schroeder, The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, 1974.
DOI : 10.1109/PROC.1975.9939

R. Sandhu, V. Bhamidipati, and Q. Munawer, The ARBAC97 model for role-based administration of roles, ACM Transactions on Information and System Security, vol.2, issue.1, pp.105-135, 1999.
DOI : 10.1145/300830.300839