E. Barka and R. Sandhu, Framework for role-based delegation models, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), pp.168-176, 2000.
DOI : 10.1109/ACSAC.2000.898870

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.9343

D. W. Chadwick, S. Otenko, and T. Nguyen, Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains, Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference Proceedings, pp.67-86, 2006.
DOI : 10.3233/JCS-2003-11102

M. Contenti, M. Mecella, A. Termini, and R. Baldoni, A Distributed Architecture for Supporting e-Government Cooperative Processes, TCGOV, pp.181-192, 2005.
DOI : 10.1007/978-3-540-32257-3_17

J. Crampton and H. Khambhammettu, Delegation in role-based access control, Proceedings of the Computer Security -ESORICS 2006, 11th European Symposium on Research in Computer Security, pp.174-191, 2006.

J. Crampton and H. Khambhammettu, Delegation and satisfiability in workflow systems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.31-40, 2008.
DOI : 10.1145/1377836.1377842

K. Gaaloul, F. Charoy, A. Schaad, and H. Lee, Collaboration for Human-Centric eGovernment Workflows, Web Information Systems Engineering, Proceedings of the WISE 2007 International Workshops, pp.201-212, 2007.
DOI : 10.1007/978-3-540-77010-7_20

URL : https://hal.archives-ouvertes.fr/inria-00182290

K. Gaaloul, A. Schaad, U. Flegel, and F. Charoy, A Secure Task Delegation Model for Workflows, 2008 Second International Conference on Emerging Security Information, Systems and Technologies, pp.10-15, 2008.
DOI : 10.1109/SECURWARE.2008.21

URL : https://hal.archives-ouvertes.fr/inria-00334755

A. Hagstrom, S. Jajodia, F. Parisi-presicce, and D. Wijesekera, Revocations -a classification, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., p.44, 2001.
DOI : 10.1109/CSFW.2001.930135

C. Jensen and W. Scacchi, Collaboration, leadership, control, and conflict negotiation in the Netbeans.org community, "Collaboration, Conflict and Control: The 4th Workshop on Open Source Software Engineering" W8S Workshop, 26th International Conference on Software Engineering, 2004.
DOI : 10.1049/ic:20040264

E. T. Moses, eXtensible Access Control Markup Language (XACML) Version 2.0, OASIS. Last viewed on Mar R4eGov Technical Annex 1. Towards e-Administration in the large. SIXTH FRAMEWORK PROGRAMME, Information Society Technologies, 2006.

E. Rissanen and B. S. Firozabadi, Administrative Delegation in XACML, Swedish Institute of Computer Science

N. Russell, W. M. Van-der-aalst, A. H. Ter-hofstede, and D. Edmond, Workflow Resource Patterns: Identification, Representation and Tool Support, Proceedings of the Advanced Information Systems Engineering, 17th International Conference, pp.216-232, 2005.
DOI : 10.1007/11431855_16

A. Schaad, A Framework for Evidence Lifecycle Management, Web Information Systems Engineering, Proceedings of the WISE 2007 International Workshops, pp.191-200, 2007.
DOI : 10.1007/978-3-540-77010-7_19

A. Schaad, A framework for organisational control principles, 18th Annual Computer Security Applications Conference, 2002. Proceedings., 2003.
DOI : 10.1109/CSAC.2002.1176294

K. A. Schulz and M. E. Orlowska, Facilitating cross-organisational workflows with a workflow view approach, Data & Knowledge Engineering, vol.51, issue.1, pp.109-147, 2004.
DOI : 10.1016/j.datak.2004.03.008

. Staffware, Staffware Process Suite Defining Staffware Procedures Issue 2. Staffware plc, 2002.

R. Traunmüller and M. Wimmer, e-Government at a Decisive Moment: Sketching a Roadmap to Excellence, Lecture Notes in Computer Science, vol.3183, 2004.
DOI : 10.1007/10929179_1

C. Wolter, H. Plate, and C. Herbert, Collaborative Workflow Management for eGovernment, 18th International Conference on Database and Expert Systems Applications (DEXA 2007), 2007.
DOI : 10.1109/DEXA.2007.15

L. Zhang, G. Ahn, and B. Chu, A rule-based framework for role-based delegation and revocation, ACM Transactions on Information and System Security, vol.6, issue.3, pp.404-441, 2003.
DOI : 10.1145/937527.937530