V. Atluri and J. Warner, Supporting conditional delegation in secure workflow management systems, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.49-58, 2005.
DOI : 10.1145/1063979.1063990

E. Barka and R. Sandhu, Framework for role-based delegation models, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), pp.168-176, 2000.
DOI : 10.1109/ACSAC.2000.898870

E. Bertino, S. Castano, E. Ferrari, and M. Mesiti, Specifying and enforcing access control policies for XML document sources, pp.139-151, 2000.

D. W. Chadwick, A. Otenko, and P. X. The, The PERMIS X.509 role based privilege management infrastructure, Future Generation Computer Systems, vol.19, issue.2, pp.277-289, 2003.
DOI : 10.1016/S0167-739X(02)00153-X

D. W. Chadwick, S. Otenko, and T. Nguyen, Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains, Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference Proceedings, pp.67-86, 2006.
DOI : 10.3233/JCS-2003-11102

J. Crampton and H. Khambhammettu, « Delegation in Role-Based Access Control, Proceedings of the Computer Security -ESORICS 2006, 11th European Symposium on Research in Computer Security, pp.174-191, 2006.

K. Gaaloul, F. Charoy, A. Schaad, and H. Lee, « Collaboration for Human-Centric eGovernment Workflows », Web Information Systems Engineering, Proceedings of the WISE 2007 International Workshops, pp.201-212, 2007.

K. Gaaloul, A. Schaad, U. Flegel, and F. Charoy, A Secure Task Delegation Model for Workflows, 2008 Second International Conference on Emerging Security Information, Systems and Technologies, pp.10-15, 2008.
DOI : 10.1109/SECURWARE.2008.21

URL : https://hal.archives-ouvertes.fr/inria-00334755

T. Nguyen, L. Su, G. Inman, and D. W. Chadwick, Flexible and Manageable Delegation of Authority in RBAC, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp.453-458, 2007.
DOI : 10.1109/AINAW.2007.187

N. Russell, W. M. Van-der-aalst, A. H. Ter-hofstede, and D. Edmond, Workflow Resource Patterns: Identification, Representation and Tool Support, Proceedings of the Advanced Information Systems Engineering, 17th International Conference, pp.216-232, 2005.
DOI : 10.1007/11431855_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.5143

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Based Access Control Models, pp.38-47, 1996.
DOI : 10.1109/2.485845

A. Schaad, A framework for organisational control principles, 18th Annual Computer Security Applications Conference, 2002. Proceedings., 2003.
DOI : 10.1109/CSAC.2002.1176294

L. Seitz, E. Rissanen, T. Sandholm, B. S. Firozabadi, and O. Mulmo, Policy administration control and delegation using XACML and Delegent, The 6th IEEE/ACM International Workshop on Grid Computing, 2005., pp.49-54, 2005.
DOI : 10.1109/GRID.2005.1542723

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.360.2520

L. Zhang, G. Ahn, and B. Chu, A rule-based framework for role-based delegation and revocation, ACM Transactions on Information and System Security, vol.6, issue.3, pp.404-441, 2003.
DOI : 10.1145/937527.937530