D. King, T. Jaeger, S. Jha, and S. A. Seshia, Effective blame for information-flow violations, Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, SIGSOFT '08/FSE-16, pp.250-260, 2008.
DOI : 10.1145/1453101.1453135

M. Abadi, M. Burrows, B. Lampson, and G. Plotkin, A calculus for access control in distributed systems, ACM Transactions on Programming Languages and Systems, vol.15, issue.4, pp.706-734, 1993.
DOI : 10.1145/155183.155225

S. Abiteboul, R. Hull, and V. Vianu, Foundations of Databases: The Logical Level, 1995.

R. Agrawal, P. J. Haas, and J. Kiernan, Watermarking relational data: framework, algorithms and analysis, The VLDB Journal, vol.12, pp.157-169, 2003.

R. Agrawal and J. Kiernan, Watermarking Relational Databases, VLDB, pp.155-166, 2002.
DOI : 10.1016/B978-155860869-6/50022-6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.9696

B. Agreiter, M. Alam, R. Breu, M. Hafner, A. Pretschner et al., A technical architecture for enforcing usage control requirements in serviceoriented architectures, SWS, pp.18-25, 2007.

R. Bechara-al-bouna, S. Chbeir, and . Marrara, A multimedia access control language for virtual and ambient intelligence environments, SWS '07: Proceedings of the 2007 ACM workshop on Secure web services, pp.111-120, 2007.

M. Alam, J. Seifert, Q. Li, and X. Zhang, Usage control platformization via trustworthy SELinux, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.245-248, 2008.
DOI : 10.1145/1368310.1368345

. Christopher, A. Alberts, J. Dorofee, C. Stevens, and . Woody, Introduction to the octave R ? approach, 2003.

M. Assel, S. Wesner, and A. Kipp, A security framework for dynamic collaborative working environments, Identity in the Information Society, vol.18, issue.4, pp.171-187, 1007.
DOI : 10.1007/s12394-009-0027-1

F. Baader, I. Horrocks, and U. Sattler, Description Logics as Ontology Languages for the Semantic Web, Festschrift in honor of Jörg Siekmann, pp.228-248
DOI : 10.1007/978-3-540-32254-2_14

P. Balbiani, J. Broersen, and J. Brunel, Decision Procedures for a Deontic Logic Modeling Temporal Inheritance of Obligations, Electronic Notes in Theoretical Computer Science, vol.231, pp.69-89, 2009.
DOI : 10.1016/j.entcs.2009.02.030

S. Bandhakavi, C. C. Zhang, and M. Winslett, Supersticky and declassifiable release policies for flexible information dissemination control, these.pdf © [Z. Su] WPES '06: Proceedings of the 5th ACM workshop on Privacy in electronic society, pp.51-58, 2006.

M. Bartoletti, P. Degano, G. L. Ferrari, and R. Zunino, Model checking usage policies, pp.19-35, 2009.
DOI : 10.1007/978-3-642-00945-7_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.1671

A. Bauer and J. Juerjens, Security protocols, properties, and their monitoring, Proceedings of the fourth international workshop on Software engineering for secure systems , SESS '08, pp.33-40, 2008.
DOI : 10.1145/1370905.1370910

E. Becker and W. Buhse, Digital Rights Management -Technological, Economic, Legal and Political Aspects, Lecture Notes in Computer Science, vol.2770, 2003.

Y. Moritz, P. Becker, and . Sewell, Cassandra: Flexible trust management , applied to electronic health records, CSFW '04: Proceedings of the 17th IEEE workshop on Computer Security Foundations, 2004.

R. Bedi, A. Thengade, and W. M. Vijay, A New Watermarking Approach for Non numeric Relational Database, International Journal of Computer Applications, vol.13, issue.7, pp.37-40, 2011.
DOI : 10.5120/1790-2473

URL : http://doi.org/10.5120/1790-2473

M. Ben-ghorbel-talbi, Frédéric Cuppens, Nora Cuppens- Boulahia, and Adel Bouhoula. Revocation schemes for delegation licences, ICICS, pp.190-205, 2008.

M. Ben-ghorbel-talbi, Frédéric Cuppens, Nora Cuppens- Boulahia, and Adel Bouhoula. A delegation model for extended rbac

T. Berners-lee, Semantic web road map, p.233, 1998.

E. Bertino, C. Brodie, S. B. Calo, L. F. Cranor, C. Karat et al., Analysis of privacy and security policies, Prathima Rao, and Xiping Wang, p.3, 2009.
DOI : 10.1147/JRD.2009.5429045

E. Bertino, W. Lee, A. C. Squicciarini, and B. Thuraisingham, End-to-end accountability in grid computing systems for coalition information sharing In Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, pp.1-29, 2008.

C. Bertolissi and M. Fernández, A rewriting framework for the composition of access control policies, Proceedings of the 10th international ACM SIGPLAN symposium on Principles and practice of declarative programming, PPDP '08, pp.217-225, 2008.
DOI : 10.1145/1389449.1389476

K. Bhargavan, C. Fournet, and A. D. Gordon, Verifying policy-based web services security, ACM Trans. Program. Lang. Syst, vol.30, issue.6, 2008.
DOI : 10.1145/1391956.1391957

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.187.4827

F. Biennier, Security integration in inter-enterprise business process engineering
DOI : 10.1007/978-0-387-35698-3_15

. Pels, Collaborative systems for production management, IFIP TC5/WG5. 7 Eighth International Conference on Advances Production Management Systems, pp.207-217, 2002.

F. Biennier, L. Ali, and A. Legait, Extended Service Integration: Towards ???Manufacturing??? SLA, Advances in Production Management Systems
DOI : 10.1007/978-0-387-74157-4_11

URL : https://hal.archives-ouvertes.fr/hal-00348545

F. Biennier and J. Favrel, Integration of a contract framework in bp models. Virtual Enterprises and Collaborative Networks, pp.97-104, 2004.

F. Biennier and J. Favrel, Collaborative business and data privacy: Toward a cyber-control? Computers in Industry, pp.361-370, 2005.

B. Boehm, A spiral model of software development and enhancement, ACM SIGSOFT Software Engineering Notes, vol.11, issue.4, pp.14-24, 1986.

P. Bonatti and P. Samarati, Regulating service access and information release on the Web, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.134-143, 2000.
DOI : 10.1145/352600.352620

A. Piero, P. Bonatti, and . Samarati, A uniform framework for regulating service access and information release on the web, J. Comput . Secur, vol.10, issue.3, pp.241-271, 2002.

J. Bosak, T. Mcgrath, and G. K. Holman, Universal business language v2, 2006.

K. Broda and K. Clark, Rob Miller 0002, and Alessandra Russo. Sage: A logical agent-based environment monitoring and control system, pp.112-117, 2009.

G. Bruns, D. S. Dantas, and M. Huth, A simple and expressive semantic framework for policy composition in access control, Proceedings of the 2007 ACM workshop on Formal methods in security engineering , FMSE '07, pp.12-21, 2007.
DOI : 10.1145/1314436.1314439

G. Bruns, S. Daniel, M. Dantas, and . Huth, A simple and expressive semantic framework for policy composition in access control, Proceedings of the 2007 ACM workshop on Formal methods in security engineering , FMSE '07, pp.12-21, 2007.
DOI : 10.1145/1314436.1314439

L. Bussard, G. Neven, and F. Preiss, Downstream usage control. Policies for Distributed Systems and Networks, IEEE International Workshop on, vol.0, pp.22-29, 2010.
DOI : 10.1109/policy.2010.17

B. Carminati, E. Ferrari, and A. Perego, Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, vol.13, issue.1, 2009.
DOI : 10.1145/1609956.1609962

J. Carmo and O. Pacheco, Deontic and action logics for organized collective agency, modeled through institutionalized agents and roles, Fundam. Inf, vol.48, issue.2-3, pp.129-163, 2001.

S. Chaari, Y. Badr, and F. Biennier, Enhancing web service selection by QoS-based ontology and WS-policy, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, pp.2426-2431, 2008.
DOI : 10.1145/1363686.1364260

URL : https://hal.archives-ouvertes.fr/hal-00348516

W. David, S. F. Chadwick, and . Lievens, Enforcing " sticky " security policies throughout a distributed application, MidSec '08: Proceedings of the 2008 workshop on Middleware security, pp.1-6, 2008.

D. W. Chadwick, S. Otenko, and T. A. Nguyen, Adding support to XACML for multi-domain user to user dynamic delegation of authority, International Journal of Information Security, vol.9, issue.4, pp.137-152, 2009.
DOI : 10.1007/s10207-008-0073-y

C. Peter, C. Chapin, X. S. Skalka, and . Wang, Authorization in trust management: Features and foundations, ACM Comput. Surv, vol.40, issue.3, pp.1-48, 2008.

S. Charney, Establishing end to end trust, 2008.

R. Chbeir and D. Gross-amblard, Multimedia and Metadata Watermarking Driven by Application Constraints, 2006 12th International Multi-Media Modelling Conference, 2006.
DOI : 10.1109/MMMC.2006.1651325

W. Chen and Z. Zhang, vCerberus: A DRTM system based on virtualization technology, Wuhan University Journal of Natural Sciences, vol.7, issue.3, pp.185-189
DOI : 10.1007/s11859-010-0301-y

M. Chung, Using JConsole to monitor applications, Oracle, Sun Developer Network (SDN), 2004.

L. Cirio, I. F. Cruz, and R. Tamassia, A Role and Attribute Based Access Control System Using Semantic Web Technologies, OTM Workshops, pp.1256-1266, 2007.
DOI : 10.1007/978-3-540-76890-6_53

D. David, D. R. Clark, and . Wilson, A comparison of commercial and military computer security policies. Security and Privacy, IEEE Symposium on, p.184, 1987.

L. Clark and &. Parsia, Pellet: Owl 2 reasoner for java

E. M. Clarke, E. Emerson, and A. Sistla, Automatic verification of finite state concurrent systems using temporal logic specifications, 1985.

M. Colombo, F. Martinelli, P. Mori, and A. Lazouski, On Usage Control for GRID Services, 2009 International Joint Conference on Computational Sciences and Optimization, pp.47-51, 2009.
DOI : 10.1109/CSO.2009.479

C. Constantin, D. Gross-amblard, and M. Guerrouani, Watermill, Proceedings of the 7th workshop on Multimedia and security , MM&Sec '05, pp.143-155, 2005.
DOI : 10.1145/1073170.1073196

URL : https://hal.archives-ouvertes.fr/hal-01185453

L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-marshall, and J. Reagle, The platform for privacy preferences 1, 2002.

R. Craven, J. Lobo, E. Lupu, A. Russo, and M. Sloman, Security policy refinement using data integration, Proceedings of the 2nd ACM workshop on Assurable and usable security configuration, SafeConfig '09, pp.25-28, 2009.
DOI : 10.1145/1655062.1655068

URL : http://spiral.imperial.ac.uk/bitstream/10044/1/10467/2/safeconfig.pdf

R. Craven, J. Lobo, E. C. Lupu, A. Russo, and M. Sloman, Decomposition techniques for policy refinement, 2010 International Conference on Network and Service Management, pp.72-79, 2010.
DOI : 10.1109/CNSM.2010.5691331

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.592.2080

R. Craven, J. Lobo, J. Ma, A. Russo, E. Lupu et al., Expressive policy analysis with enhanced system dynamicity, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.239-250, 2009.
DOI : 10.1145/1533057.1533091

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1026.8278

F. Cuppens and N. Cuppens-boulahia, Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008.
DOI : 10.1007/s10207-007-0051-9

URL : https://hal.archives-ouvertes.fr/hal-01207773

F. Cuppens, N. Cuppens-boulahia, and C. Coma, O2O: Virtual Private Organizations to Manage Security Policy Interoperability, ICISS, pp.101-115, 2006.
DOI : 10.1007/11961635_7

N. Damianou, N. Dulay, E. Lupu, and M. Sloman, The Ponder Policy Specification Language, POLICY, pp.18-38, 2001.
DOI : 10.1007/3-540-44569-2_2

T. Berners, -. Daniel, J. Weitzner, and H. Abelson, Information accountability, CSAIL) of Massachusetts Institute of Technology (MIT), 2007.

J. De-bruijn, H. Lausen, A. Polleres, and D. Fensel, The web service modeling language wsml: An overview. The Semantic Web: Research and Applications, pp.590-604, 2006.

H. Debar and N. Kheir, Nora Cuppens-Boulahia, and Frédéric Cuppens . Service dependencies in information systems security, MMM- ACNS, pp.1-20, 2010.

L. Ding, D. Difranzo, A. Graves, J. Michaelis, X. Li et al., TWC data-gov corpus, Proceedings of the 19th international conference on World wide web, WWW '10, pp.1383-1386, 2010.
DOI : 10.1145/1772690.1772937

D. J. Dougherty, K. Fisler, and S. Krishnamurthi, Obligations and Their Interaction with Programs, ESORICS 2007, pp.375-389, 2007.
DOI : 10.1007/978-3-540-74835-9_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.1733

S. Du and J. B. Joshi, Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.228-236, 2006.
DOI : 10.1145/1133058.1133090

S. S. Dubray and M. Martin, ebXML business process specification schema technical specification v2, 2006.

J. Duhl and S. Kevorkian, Understanding drm systems. An IDC White Paper, 2001.

J. Robert, A. P. Ellison, and . Moore, Architectural refinement for the design of survivable systems, 2001.

J. A. Estefan, K. Laskey, F. G. Mccabe, and D. Thornton, Reference architecture for Service Oriented Architecture version 1, 2008.

C. Evans, D. Chappell, D. Bunting, G. Tharakan, H. Shimamura et al., Web services reliability (ws-reliability), 2003.

D. Fensel and C. Bussler, The Web Service Modeling Framework WSMF, Electronic Commerce Research and Applications, pp.113-137, 2002.
DOI : 10.1016/S1567-4223(02)00015-7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.194.6486

D. Ferraiolo, J. Cugini, and D. R. Kuhn, Role-based access control (RBAC): Features and motivations, Proceedings of 11th Annual Computer Security Application Conference, pp.241-289, 1995.

F. David, R. Ferraiolo, S. Sandhu, D. R. Gavrila, R. Kuhn et al., Proposed NIST standard for rolebased access control, ACM Trans. Inf. Syst. Secur, vol.4, issue.3, pp.224-274, 2001.

J. Ferrante, K. J. Ottenstein, and J. D. Warren, The program dependence graph and its use in optimization, ACM Transactions on Programming Languages and Systems, vol.9, issue.3, pp.319-349, 1987.
DOI : 10.1145/24039.24041

R. Ferrini and E. Bertino, Supporting RBAC with XACML+OWL, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.145-154, 2009.
DOI : 10.1145/1542207.1542231

T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu et al., BAC, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.73-82, 2008.
DOI : 10.1145/1377836.1377849

. Flexiant, Flexiscale cloud comp and hosting, p.240

N. Simon and . Foley, The specification and implementation of commercial security requirements including dynamic segregation of duties, Proceedings of the 4th ACM conference on Computer and communications security, CCS '97, pp.125-134, 1997.

I. T. Foster, Globus Toolkit Version 4: Software for Service-Oriented Systems, Journal of Computer Science and Technology, vol.10, issue.2, pp.513-520, 2006.
DOI : 10.1007/s11390-006-0513-y

URL : http://doi.org/10.1007/s11390-006-0513-y

C. Fournet and T. Rezk, Cryptographically sound implementations for typed information-flow security, POPL, pp.323-335, 2008.
DOI : 10.1145/1328438.1328478

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.915

E. Gallery and C. J. Mitchell, Trusted Computing: Security and Applications, Cryptologia, vol.3184, issue.3, pp.217-245, 2009.
DOI : 10.1145/782814.782838

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.3394

T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, Terra: a virtual machine-based platform for trusted computing, SOSP, pp.193-206, 2003.

G. Geethakumari, A. Negi, and V. Sastry, A cross?domain role mapping and authorization framework for rbac in grid systems, International Journal of Computer Science & Applications, vol.6, pp.1-12, 2009.

G. Gheorghe, P. Mori, B. Crispo, and F. Martinelli, Enforcing UCON Policies on the Enterprise Service Bus, OTM Conferences, pp.876-893, 2010.
DOI : 10.1007/978-3-642-16949-6_14

D. Ghindici, I. Simplot-ryl, and J. Talbot, A Sound Analysis for Secure Information Flow Using Abstract Memory Graphs, FSEN, pp.355-370, 2009.
DOI : 10.1007/978-3-642-11623-0_21

S. L. Goldman, R. N. Nagel, and K. Preiss, Agile competitors and virtual organizations: strategies for enriching the customer, 1995.

. Grammatech, Dependence graphs and program slicing-codesurfer technology overview

D. Gross and -. , Query-preserving watermarking of relational databases and Xml documents, ACM Transactions on Database Systems, vol.36, issue.1, pp.1-3, 2011.
DOI : 10.1145/1929934.1929937

URL : https://hal.archives-ouvertes.fr/inria-00587712

L. Gu, Y. Cheng, X. Ding, R. H. Deng, Y. Guo et al., Remote attestation on function execution (workin-progress ), INTRUST, pp.60-72, 2009.

L. Gu, X. Ding, R. H. Deng, B. Xie, and H. Mei, Remote attestation on program execution, Proceedings of the 3rd ACM workshop on Scalable trusted computing, STC '08, pp.11-20, 2008.
DOI : 10.1145/1456455.1456458

B. Gupta, H. Kaur, and P. Bedi, A reputation based service provider selection system for farmers, Journal of Information Assurance and Security, vol.5, pp.508-515, 2010.

H. Haas, C. Hanson, T. Berners-lee, L. Kagal, G. J. Sussman et al., Designing the architecture for Web services Data-purpose algebra: Modeling data usage policies, POLICY, pp.173-177, 2003.

W. R. Harris, N. Kidd, S. Chaki, S. Jha, and T. W. Reps, Verifying Information Flow Control over Unbounded Processes, In FM, pp.773-789, 2009.
DOI : 10.1007/978-3-642-05089-3_49

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.6262

M. Harvan and A. Pretschner, State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition, 2009 Third International Conference on Network and System Security, pp.373-380, 2009.
DOI : 10.1109/NSS.2009.51

M. Hilty, A. Pretschner, D. A. Basin, C. Schaefer, and T. Walter, A policy language for distributed usage control . ESORICS2007, LNCS, pp.4734531-546, 2007.

M. Hilty, A. Pretschner, C. Schaefer, and T. Walter, Enforcement for usage control-an overview of control mechanisms, 2006.

H. Hu, H. Li, and D. , Towards layered access control with UCON, Proceedings of the 2009 International Conference on Computational Science and Engineering, pp.823-829, 2009.
DOI : 10.1109/cse.2009.163

G. Chen-hua-ma, J. Lu, and . Qiu, An authorization model for collaborative access control, Journal of Zhejiang University -Science C, vol.11, issue.9, pp.699-717, 2010.

S. Inoue, K. Makino, I. Murase, O. Takizawa, M. Tsutomu et al., A proposal on information hiding methods using xml, Natural Language Processing Pacific Rim Symposium

K. Irwin, T. Yu, and W. H. Winsborough, On the modeling and analysis of obligations, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.134-143, 2006.
DOI : 10.1145/1180405.1180423

I. Iec, . International, and . Iso, Iso 17799(e):information technology security techniques code of practice for information security management, IEC, vol.27002, p.2005, 2002.

H. Janicke, A. Cau, F. Siewe, and H. Zedan, Concurrent Enforcement of Usage Control Policies, 2008 IEEE Workshop on Policies for Distributed Systems and Networks, pp.111-118, 2008.
DOI : 10.1109/POLICY.2008.44

H. Jay and N. Mark, Assessing the security risks of Cloud Computing, 2008.

K. Joel, Virtual machine security guidelines version 1.0, 2007.

A. Josang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2006.
DOI : 10.1016/j.dss.2005.05.019

L. Kagal, T. Finin, M. Paolucci, N. Srinivasan, K. Sycara et al., Authorization and privacy for semantic Web services, IEEE Intelligent Systems, vol.19, issue.4, pp.50-56, 2005.
DOI : 10.1109/MIS.2004.23

L. Kagal and H. Abelson, Access control is an inadequate framework for privacy protection, 2010.

L. Kagal, T. Berners-lee, D. Connolly, and D. J. Weitzner, Using semantic web technologies for policy management on the web, AAAI, 2006.

L. Kagal, C. Hanson, and D. J. Weitzner, Using Dependency Tracking to Provide Explanations for Policy Management, 2008 IEEE Workshop on Policies for Distributed Systems and Networks, pp.54-61, 2008.
DOI : 10.1109/POLICY.2008.51

A. Abou, E. Kalam, S. Benferhat, A. , R. E. Baida et al., Organization based access contro, POLICY, p.120, 2003.

C. Karat, J. Karat, C. Brodie, and J. Feng, Evaluating interfaces for privacy policy rule authoring, Proceedings of the SIGCHI conference on Human Factors in computing systems , CHI '06, pp.83-92, 2006.
DOI : 10.1145/1124772.1124787

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.6442

J. Karat, C. Karat, E. Bertino, N. Li, Q. Ni et al., A policy famework for security and privacy management, IBM System Journal, special issue on harmonizing security and privacy

B. Katt, X. Zhang, R. Breu, M. Hafner, and J. Seifert, A general obligation model and continuity, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.123-132, 2008.
DOI : 10.1145/1377836.1377856

B. Katt, X. Zhang, and M. Hafner, Towards a Usage Control Policy Specification with Petri Nets, OTM '09: Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems, pp.905-912, 2009.
DOI : 10.1007/978-3-642-05151-7_11

N. Kheir and N. Cuppens-boulahia, Frédéric Cuppens, and Hervé Debar. A service dependency model for cost-sensitive intrusion response, ESORICS, pp.626-642, 2010.

N. Kheir and H. Debar, Frédéric Cuppens, Nora Cuppens-Boulahia, and Jouni Viinikka. A service dependency modeling framework for policy-based response enforcement, DIMVA, pp.176-195, 2009.

H. Khurana and V. D. Gligor, A model for access negotiations in dynamic coalitions, WETICE '04: Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.205-210, 2004.

H. Khurana and V. D. Gligor, A model for access negotiations in dynamic coalitions, WETICE, pp.205-210, 2004.

A. Kim, J. Luo, and M. Kang, Security Ontology for Annotating Resources, On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE, pp.1483-1499, 2005.
DOI : 10.1007/11575801_34

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.7024

I. Kollia, B. Glimm, and I. Horrocks, Query answering over sroiq knowledge bases with sparql, Description Logics, 2011.

V. Kolovski, Formal semantics of XACML v3.0, 2008.

R. Kowalski and M. Sergot, A logic-based calculus of events, New Generation Computing, vol.10, issue.No. 2, pp.67-95, 1986.
DOI : 10.1007/BF03037383

R. Krishnan, J. Niu, R. Sandhu, and W. H. Winsborough, Stale-safe security properties for group-based secure information sharing, Proceedings of the 6th ACM workshop on Formal methods in security engineering, FMSE '08, pp.53-62, 2008.
DOI : 10.1145/1456396.1456402

R. Krishnan, R. Sandhu, J. Niu, and W. H. Winsborough, A conceptual framework for Group-Centric secure information sharing, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.384-387, 2009.
DOI : 10.1145/1533057.1533111

R. Krishnan, R. Sandhu, J. Niu, and W. H. Winsborough, Foundations for group-centric secure information sharing models, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.115-124, 2009.
DOI : 10.1145/1542207.1542227

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.185.2103

J. Lafaye, J. Béguec, D. Gross-amblard, and A. Ruas, Invisible Graffiti on Your Buildings: Blind and Squaring-Proof Watermarking of Geographical Databases, Proceedings of the 10th international conference on Advances in spatial and temporal databases, SSTD'07, pp.312-329, 2007.
DOI : 10.1007/978-3-540-73540-3_18

J. Lafaye and D. Gross-amblard, Xml Streams Watermarking, DBSec, pp.74-88, 2006.
DOI : 10.1007/978-3-540-24624-4_11

URL : https://hal.archives-ouvertes.fr/hal-01125144

M. Guerrouani, Watermill: An optimized fingerprinting system for databases under constraints, IEEE Trans. on Knowl. and Data Eng, vol.20, pp.532-546, 2008.
URL : https://hal.archives-ouvertes.fr/hal-01185453

M. S. Lam, M. C. Martin, V. B. Livshits, and J. Whaley, Securing web applications with static and dynamic information flow tracking, Proceedings of the 2008 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation , PEPM '08, pp.3-12, 2008.
DOI : 10.1145/1328408.1328410

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.6756

W. Butler and . Lampson, Protection, Proceedings of the 5th Princeton Conference on Information Sciences and Systems, p.437, 1971.

H. L. Lee, The triple-A supply chain, Harvard business review, vol.82, issue.10, pp.102-113, 2004.

W. Lee, A. C. Squicciarini, and E. Bertino, Profilebased selection of accountability policies in grid computing systems, In POLICY, pp.145-148, 2011.

M. Henry and . Levy, Capability-Based Computer Systems. Butterworth- Heinemann, 1984.

L. Li, Y. Wang, and E. Lim, Trust-Oriented Composite Service Selection and Discovery, ICSOC-ServiceWave '09: Proceedings of the 7th International Joint Conference on Service-Oriented Computing, pp.50-67, 2009.
DOI : 10.1007/978-3-642-10383-4_4

URL : http://www.researchonline.mq.edu.au/vital/access/services/Download/mq:13797/DS01

N. Li, B. Grosof, and J. Feigenbaum, A Practically Implementable and Tractable Delegation Logic, SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy, p.27, 2000.
DOI : 10.2139/ssrn.290100

N. Li, B. N. Grosof, and J. Feigenbaum, Delegation logic, ACM Transactions on Information and System Security, vol.6, issue.1, pp.128-171, 2003.
DOI : 10.1145/605434.605438

N. Li, M. V. Tripunitara, and Z. Bizri, On mutually exclusive roles and separation-of-duty, ACM Trans. Inf. Syst. Secur, vol.10, 2007.

N. Li, Q. Wang, W. Qardaji, E. Bertino, P. Rao et al., Access control policy combining, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.135-144, 2009.
DOI : 10.1145/1542207.1542229

N. Li, Q. Wang, W. H. Qardaji, E. Bertino, P. Rao et al., Access control policy combining, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.135-144, 2009.
DOI : 10.1145/1542207.1542229

Z. Li and X. Ye, Towards a dynamic multi-policy dissemination control model, ACM SIGMOD Record, vol.35, issue.1, pp.33-38, 2006.
DOI : 10.1145/1121995.1122001

D. Lin, P. Rao, E. Bertino, N. Li, and J. Lobo, EXAM: a comprehensive environment for the analysis of access control policies, International Journal of Information Security, vol.9, issue.3, pp.253-273, 2010.
DOI : 10.1007/s10207-010-0106-1

B. Ban, C. Linda, L. Richard, T. Kristin, E. Ric et al., The evolving role of IT managers and CIOs?findings from the 2010 IBM global IT risk study, 2010.

R. Liu, A. Kumar, and W. Van-der-aalst, A formal modeling approach for supply chain event management, Decision Support Systems, vol.43, issue.3, pp.761-778, 2007.
DOI : 10.1016/j.dss.2006.12.009

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.4746

J. Lloret, M. Garcia, D. Bri, and J. R. Diaz, A groupbased content delivery network. In UPGRADE '08: Proceedings of the third international workshop on Use of P2P, grid and agents for the development of content networks, pp.37-44, 2008.

J. W. Lloyd, Foundations of logic programming, 1984.

F. Luciano, Information: A Very Short Introduction, Great Clarendon Street, 2010.

L. Lymberopoulos, E. Lupu, and M. Sloman, PONDER policy implementation and validation in a CIM and differentiated services framework, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507), pp.31-44, 2004.
DOI : 10.1109/NOMS.2004.1317639

W. Daniel and . Manchala, Trust metrics, models and protocols for electronic commerce transactions, ICDCS'1998. Proceedings. 18th International Conference on Distributed Computing Systems, pp.312-321, 1998.

S. Marinovic, K. P. Twidle, N. Dulay, and M. Sloman, Teleo-Reactive policies for managing human-centric pervasive services, 2010 International Conference on Network and Service Management, pp.80-87, 2010.
DOI : 10.1109/CNSM.2010.5691332

URL : http://spiral.imperial.ac.uk/bitstream/10044/1/10258/2/cnsm2010.pdf

K. Martin, A. Amit, B. Susan, M. Hopkins-alan, N. Sven et al., Pattern, English Academy Review, vol.22, issue.1, 2004.
DOI : 10.1080/10131750485310161

URL : https://hal.archives-ouvertes.fr/hal-01103443

F. Martinelli, P. Mori, and A. Vaccarelli, Towards Continuous Usage Control on Grid Computational Services, Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services, (icas-isns'05), p.82, 2005.
DOI : 10.1109/ICAS-ICNS.2005.93

S. Michael, Web Services: Beyond component-based computing, Communication of the ACM, issue.10, pp.71-76, 2002.

K. Yee and J. Shapiro, INSA de Lyon, tous droits réservés Capability myths demolished, these.pdf © [Z. Su], [2012], 2003.

E. Marie, . Moe, E. Bjarne, . Helvik, J. Svein et al., Comparison of the beta and the hidden markov models of trust in dynamic environments, IFIP AICT, vol.300, pp.283-297, 2009.

J. D. Moffett and M. S. Sloman, Policy conflict analysis in distributed system management, Journal of Organizational Computing, vol.3, issue.1, 1993.
DOI : 10.1080/10919399409540214

S. Marco-casassa-mont, P. Pearson, and . Bramhall, Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services, DEXA '03: Proceedings of the 14th International Workshop on Database and Expert Systems Applications, p.377, 2003.

O. Moser, F. Rosenberg, and S. Dustdar, Nonintrusive monitoring and service adaptation for ws-bpel, WWW '08: Proceeding of the 17th international conference on World Wide Web, pp.815-824, 2008.
DOI : 10.1145/1367497.1367607

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.139.6506

A. Muñoz, A. Maña, and D. Serrano, Protecting agents from malicious hosts using tpm, IJCSA, vol.6, issue.5, pp.30-58, 2009.

K. Nance, M. Bishop, and B. Hay, Virtual machine introspection: Observation or interference? Security & Privacy, pp.32-37, 2008.
DOI : 10.1109/msp.2008.134

D. Nardi and R. J. Brachman, An Introduction to Description Logics, Description Logic Handbook, pp.1-40, 2003.
DOI : 10.1017/CBO9780511711787.003

J. Michael, K. R. Nash, and . Poland, Some conundrums concerning separation of duty. Security and Privacy, IEEE Symposium on, p.201, 1990.

Q. Ni, E. Bertino, and J. Lobo, An obligation model bridging access control policies and privacy policies, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.133-142, 2008.
DOI : 10.1145/1377836.1377857

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.666.1141

Q. Ni, E. Bertino, and J. Lobo, D-algebra for composing access control policy decisions, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.298-309, 2009.
DOI : 10.1145/1533057.1533097

Q. Ni, E. Bertino, and J. Lobo, D-algebra for composing access control policy decisions, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.298-309, 2009.
DOI : 10.1145/1533057.1533097

Q. Ni, S. Xu, E. Bertino, R. S. Sandhu, and W. Han, An Access Control Language for a General Provenance Model, Secure Data Management, pp.68-88, 2009.
DOI : 10.1007/978-3-642-04219-5_5

D. Norman, The design of everyday things. Basic Books, 1988.

O. Initiative, Open Digital Rights Language (ODRL) Version 2 Requirements

M. Paolucci and K. Sycara, Autonomous semantic web services, IEEE Internet Computing, vol.7, issue.5, pp.34-41, 2003.
DOI : 10.1109/MIC.2003.1232516

P. Papadimitriou and H. Garcia-molina, A Model for Data Leakage Detection, 2009 IEEE 25th International Conference on Data Engineering, pp.1307-1310, 2009.
DOI : 10.1109/ICDE.2009.227

M. Papazoglou and D. Georgakopoulos, Introduction to a special issue on service oriented computing, Communication of the ACM, issue.10, pp.25-28, 2003.

P. Mike, W. Papazoglou, . Ven-den, and . Heuvel, Service oriented architectures: approaches, technologies and research issues, The VLDB Journal, vol.16, issue.3, pp.389-415, 2007.

M. P. Papazoglou, Extending the service oriented architecture, Journal of Business Integration, vol.2, issue.10, pp.18-21, 2005.

M. P. Papazoglou and J. Dubray, A survey of web service technologies, 2004.

J. Park and R. Sandhu, Towards usage control models: beyond traditional access control, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.57-64, 2002.
DOI : 10.1145/507711.507722

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.4350

J. Park and R. Sandhu, The UCON ABC usage control model

B. Parno, Bootstrapping trust in a " trusted " platform, HotSec, 2008.

B. Parno, J. M. Mccune, and A. Perrig, Bootstrapping trust in commodity computers, IEEE Symposium on Security and Privacy, pp.414-429, 2010.

H. Perritt, Permission headers and contract law, Proceedings of the Workshop on Technological Strategies for Protecting Intellectual Property in the Networked Multimedia Environment, 1994.

F. Peter, B. Joe, P. Fingar, and J. Bellini, The real-time enterprise: competing on time using the revolutionary business SEx machine, 2004.

S. Preda, F. Cuppens, N. Cuppens-boulahia, J. García-alfaro, L. Toutain et al., Semantic context aware security policy deployment, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.251-261, 2009.
DOI : 10.1145/1533057.1533092

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.217.3137

A. Pretschner, M. Hilty, and D. Basin, Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006.
DOI : 10.1145/1151030.1151053

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.3191

A. Pretschner, M. Hilty, F. Schütz, C. Schaefer, and T. Walter, Usage Control Enforcement: Present and Future, IEEE Security & Privacy Magazine, vol.6, issue.4, pp.44-53, 2008.
DOI : 10.1109/MSP.2008.101

A. Pretschner, J. Rüesch, C. Schaefer, and T. Walter, Formal Analyses of Usage Control Policies, 2009 International Conference on Availability, Reliability and Security, pp.98-105, 2009.
DOI : 10.1109/ARES.2009.100

Y. Qin, D. Feng, and C. Liu, TPM context manager and dynamic configuration management for trusted virtualization platform, Wuhan University Journal of Natural Sciences, vol.34, issue.10, pp.539-546, 1007.
DOI : 10.1007/s11859-008-0506-5

R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, and K. Bacon, Expandable grids for visualizing and authoring computer security policies, Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems , CHI '08, pp.1473-1482, 2008.
DOI : 10.1145/1357054.1357285

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.2581

R. W. Reeder, L. Bauer, L. F. Cranor, M. K. Reiter, and K. Vaniea, More than skin deep, Proceedings of the 2011 annual conference on Human factors in computing systems, CHI '11, pp.2065-2074, 2011.
DOI : 10.1145/1978942.1979243

B. Rosenblatt, Integrating DRM with peer-to-peer networks: Enabling the future of online content business models. Whitepaper GiantSteps? Media Technologies Strategies, 2003.

. Bill, . Rosenblatt, S. Trippe, and . Mooney, Digital rights management: Business and technology, 2003.

I. Roy, D. E. Porter, M. D. Bond, K. S. Mckinley, and E. Witchel, Laminar: practical fine-grained decentralized information flow control, PLDI, pp.63-74, 2009.

G. Russello and N. Dulay, xDUCON: Coordinating Usage Control Policies in Distributed Domains, 2009 Third International Conference on Network and System Security, pp.246-253, 2009.
DOI : 10.1109/NSS.2009.77

G. Russello and N. Dulay, xDUCON: Cross Domain Usage Control through Shared Data Spaces, 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, pp.178-181, 2009.
DOI : 10.1109/POLICY.2009.18

R. Sailer, T. Jaeger, X. Zhang, and L. Van-doorn, Attestation-based policy enforcement for remote access, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.308-317, 2004.
DOI : 10.1145/1030083.1030125

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.4401

R. Sandhu, Transaction control expressions for separation of duties, [Proceedings 1988] Fourth Aerospace Computer Security Applications, pp.282-286, 1988.
DOI : 10.1109/ACSAC.1988.113349

. Ravi, D. Sandhu, R. Ferraiolo, and . Kuhn, The NIST model for role-based access control: Towards a uni ed standard, Proceedings of 5th ACM Workshop on Role-Based Access Control, 2000.

S. Ravi, X. Sandhu, and . Zhang, Peer-to-peer access control architecture using trusted computing technology, SACMAT, pp.147-158, 2005.

T. Sans, F. Cuppens, and N. Cuppens-boulahia, FORM : A Federated Rights Expression Model for Open DRM Frameworks, ASIAN, pp.45-59, 2006.
DOI : 10.1007/978-3-540-77505-8_5

C. Schaefer, Usage control reference monitor architecture. Security , Privacy and Trust in Pervasive and Ubiquitous Computing, International Workshop on, pp.13-18, 2007.
DOI : 10.1109/secperu.2007.20

O. Seneviratne and L. Kagal, Addressing data reuse issues at the protocol level, POLICY, pp.141-144, 2011.

M. Shehab, E. Bertino, and A. Ghafoor, Watermarking Relational Databases Using Optimization-Based Techniques, Center for Education and Research in Information Assurance and Security (CERIAS), 2006.
DOI : 10.1109/TKDE.2007.190668

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.114.6299

C. Shen, H. Zhang, H. Wang, J. Wang, B. Zhao et al., Research on trusted computing and its development, Science China Information Sciences, vol.23, issue.3, pp.405-433
DOI : 10.1007/s11432-010-0069-x

Z. Shen and X. Wu, A Trusted Computing Technology Enabled Mobile Agent System, 2008 International Conference on Computer Science and Software Engineering
DOI : 10.1109/CSSE.2008.888

A. Shinnar, M. Pistoia, and A. Banerjee, A language for information flow: dynamic tracking in multiple interdependent dimensions, PLAS, pp.125-131, 2009.

J. Singh, D. M. Eyers, and J. Bacon, Controlling historical information dissemination in publish/subscribe, Proceedings of the 2008 workshop on Middleware security, MidSec '08, pp.34-39, 2008.
DOI : 10.1145/1463342.1463349

J. Singh, L. Vargas, J. Bacon, and K. Moody, Policybased information sharing in publish/subscribe middleware, POL- ICY, pp.137-144, 2008.

R. Sion, M. Atallah, and S. Prabhakar, Rights protection for relational data, SIGMOD '03: Proceedings of the 2003 ACM SIGMOD international conference on Management of data, 2003.
DOI : 10.1145/872757.872772

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.2332

R. Sion, M. J. Atallah, and S. Prabhakar, Resilient Rights Protection for Sensor Streams, VLDB, pp.732-743, 2004.
DOI : 10.1016/B978-012088469-8.50065-6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.8920

B. Siraman and R. Radhakrishnan, Event driven architecture augmenting Service Oriented Architecture, 2005.

L. Sliman, F. Biennier, and Y. Badr, A security policy framework for context-aware and user preferences in e-services, Journal of Systems Architecture, vol.55, issue.4
DOI : 10.1016/j.sysarc.2008.12.001

URL : https://hal.archives-ouvertes.fr/hal-01276887

M. Sloman, Policy driven management for distributed systems, Journal of Network and Systems Management, vol.III, issue.No. 8, pp.333-360, 1994.
DOI : 10.1007/BF02283186

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.47.3914

M. Sloman and E. C. Lupu, Engineering Policy-Based Ubiquitous Systems, The Computer Journal, vol.53, issue.7, pp.1113-1127, 2010.
DOI : 10.1093/comjnl/bxp102

URL : http://comjnl.oxfordjournals.org/cgi/content/short/53/7/1113

D. Smith, Web services enable service oriented and eventdriven architectures, Journal of Business Integration, vol.5, pp.12-13, 2004.

M. Srivatsa, S. Balfe, K. G. Paterson, and P. Rohatgi, Trust management for secure information flows, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.175-188, 2008.
DOI : 10.1145/1455770.1455794

M. Srivatsa, P. Rohatgi, S. Balfe, and S. Reidt, Securing information flows: A metadata framework, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp.748-753, 2008.
DOI : 10.1109/MAHSS.2008.4660114

Y. Sun, H. Fang, Y. Song, L. Du, K. Zhang et al., TRainbow: a new trusted virtual machine based platform, Frontiers of Computer Science in China, vol.4782, issue.5, pp.47-64, 2010.
DOI : 10.1007/s11704-009-0076-5

R. Teigao, C. Maziero, and A. Olivo-santin, Applying a usage control model in an operating system kernel, Journal of Network and Computer Applications, vol.34, issue.4, pp.1342-1352, 2011.
DOI : 10.1016/j.jnca.2011.03.019

O. Thomas and J. Vom-brocke, A value-driven approach to the design of service-oriented information systemsmaking use of conceptual models. Information Systems and e-Business Management, pp.67-97, 2009.

J. Y. Tsai, S. Egelman, L. F. Cranor, and A. Acquisti, The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study, Information Systems Research, vol.22, issue.2, pp.254-268, 2011.
DOI : 10.1287/isre.1090.0260

A. Tsalgatidou and T. Pilioura, An overview of standards and related technology in Web services. Distributed and Parallel Databases, pp.135-162, 2002.

M. Luis, L. Vaquero, D. Rodero-merino, and . Morán, Locking the sky: a survey on IaaS cloud security. Computing, p.2010

S. L. Vargo and R. F. Lusch, Evolving to a New Dominant Logic for Marketing, Journal of Marketing, vol.68, issue.1, pp.1-17, 2004.
DOI : 10.1509/jmkg.68.1.1.24036

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.371.4442

H. Wang, J. Cao, and Y. Zhang, Delegating revocations and authorizations in collaborative business environments, Information Systems Frontiers, vol.6, issue.3, pp.293-305, 2009.
DOI : 10.1007/s10796-008-9091-6

J. Wang, Z. Cheng, L. Jing, K. Ota, and M. Kansen, A smart-gate based composition method to provide services by solving conflict using dynamic user priority and compromise policy, International Journal of Innovative Computing, Information and Control, p.2987

L. Wang, D. Wijesekera, and S. Jajodia, A logic-based framework for attribute based access control, Proceedings of the 2004 ACM workshop on Formal methods in security engineering , FMSE '04, pp.45-55, 2004.
DOI : 10.1145/1029133.1029140

Q. Wang, H. Jin, and N. Li, Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging, ESORICS, pp.268-284, 2009.
DOI : 10.1145/1519144.1519149

X. Wang, G. Lao, T. Demartini, H. Reddy, M. Nguyen et al., XrML -- eXtensible rights Markup Language, Proceedings of the 2002 ACM workshop on XML security , XMLSEC '02, pp.71-79, 2002.
DOI : 10.1145/764792.764803

Y. Wang, Y. Shen, and J. Pan, Usage Control Based on Windows Kernel Hook, 2009 International Conference on Information and Multimedia Technology, pp.264-267, 2009.
DOI : 10.1109/ICIMT.2009.92

D. J. Weitzner, H. Abelson, T. Berners-lee, J. Feigenbaum, J. A. Hendler et al., Information accountability, Communications of the ACM, vol.51, issue.6, pp.82-87, 2008.
DOI : 10.1145/1349026.1349043

I. Westphal, K. Thoben, and M. Seifert, Managing collaboration performance to govern virtual organizations, Journal of Intelligent Manufacturing, vol.12, issue.5, pp.311-320, 2008.
DOI : 10.1007/s10845-008-0182-5

P. James, D. T. Womack, and . Jones, Lean thinking, second edition, 2003.

Z. Wu, A comparative study of trust management for federation: features and measurements, Journal of Information Assurance and Security, vol.6, pp.29-038, 2011.

. Xen and . Org, The xen hypervisor

D. Xiu and Z. Liu, A Formal Definition for Trust in Distributed Systems, In ISC, pp.482-489, 2005.
DOI : 10.1007/11556992_35

Q. Yu, X. Liu, A. Bouguettaya, and B. Medjahed, Deploying and managing web services: issues, solutions, and directions. The International Journal on Very Large Data Bases, pp.537-572, 2008.
DOI : 10.1007/s00778-006-0020-3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.6523

T. Yu, X. Ma, and M. Winslett, PRUNES, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.210-219, 2000.
DOI : 10.1145/352600.352633

T. Yu, M. Winslett, and K. E. Seamons, Interoperable strategies in automated trust negotiation, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.146-155, 2001.
DOI : 10.1145/501983.502004

T. Yu, M. Winslett, and K. E. Seamons, Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation, ACM Transactions on Information and System Security, vol.6, issue.1, pp.1-42, 2003.
DOI : 10.1145/605434.605435

Y. Yu, J. Leiwo, and B. Premkumar, How to privately utilize untrustworthy computing power, Journal of Information Assurance and Security, vol.1, pp.149-158, 2006.

L. Zeng, B. Benatallah, M. Dumas, J. Kalagnanam, and Q. Z. Sheng, Quality driven web services composition, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.411-421, 2003.
DOI : 10.1145/775152.775211

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.2363

Q. Zhang, L. Cheng, and R. Boutaba, Cloud computing: stateof-the-art and research challenges, Journal of Internet Services and Applications, vol.167, issue.1, pp.7-18, 2010.
DOI : 10.1007/978-3-319-38904-2

X. Zhang, Y. Li, and D. Nalla, An attribute-based access matrix model, Proceedings of the 2005 ACM symposium on Applied computing , SAC '05, pp.359-363, 2005.
DOI : 10.1145/1066677.1066760

M. Zhang, M. J. Nakae, R. Covington, and . Sandhu, INSA de Lyon, tous droits réservés A usage-based authorization framework for collaborative computing systems, these.pdf © [Z. Su], [2012] SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies, pp.180-189, 2006.

X. Zhang, M. Nakae, M. J. Covington, and R. Sandhu, Toward a Usage-Based Security Framework for Collaborative Computing Systems, ACM Transactions on Information and System Security, vol.11, issue.1, pp.1-3, 2008.
DOI : 10.1145/1330295.1330298

X. Zhang, F. Parisi-presicce, R. Sandhu, and J. Park, Formal model and policy specification of usage control, ACM Transactions on Information and System Security, vol.8, issue.4, pp.351-387, 2005.
DOI : 10.1145/1108906.1108908

X. Zhang, J. Park, F. Parisi-presicce, and R. Sandhu, A logical specification for usage control, Proceedings of the ninth ACM symposium on Access control models and technologies , SACMAT '04, pp.1-10, 2004.
DOI : 10.1145/990036.990038

X. Zhang, J. Seifert, and R. Sandhu, Security Enforcement Model for Distributed Usage Control, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008), pp.10-18, 2008.
DOI : 10.1109/SUTC.2008.79

H. Zhao, J. Lobo, and S. M. Bellovin, Policy refinement of network services for MANETs, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, pp.113-120, 2011.
DOI : 10.1109/INM.2011.5990681

J. Zhao and M. Rinard, System dependence graph construction for aspect-oriented programs, 2003.

L. Zheng and A. C. Myers, Dynamic security labels and static information flow control, International Journal of Information Security, vol.15, issue.2???3, pp.67-84, 2007.
DOI : 10.1007/s10207-007-0019-9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.640.2428

X. Zhou, H. Pang, K. Tan, and D. Mangla, Wmxml: A system for watermarking xml data, VLDB, pp.1318-1321, 2005.

C. Pour-le-partenaire and C. Les-besoins-sont-exprimés-par-la-politique-rop, Ceux qui veulent lire l'information doivent avoir une certification Ils doivent également avoir accédé à l'information dans les 10 jours précédents, (3) Celui qui lit une information (de fait obtient une copie de l'information)

. Dans-cet-exemple, les informations issues de B et C sont fusionnées à l

]. J. Bosak, T. Mcgrath, G. K. Holman, ]. D. Box, and F. Curbera, INSA de Lyon, tous droits réservés Universal business language v2. 0 Web services addressing (WS-Addressing) Catteddu Daniele and Hogben Giles. Cloud Computing: Benefits, risks and recommendations for information security, Web services description language (WSDL) version 2.0 part 1: Core language Weerawarana. Web services description language (WSDL) 1.1 ebXML business process specification schema technical specification v2. 0.4, 2001.

H. Haas and A. Brown, Web services glossary, 2004.

H. Haas, Designing the architecture for web services, W3C, 2003.

R. Iannella, Digital rights management (DRM) architectures. D-Lib Magazine, 2001.

H. Jay and N. Mark, Assessing the security risks of Cloud Computing, 2008.

L. Kagal and H. Abelson, Access control is an inadequate framework for privacy protection, 2010.

B. Ban, C. Linda, L. Richard, T. Kristin, E. Ric et al., The evolving role of IT managers and CIOs?findings from the 2010 IBM global IT risk study, 2010.

C. M. Mackenzie, K. Laskey, F. Mccabe, P. F. Brown, and R. Metz, Reference model for service oriented architecture 1, 2006.

M. Papazoglou and D. Georgakopoulos, Introduction to a special issue on service oriented computing, Communication of the ACM, issue.10, pp.25-28, 2003.

P. Mike, W. Papazoglou, . Ven-den, and . Heuvel, Service oriented architectures: approaches, technologies and research issues, The VLDB Journal, vol.16, issue.3, pp.389-415, 2007.

M. P. Papazoglou, Extending the service oriented architecture, Journal of Business Integration, vol.2, issue.10, pp.18-21, 2005.

M. P. Papazoglou and J. Dubray, A survey of web service technologies, 2004.

J. Park and R. Sandhu, The UCON_ABC usage control model

S. Ziyi and F. Biennier, A Collaborative-context Oriented Policy Model for Usage-control in Business Federation, 2011.

S. Ziyi and F. Biennier, Toward Comprehensive Security Policy Governance in Collaborative Enterprise, 2011.

S. Ziyi and F. Biennier, Full Lifecycle Resource Protection in Composite Web Service with XACML. ICIC Express Letters, Part B: Applications, vol.2, issue.5, pp.1045-1050, 2011.

S. Ziyi and F. Biennier, Full Lifecycle Resource Protection in Composite Web Service with XACML, 2011.

S. Ziyi and F. Biennier, End-to-end Security Policy Description and Management for Collaborative System, Journal of Information Assurance and Security, 2011.

S. Ziyi and F. Biennier, End-to-end Security Policy Description and Management for Collaborative System. Proceeding of the IAS2010, 2010.