E. Aarts, R. Harwig, and M. Schuurmans, The invisible future: The seamless integration of technology into everyday life, 2002.

E. H. Aarts and S. Marzano, The New Everyday View on Ambient Intelligence, 2003.

G. D. Abowd, A. K. Dey, P. J. Brown, N. Davies, M. Smith et al., Towards a Better Understanding of Context and Context-Awareness, Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing, HUC '99, pp.304-307, 1999.
DOI : 10.1007/3-540-48157-5_29

M. D. Abrams, Renewed understanding of access control policies, Proceeding of the 16th National Computer Security Conference, pp.87-96, 1993.

D. Agrawal, J. Giles, K. Lee, and J. Lobo, Policy Ratification, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05), pp.223-232, 2005.
DOI : 10.1109/POLICY.2005.25

T. Ahmed and A. R. Tripathi, Static verification of security requirements in role based CSCW systems, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, pp.196-203, 2003.
DOI : 10.1145/775412.775438

F. Aldrich, Smart Homes: Past, Present and Future, Inside the Smart Home, pp.17-39, 2003.
DOI : 10.1007/1-85233-854-7_2

A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004.
DOI : 10.1109/TDSC.2004.2

F. Baader and T. Nipkow, Term rewriting and all that, 1998.

M. Backes, W. Bagga, G. Karjoth, and M. Schunter, Efficient comparison of enterprise privacy policies, Proceedings of the 2004 ACM symposium on Applied computing , SAC '04, pp.375-382, 2004.
DOI : 10.1145/967900.967983

D. Balfanz, G. Durfee, D. Smetters, and R. Grinter, In search of usable security: five lessons from the field, IEEE Security & Privacy Magazine, vol.2, issue.5, pp.19-24, 2004.
DOI : 10.1109/MSP.2004.71

E. Balland, P. Brauner, R. Kopetz, P. Moreau, and A. Reilles, Tom: Piggybacking Rewriting on Java, Conference on Rewriting Techniques and Applications, pp.36-47, 2007.
DOI : 10.1007/978-3-540-73449-9_5

URL : https://hal.archives-ouvertes.fr/inria-00142045

L. Bass, P. Clements, and R. Kazman, Software Architecture in Practice, 2003.

D. Benslimane, S. Dustdar, and A. Sheth, Services Mashups: The New Generation of Web Applications, IEEE Internet Computing, vol.12, issue.5, pp.13-15, 2008.
DOI : 10.1109/MIC.2008.110

M. Bishop, What is computer security? In Security & Privacy, pp.67-69, 2003.

M. Bishop, Introduction to Computer Security, 2004.

A. Bouhoula and F. Jacquemard, Automatic verification of sufficient completeness for conditional constrained term rewriting systems, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00070163

T. Bourdier, H. Cirstea, M. Jaume, and H. Kirchner, Formal Specification and Validation of Security Policies, Foundations & Practice of Security, pp.148-163, 2011.
DOI : 10.1007/978-3-642-27901-0_12

URL : https://hal.archives-ouvertes.fr/inria-00507300

T. Braun, M. Diaz, J. Enrquez-gabeiras, and T. Staub, End-to- End Quality of Service Over Heterogeneous Networks, 2008.
DOI : 10.1007/978-3-540-79120-1

D. Brewer and M. Nash, The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.206-214, 1989.
DOI : 10.1109/SECPRI.1989.36295

G. Brose, A. Vogel, and K. Duddy, Java Programming with CORBA, Third Edition, 2001.

J. Bruneau, W. Jouve, and C. Consel, DiaSim: A Parameterized Simulator for Pervasive Computing Applications, 6th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous'09), 2009.
URL : https://hal.archives-ouvertes.fr/inria-00403421

D. Cassou, Développement logiciel orienté paradigme de conception: la programmation dirigée par la spécification, 2011.

D. Cassou, B. Bertran, N. Loriant, and C. Consel, A generative programming approach to developing pervasive computing systems, GPCE '09: Proceedings of the 8th international conference on Generative programming and component engineering, pp.137-146, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00405819

T. Chaari, F. Laforest, and A. Celentano, Adaptation in context???aware pervasive information systems: the SECAS project, International Journal of Pervasive Computing and Communications, vol.3, issue.4, pp.400-425, 2007.
DOI : 10.1108/17427370710863130

URL : https://hal.archives-ouvertes.fr/hal-01505328

H. Chen, F. Perich, T. Finin, and A. Joshi, SOUPA: standard ontology for ubiquitous and pervasive applications, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004., 2004.
DOI : 10.1109/MOBIQ.2004.1331732

S. Chetan and R. Campbell, Towards fault tolerant pervasive computing, Pervasive 2004 Workshop on Sustainable Pervasive Computing, pp.38-44, 2004.
DOI : 10.1109/MTAS.2005.1407746

R. C. Christopher, C. K. Hess, M. Roman, and R. H. Campbell, Gaia: A development infrastructure for active spaces, Workshop on Application Models and Programming Tools for Ubiquitous Computing, 2001.

D. D. Clark and D. R. Wilson, A comparison of commercial and military computer security policies. Security and Privacy, IEEE Symposium on, p.184, 1987.

D. J. Cook, M. Youngblood, S. K. Das, N. Damianou, N. Dulay et al., A Multi-agent Approach to Controlling a Smart Environment The ponder policy specification language, Proceedings of the International Workshop on Policies for Distributed Systems and Networks, POLICY '01, pp.165-182, 2001.

A. De-castro-alves, OSGi in Depth, 2011.

A. S. De-oliveira, Réécriture et Modularité pour les Politiques de Sécurité, 2008.

A. K. Dey, G. D. Abowd, and D. Salber, A Context-Based Infrastructure for Smart Environments, 1999.
DOI : 10.1007/978-1-4471-0743-9_11

W. K. Edwards and R. E. Grinter, At Home with Ubiquitous Computing: Seven Challenges, Proceedings of the 3rd international conference on Ubiquitous Computing, UbiComp '01, pp.256-272, 2001.
DOI : 10.1007/3-540-45427-6_22

D. Ferraiolo and R. Kuhn, Role-based access control, 15th NIST-NCSC National Computer Security Conference, pp.554-563, 1992.

K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz, Verification and change-impact analysis of accesscontrol policies, Proceedings of the 27th international conference on Software engineering, ICSE '05, pp.196-205, 2005.

M. Fowler, Domain-Specific Languages (Addison-Wesley Signature Series (Fowler)), 2010.

R. Frohardt, B. E. Chang, and S. Sankaranarayanan, Access Nets: Modeling Access to Physical Spaces, Proceedings of the 12th international conference on Verification, model checking , and abstract interpretation, pp.184-198, 2011.
DOI : 10.1007/978-3-540-30144-8_19

D. Garlan, D. Siewiorek, A. Smailagic, and P. Steenkiste, Project Aura: toward distraction-free pervasive computing, IEEE Pervasive Computing, vol.1, issue.2, pp.22-31, 2002.
DOI : 10.1109/MPRV.2002.1012334

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.7105

T. Genet, Decidable approximations of sets of descendants and sets of normal forms, 9th Conference on Rewriting Techniques and Applications, pp.151-165, 1998.
DOI : 10.1007/BFb0052368

URL : https://hal.archives-ouvertes.fr/inria-00073364

S. Hadim and N. Mohamed, Middleware: Middleware Challenges and Approaches for Wireless Sensor Networks, IEEE Distributed Systems Online, vol.7, issue.3, pp.1-16, 2006.
DOI : 10.1109/MDSO.2006.19

R. Haux, Individualization, globalization and health ??? about sustainable information technologies and the aim of medical informatics, International Journal of Medical Informatics, vol.75, issue.12, pp.795-808, 2006.
DOI : 10.1016/j.ijmedinf.2006.05.045

R. Hayton, J. Bacon, and K. Moody, Access control in an open distributed environment, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.3-15, 1998.
DOI : 10.1109/SECPRI.1998.674819

K. Henricksen, J. Indulska, and A. Rakotonirainy, Infrastructure for pervasive computing: Challenges, In GI Jahrestagung, issue.1, pp.214-222, 2001.

S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian, Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001.
DOI : 10.1145/383891.383894

S. Jajodia, P. Samarati, and V. S. Subrahmanian, A logical language for expressing authorizations, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.31-42, 1997.
DOI : 10.1109/SECPRI.1997.601312

B. Johanson, O. Fox, and T. Winograd, The Interactive Workspaces project: experiences with ubiquitous computing rooms, IEEE Pervasive Computing, vol.1, issue.2, pp.67-74, 2002.
DOI : 10.1109/MPRV.2002.1012339

L. Kagal, T. W. Finin, and A. Joshi, A policy language for a pervasive computing environment, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.63-74, 2003.
DOI : 10.1109/POLICY.2003.1206958

L. Kagal, V. Korolev, S. Avancha, A. Joshi, T. Finin et al., Centaurus: an infrastructure for service management in ubiquitous computing environments, Wireless Networks, vol.8, issue.6, pp.619-635, 2002.
DOI : 10.1023/A:1020385804671

L. Kagal, V. Korolev, H. Chen, A. Joshi, and T. W. Finin, Centaurus: a framework for intelligent services in a mobile environment, Proceedings 21st International Conference on Distributed Computing Systems Workshops, pp.195-201, 2001.
DOI : 10.1109/CDCS.2001.918705

L. Kagal, F. Perich, A. Joshi, and T. Finin, A security architecture based on trust management for pervasive computing systems, Grace Hopper Celebration of Women in Computing, 2002.

]. L. Kagal, J. Undercoffer, F. Perich, A. Joshi, T. Finin et al., Vigil: Providing trust for enhanced security in pervasive systems, 2001.

A. D. Keromytis, S. Ioannidis, M. B. Greenwald, and J. M. Smith, Scalable security policy mechanisms, 2001.

A. Kissinger and J. C. Hale, Lopol: A deductive database approach to policy analysis and rewriting, Second Annual SELinux Symposium, 2006.

D. Lin, P. Rao, E. Bertino, N. Li, and J. Lobo, EXAM: a comprehensive environment for the analysis of access control policies, International Journal of Information Security, vol.9, issue.3, 2007.
DOI : 10.1007/s10207-010-0106-1

D. Maier and D. Warren, Computing with logic: logic programming with Prolog, 1988.

J. Mclean, A comment on the ???basic security theorem??? of Bell and LaPadula, Information Processing Letters, vol.20, issue.2, pp.67-70, 1985.
DOI : 10.1016/0020-0190(85)90065-1

S. Mokhtar, D. Fournier, N. Georgantas, and V. Issarny, Context-Aware Service Composition in Pervasive Computing Environments, Rapid Integration of Software Engineering Techniques, pp.129-144, 2006.
DOI : 10.1007/11426646_2

URL : https://hal.archives-ouvertes.fr/inria-00415111

D. J. Moore, I. A. Essa, and M. H. Iii, Exploiting human actions and object context for recognition tasks, Proceedings of the Seventh IEEE International Conference on Computer Vision, p.80, 1999.
DOI : 10.1109/ICCV.1999.791201

P. Naldurg, S. Schwoon, S. Rajamani, and J. Lambert, :, Proceedings of the fourth ACM workshop on Formal methods in security , FMSE '06, pp.55-66, 2006.
DOI : 10.1145/1180337.1180343

J. Nehmer, M. Becker, A. Karshmer, and R. Lamm, Living assistance systems, Proceeding of the 28th international conference on Software engineering , ICSE '06, pp.43-50, 2006.
DOI : 10.1145/1134285.1134293

R. D. Neto and M. D. Pimentel, Toward a domainindependent semantic model for context-aware computing, Proceedings of the Third Latin American Web Congress, LA- WEB '05, p.61, 2005.

U. S. Of-defense, Trusted computer system evaluation criteria, 1985.

R. Orfali and D. Harkey, Client/server programming with Java and CORBA, 1998.

X. Ou and S. Govindavajhala, Mulval: A logic-based network security analyzer, 14th USENIX Security Symposium, pp.113-128, 2005.

T. Parr, The Definitive ANTLR Reference: Building Domain- Specific Languages. Pragmatic Programmers. Pragmatic Bookshelf, 2007.

E. Pitt, K. Mcniff, and . Java, rmi: The Remote Method Invocation Guide, 2001.

A. Ranganathan, S. Chetan, J. Al-muhtadi, R. H. Campbell, and M. D. Mickunas, Olympus: A High-Level Programming Model for Pervasive Computing Environments, Third IEEE International Conference on Pervasive Computing and Communications, pp.7-16, 2005.
DOI : 10.1109/PERCOM.2005.26

I. Ray, M. Kumar, and L. Yu, LRBAC: A Location-Aware Role-Based Access Control Model, Proceedings of the 2nd International Conference on Information Systems Security, pp.147-161, 2006.
DOI : 10.1007/11961635_10

W. Reisig and G. Rozenberg, Lectures on Petri Nets I: Basic Models, volume 1491 of Lecture Notes in Computer Science, 1998.

C. Ribeiro, A. Zuquete, P. Ferreira, and P. Guedes, Spl: An access control language for security policies and complex constraints, NDSS, 2001.

M. Román, C. Hess, R. Cerqueira, A. Ranganathan, R. H. Campbell et al., A middleware infrastructure for active spaces, IEEE Pervasive Computing, vol.1, issue.4, pp.74-83, 2002.
DOI : 10.1109/MPRV.2002.1158281

J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson et al., Sip: Session initiation protocol, 2002.
DOI : 10.17487/rfc3261

F. Sadri, Ambient intelligence, ACM Computing Surveys, vol.43, issue.4, pp.1-36, 2011.
DOI : 10.1145/1978802.1978815

]. D. Salber, A. K. Dey, and G. D. Abowd, The context toolkit, Proceedings of the SIGCHI conference on Human factors in computing systems the CHI is the limit, CHI '99, pp.434-441, 1999.
DOI : 10.1145/302979.303126

G. Sampemane, P. Naldurg, and R. H. Campbell, Access control for Active Spaces, 18th Annual Computer Security Applications Conference, 2002. Proceedings., p.343, 2002.
DOI : 10.1109/CSAC.2002.1176306

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

B. Sarna-starosta and S. D. Stoller, Policy analysis for security-enhanced linux, Proceedings of the 2004 Workshop on Issues in the Theory of Security (WITS), pp.1-12, 2004.

M. Satyanarayanan, Pervasive computing: vision and challenges, IEEE Personal Communications, vol.8, issue.4, pp.10-17, 2001.
DOI : 10.1109/98.943998

P. Schneider-kamp, J. Giesl, A. Serebrenik, and R. Thiemann, Automated Termination Analysis for Logic Programs by Term Rewriting, Proceedings of the 16th international conference on Logic-based program synthesis and transformation , LOPSTR'06, pp.177-193, 2007.
DOI : 10.1007/978-3-540-71410-1_13

E. Serral, P. Valderas, and V. Pelechano, Towards the Model Driven Development of context-aware pervasive systems, Pervasive and Mobile Computing, vol.6, issue.2, pp.254-280, 2010.
DOI : 10.1016/j.pmcj.2009.07.006

N. Shadbolt, Brain power, IEEE Intelligent Systems, vol.18, issue.3, pp.2-3, 2003.
DOI : 10.1109/MIS.2003.1200718

A. Singh, C. R. Ramakrishnan, I. V. Ramakrishnan, S. D. Stoller, and D. S. Warren, Security policy analysis using deductive spreadsheets, Proceedings of the 2007 ACM workshop on Formal methods in security engineering , FMSE '07, pp.42-50, 2007.
DOI : 10.1145/1314436.1314443

M. Sloman and E. Lupu, Engineering Policy-Based Ubiquitous Systems, The Computer Journal, vol.53, issue.7, pp.1113-1127, 2010.
DOI : 10.1093/comjnl/bxp102

J. A. Sousa and D. Garlan, Aura: an architectural framework for user mobility in ubiquitous computing environments The Netherlands , The Netherlands, Proceedings of the IFIP 17th World Computer Congress, WICSA 3, pp.29-43, 2002.

R. N. Taylor, N. Medvidovic, and E. M. Dashofy, Software architecture, Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering on European software engineering conference and foundations of software engineering symposium, ESEC/FSE '09, 2009.
DOI : 10.1145/1595696.1595754

URL : https://hal.archives-ouvertes.fr/hal-00444077

D. Thomas, MDA: Revenge of the modelers or UML utopia?, IEEE Software, vol.21, issue.3, pp.15-17, 2004.
DOI : 10.1109/MS.2004.1293067

K. Vaniea, Q. Ni, L. Cranor, and E. Bertino, Access control policy analysis and visualization tools for security professionals, USM'08: Workshop on Usable IT Security Management, 2008.

D. C. Verma, Policy-Based Networking: Architecture and Algorithms, 2000.

T. D. Wang, B. Parsia, and J. Hendler, A Survey of the Web Ontology Landscape, Proceedings of the International Semantic Web Conference, ISWC, 2006.
DOI : 10.1007/11926078_49

M. Weiser, The computer for the 21st century, Scientific American, vol.265, issue.3, pp.66-75, 1991.

M. Weiser and J. S. Brown, The Coming Age of Calm Technology, 1996.
DOI : 10.1007/978-1-4612-0685-9_6

M. Weiser, R. Gold, and J. S. Brown, The origins of ubiquitous computing research at PARC in the late 1980s, IBM Systems Journal, vol.38, issue.4, pp.693-696, 1999.
DOI : 10.1147/sj.384.0693

D. M. Weiss, Commonality Analysis: A Systematic Process for Defining Families, Lecture Notes in Computer Science, vol.1429, pp.214-225, 1998.
DOI : 10.1007/3-540-68383-6_30

D. M. Weiss and L. C. , Software Product Line Engineering, 1999.

M. Youngblood and D. J. Cook, The mavhome architecture, 2004.

N. Zhang, M. Ryan, and D. P. Guelev, Synthesising verified access control systems in XACML, Proceedings of the 2004 ACM workshop on Formal methods in security engineering , FMSE '04, pp.56-65, 2004.
DOI : 10.1145/1029133.1029141