The invisible future: The seamless integration of technology into everyday life, 2002. ,
The New Everyday View on Ambient Intelligence, 2003. ,
Towards a Better Understanding of Context and Context-Awareness, Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing, HUC '99, pp.304-307, 1999. ,
DOI : 10.1007/3-540-48157-5_29
Renewed understanding of access control policies, Proceeding of the 16th National Computer Security Conference, pp.87-96, 1993. ,
Policy Ratification, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05), pp.223-232, 2005. ,
DOI : 10.1109/POLICY.2005.25
Static verification of security requirements in role based CSCW systems, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, pp.196-203, 2003. ,
DOI : 10.1145/775412.775438
Smart Homes: Past, Present and Future, Inside the Smart Home, pp.17-39, 2003. ,
DOI : 10.1007/1-85233-854-7_2
Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004. ,
DOI : 10.1109/TDSC.2004.2
Term rewriting and all that, 1998. ,
Efficient comparison of enterprise privacy policies, Proceedings of the 2004 ACM symposium on Applied computing , SAC '04, pp.375-382, 2004. ,
DOI : 10.1145/967900.967983
In search of usable security: five lessons from the field, IEEE Security & Privacy Magazine, vol.2, issue.5, pp.19-24, 2004. ,
DOI : 10.1109/MSP.2004.71
Tom: Piggybacking Rewriting on Java, Conference on Rewriting Techniques and Applications, pp.36-47, 2007. ,
DOI : 10.1007/978-3-540-73449-9_5
URL : https://hal.archives-ouvertes.fr/inria-00142045
Software Architecture in Practice, 2003. ,
Services Mashups: The New Generation of Web Applications, IEEE Internet Computing, vol.12, issue.5, pp.13-15, 2008. ,
DOI : 10.1109/MIC.2008.110
What is computer security? In Security & Privacy, pp.67-69, 2003. ,
Introduction to Computer Security, 2004. ,
Automatic verification of sufficient completeness for conditional constrained term rewriting systems, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00070163
Formal Specification and Validation of Security Policies, Foundations & Practice of Security, pp.148-163, 2011. ,
DOI : 10.1007/978-3-642-27901-0_12
URL : https://hal.archives-ouvertes.fr/inria-00507300
End-to- End Quality of Service Over Heterogeneous Networks, 2008. ,
DOI : 10.1007/978-3-540-79120-1
The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.206-214, 1989. ,
DOI : 10.1109/SECPRI.1989.36295
Java Programming with CORBA, Third Edition, 2001. ,
DiaSim: A Parameterized Simulator for Pervasive Computing Applications, 6th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous'09), 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00403421
Développement logiciel orienté paradigme de conception: la programmation dirigée par la spécification, 2011. ,
A generative programming approach to developing pervasive computing systems, GPCE '09: Proceedings of the 8th international conference on Generative programming and component engineering, pp.137-146, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00405819
Adaptation in context???aware pervasive information systems: the SECAS project, International Journal of Pervasive Computing and Communications, vol.3, issue.4, pp.400-425, 2007. ,
DOI : 10.1108/17427370710863130
URL : https://hal.archives-ouvertes.fr/hal-01505328
SOUPA: standard ontology for ubiquitous and pervasive applications, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004., 2004. ,
DOI : 10.1109/MOBIQ.2004.1331732
Towards fault tolerant pervasive computing, Pervasive 2004 Workshop on Sustainable Pervasive Computing, pp.38-44, 2004. ,
DOI : 10.1109/MTAS.2005.1407746
Gaia: A development infrastructure for active spaces, Workshop on Application Models and Programming Tools for Ubiquitous Computing, 2001. ,
A comparison of commercial and military computer security policies. Security and Privacy, IEEE Symposium on, p.184, 1987. ,
A Multi-agent Approach to Controlling a Smart Environment The ponder policy specification language, Proceedings of the International Workshop on Policies for Distributed Systems and Networks, POLICY '01, pp.165-182, 2001. ,
OSGi in Depth, 2011. ,
Réécriture et Modularité pour les Politiques de Sécurité, 2008. ,
A Context-Based Infrastructure for Smart Environments, 1999. ,
DOI : 10.1007/978-1-4471-0743-9_11
At Home with Ubiquitous Computing: Seven Challenges, Proceedings of the 3rd international conference on Ubiquitous Computing, UbiComp '01, pp.256-272, 2001. ,
DOI : 10.1007/3-540-45427-6_22
Role-based access control, 15th NIST-NCSC National Computer Security Conference, pp.554-563, 1992. ,
Verification and change-impact analysis of accesscontrol policies, Proceedings of the 27th international conference on Software engineering, ICSE '05, pp.196-205, 2005. ,
Domain-Specific Languages (Addison-Wesley Signature Series (Fowler)), 2010. ,
Access Nets: Modeling Access to Physical Spaces, Proceedings of the 12th international conference on Verification, model checking , and abstract interpretation, pp.184-198, 2011. ,
DOI : 10.1007/978-3-540-30144-8_19
Project Aura: toward distraction-free pervasive computing, IEEE Pervasive Computing, vol.1, issue.2, pp.22-31, 2002. ,
DOI : 10.1109/MPRV.2002.1012334
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.7105
Decidable approximations of sets of descendants and sets of normal forms, 9th Conference on Rewriting Techniques and Applications, pp.151-165, 1998. ,
DOI : 10.1007/BFb0052368
URL : https://hal.archives-ouvertes.fr/inria-00073364
Middleware: Middleware Challenges and Approaches for Wireless Sensor Networks, IEEE Distributed Systems Online, vol.7, issue.3, pp.1-16, 2006. ,
DOI : 10.1109/MDSO.2006.19
Individualization, globalization and health ??? about sustainable information technologies and the aim of medical informatics, International Journal of Medical Informatics, vol.75, issue.12, pp.795-808, 2006. ,
DOI : 10.1016/j.ijmedinf.2006.05.045
Access control in an open distributed environment, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.3-15, 1998. ,
DOI : 10.1109/SECPRI.1998.674819
Infrastructure for pervasive computing: Challenges, In GI Jahrestagung, issue.1, pp.214-222, 2001. ,
Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001. ,
DOI : 10.1145/383891.383894
A logical language for expressing authorizations, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.31-42, 1997. ,
DOI : 10.1109/SECPRI.1997.601312
The Interactive Workspaces project: experiences with ubiquitous computing rooms, IEEE Pervasive Computing, vol.1, issue.2, pp.67-74, 2002. ,
DOI : 10.1109/MPRV.2002.1012339
A policy language for a pervasive computing environment, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.63-74, 2003. ,
DOI : 10.1109/POLICY.2003.1206958
Centaurus: an infrastructure for service management in ubiquitous computing environments, Wireless Networks, vol.8, issue.6, pp.619-635, 2002. ,
DOI : 10.1023/A:1020385804671
Centaurus: a framework for intelligent services in a mobile environment, Proceedings 21st International Conference on Distributed Computing Systems Workshops, pp.195-201, 2001. ,
DOI : 10.1109/CDCS.2001.918705
A security architecture based on trust management for pervasive computing systems, Grace Hopper Celebration of Women in Computing, 2002. ,
Vigil: Providing trust for enhanced security in pervasive systems, 2001. ,
Scalable security policy mechanisms, 2001. ,
Lopol: A deductive database approach to policy analysis and rewriting, Second Annual SELinux Symposium, 2006. ,
EXAM: a comprehensive environment for the analysis of access control policies, International Journal of Information Security, vol.9, issue.3, 2007. ,
DOI : 10.1007/s10207-010-0106-1
Computing with logic: logic programming with Prolog, 1988. ,
A comment on the ???basic security theorem??? of Bell and LaPadula, Information Processing Letters, vol.20, issue.2, pp.67-70, 1985. ,
DOI : 10.1016/0020-0190(85)90065-1
Context-Aware Service Composition in Pervasive Computing Environments, Rapid Integration of Software Engineering Techniques, pp.129-144, 2006. ,
DOI : 10.1007/11426646_2
URL : https://hal.archives-ouvertes.fr/inria-00415111
Exploiting human actions and object context for recognition tasks, Proceedings of the Seventh IEEE International Conference on Computer Vision, p.80, 1999. ,
DOI : 10.1109/ICCV.1999.791201
:, Proceedings of the fourth ACM workshop on Formal methods in security , FMSE '06, pp.55-66, 2006. ,
DOI : 10.1145/1180337.1180343
Living assistance systems, Proceeding of the 28th international conference on Software engineering , ICSE '06, pp.43-50, 2006. ,
DOI : 10.1145/1134285.1134293
Toward a domainindependent semantic model for context-aware computing, Proceedings of the Third Latin American Web Congress, LA- WEB '05, p.61, 2005. ,
Trusted computer system evaluation criteria, 1985. ,
Client/server programming with Java and CORBA, 1998. ,
Mulval: A logic-based network security analyzer, 14th USENIX Security Symposium, pp.113-128, 2005. ,
The Definitive ANTLR Reference: Building Domain- Specific Languages. Pragmatic Programmers. Pragmatic Bookshelf, 2007. ,
rmi: The Remote Method Invocation Guide, 2001. ,
Olympus: A High-Level Programming Model for Pervasive Computing Environments, Third IEEE International Conference on Pervasive Computing and Communications, pp.7-16, 2005. ,
DOI : 10.1109/PERCOM.2005.26
LRBAC: A Location-Aware Role-Based Access Control Model, Proceedings of the 2nd International Conference on Information Systems Security, pp.147-161, 2006. ,
DOI : 10.1007/11961635_10
Lectures on Petri Nets I: Basic Models, volume 1491 of Lecture Notes in Computer Science, 1998. ,
Spl: An access control language for security policies and complex constraints, NDSS, 2001. ,
A middleware infrastructure for active spaces, IEEE Pervasive Computing, vol.1, issue.4, pp.74-83, 2002. ,
DOI : 10.1109/MPRV.2002.1158281
Sip: Session initiation protocol, 2002. ,
DOI : 10.17487/rfc3261
Ambient intelligence, ACM Computing Surveys, vol.43, issue.4, pp.1-36, 2011. ,
DOI : 10.1145/1978802.1978815
The context toolkit, Proceedings of the SIGCHI conference on Human factors in computing systems the CHI is the limit, CHI '99, pp.434-441, 1999. ,
DOI : 10.1145/302979.303126
Access control for Active Spaces, 18th Annual Computer Security Applications Conference, 2002. Proceedings., p.343, 2002. ,
DOI : 10.1109/CSAC.2002.1176306
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Policy analysis for security-enhanced linux, Proceedings of the 2004 Workshop on Issues in the Theory of Security (WITS), pp.1-12, 2004. ,
Pervasive computing: vision and challenges, IEEE Personal Communications, vol.8, issue.4, pp.10-17, 2001. ,
DOI : 10.1109/98.943998
Automated Termination Analysis for Logic Programs by Term Rewriting, Proceedings of the 16th international conference on Logic-based program synthesis and transformation , LOPSTR'06, pp.177-193, 2007. ,
DOI : 10.1007/978-3-540-71410-1_13
Towards the Model Driven Development of context-aware pervasive systems, Pervasive and Mobile Computing, vol.6, issue.2, pp.254-280, 2010. ,
DOI : 10.1016/j.pmcj.2009.07.006
Brain power, IEEE Intelligent Systems, vol.18, issue.3, pp.2-3, 2003. ,
DOI : 10.1109/MIS.2003.1200718
Security policy analysis using deductive spreadsheets, Proceedings of the 2007 ACM workshop on Formal methods in security engineering , FMSE '07, pp.42-50, 2007. ,
DOI : 10.1145/1314436.1314443
Engineering Policy-Based Ubiquitous Systems, The Computer Journal, vol.53, issue.7, pp.1113-1127, 2010. ,
DOI : 10.1093/comjnl/bxp102
Aura: an architectural framework for user mobility in ubiquitous computing environments The Netherlands , The Netherlands, Proceedings of the IFIP 17th World Computer Congress, WICSA 3, pp.29-43, 2002. ,
Software architecture, Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering on European software engineering conference and foundations of software engineering symposium, ESEC/FSE '09, 2009. ,
DOI : 10.1145/1595696.1595754
URL : https://hal.archives-ouvertes.fr/hal-00444077
MDA: Revenge of the modelers or UML utopia?, IEEE Software, vol.21, issue.3, pp.15-17, 2004. ,
DOI : 10.1109/MS.2004.1293067
Access control policy analysis and visualization tools for security professionals, USM'08: Workshop on Usable IT Security Management, 2008. ,
Policy-Based Networking: Architecture and Algorithms, 2000. ,
A Survey of the Web Ontology Landscape, Proceedings of the International Semantic Web Conference, ISWC, 2006. ,
DOI : 10.1007/11926078_49
The computer for the 21st century, Scientific American, vol.265, issue.3, pp.66-75, 1991. ,
The Coming Age of Calm Technology, 1996. ,
DOI : 10.1007/978-1-4612-0685-9_6
The origins of ubiquitous computing research at PARC in the late 1980s, IBM Systems Journal, vol.38, issue.4, pp.693-696, 1999. ,
DOI : 10.1147/sj.384.0693
Commonality Analysis: A Systematic Process for Defining Families, Lecture Notes in Computer Science, vol.1429, pp.214-225, 1998. ,
DOI : 10.1007/3-540-68383-6_30
Software Product Line Engineering, 1999. ,
The mavhome architecture, 2004. ,
Synthesising verified access control systems in XACML, Proceedings of the 2004 ACM workshop on Formal methods in security engineering , FMSE '04, pp.56-65, 2004. ,
DOI : 10.1145/1029133.1029141