A. , F. Abel, J. Luca-de-coi, N. Henze, A. W. Koesling et al., Enabling Advanced and Context- Dependent Access Control in RDF Stores, pp.1-14, 2007.

M. Baldauf, S. Dustdar, and F. Rosenberg, A survey on context-aware systems, International Journal of Ad Hoc and Ubiquitous Computing, vol.2, issue.4, p.17, 2007.
DOI : 10.1504/IJAHUC.2007.014070

L. Chen, D. Chilton, R. Connolly, J. Dhanaraj, A. Hollenbach et al., Tabulator: Exploring and analyzing linked data on the semantic web, Proceedings of the 3rd International Semantic Web User Interaction Workshop, 2006.

E. Bertino and M. S. Kirkpatrick, Location-Aware Authentication and Access Control, Procs of the IEEE 23rd Int. Conf. on Advanced Information Networking and Applications (AINA-2009), pp.10-15, 2009.
DOI : 10.1109/aina.2009.50

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. Bolchini, C. A. Curino, E. Quintarelli, and F. A. , Schreiber and Letizia Tanca. A data-oriented survey of context models. SIG- MOD Rec, pp.19-26, 2007.

]. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. M. Thuraisingham, Semantic web-based social network access control, Computers & Security, vol.30, issue.2-3, pp.108-115, 2011.
DOI : 10.1016/j.cose.2010.08.003

J. Jeremy and . Carroll, Matching RDF Graphs, Procs of ISWC, pp.5-15, 2002.

J. Jeremy, C. Carroll, . Bizer, and J. Patrick, Hayes and Patrick Stickler. Named graphs, J. Web Sem, vol.3, issue.4, pp.247-267, 2005.

S. Castano, A. Ferrara, S. Montanelli, and G. Varese, Ontology and Instance Matching, Knowledge-Driven Multimedia Information Extraction and Ontology Evolution, pp.167-195, 2011.
DOI : 10.1023/A:1009761603038

H. Chen, F. Perich, T. W. Finin, and A. Joshi, SOUPA: standard ontology for ubiquitous and pervasive applications, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004., p.24, 2004.
DOI : 10.1109/MOBIQ.2004.1331732

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

]. Chen, X. Xie, W. Ma, and H. Zhang, Adapting Web Pages for Small-Screen Devices, IEEE Internet Computing, vol.9, issue.1, pp.50-56, 2005.
DOI : 10.1109/MIC.2005.5

W. William, P. D. Cohen, S. E. Ravikumar, and . Fienberg, A Comparison of String Distance Metrics for Name-Matching Tasks, IIWeb, pp.73-78, 2003.

A. Corradi, R. Montanari, and D. Tibaldi, Context-based access control management in ubiquitous environments, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings., pp.253-260, 2004.
DOI : 10.1109/NCA.2004.1347784

]. L. Costabello, S. Villata, and F. Gandon, Context-Aware Access Control for RDF Graph Stores, Procs of ECAI, pp.282-287, 0118.
URL : https://hal.archives-ouvertes.fr/hal-00724041

S. Luca-costabello, N. Villata, F. Delaforge, and . Gandon, Linked Data Access Goes Mobile: Context-Aware Authorization for Graph Stores, LDOW, 2012, 2012.

S. Luca-costabello, O. R. Villata, F. Rocha, and . Gandon, Access Control for HTTP Operations on Linked Data, Lecture Notes in Computer Science, vol.7882, issue.118, pp.185-199, 2013.
DOI : 10.1007/978-3-642-38288-8_13

S. Luca-costabello, I. Villata, F. Vagliano, and . Gandon, Assisted Policy Management for SPARQL Endpoints Access Control, International Semantic Web Conference (Posters & Demos), pp.33-36, 2013.

M. J. Covington, W. Long, S. Srinivasan, A. K. Dey, M. Ahamad et al., Securing Contextaware Applications using Environment Roles, Procs of SACMAT, pp.10-20, 2001.

J. Michael, M. R. Covington, and . Sastry, A Contextual Attribute-Based Access Control Model, Procs of the Workshops On the Move to Meaningful Internet Systems (OTM-2006), pp.1996-2006, 2006.

]. Cui, M. Honkala, K. Pihkala, K. Kinnunen, and G. Grassel, Linked internet UI, Proceedings of the 12th international conference on Human computer interaction with mobile devices and services, MobileHCI '10, pp.45-54, 2010.
DOI : 10.1145/1851600.1851611

M. Aba-sah-dadzie, D. Rowe, and . Petrelli, Hide the Stack: Toward Usable Linked Data, Procs of ESWC, pp.93-107, 2011.

K. Anind and . Dey, Understanding and Using Context. Personal Ubiquitous Comput, pp.4-7, 2001.

T. W. Finin, A. Joshi, L. Kagal, J. Niu, R. S. Sandhu et al., ROWL- BAC: representing role based access control in OWL, Procs of SACMAT, pp.73-82, 2008.

L. Fabien and . Gandon, Generating Surrogates to Make the Semantic Web Intelligible to End-Users, Web Intelligence, pp.352-358, 2005.

]. Gao, B. Xiao, D. Tao, and X. Li, A survey of graph edit distance, Pattern Analysis and Applications, vol.72, issue.3, pp.113-129, 2010.
DOI : 10.1007/s10044-008-0141-y

A. Gasimov, F. Magagna, and J. Sutanto, CAMB, Proceedings of the 9th International Conference on Mobile and Ubiquitous Multimedia, MUM '10, p.2010, 2010.
DOI : 10.1145/1899475.1899497

]. Giereth, On Partial Encryption of RDF-Graphs, ISWC, LNCS, pp.308-322, 2005.
DOI : 10.1007/11574620_24

]. Giunchiglia, R. Zhang, and B. Crispo, Ontology Driven Community Access Control, Procs of SPOT, p.83, 2009.

]. Hasnain, M. Al-bakri, L. Costabello, Z. Cong, I. Davis et al., Spamming in Linked Data, Third International Workshop on Consuming Linked Data (COLD2012), p.2012, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00751205

]. Hollenbach, J. Presbrey, and T. Berners-lee, Using RDF Metadata To Enable Access Control on the Social Semantic Web, Procs of CK, pp.80-84, 2009.

J. Hong, E. Suh, and S. Kim, Context-aware systems: A literature review and classification, Expert Systems with Applications, vol.36, issue.4, pp.8509-8522, 2009.
DOI : 10.1016/j.eswa.2008.10.071

]. R. Hulsebosch, A. Salden, M. Bargh, P. Ebben, and J. Reitsma, Context sensitive access control, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.111-119, 2005.
DOI : 10.1145/1063979.1064000

]. Huynh, D. R. Karger, and D. Quan, Haystack, Proceedings of the 8th international conference on Intelligent user interfaces, IUI '03, pp.40-41, 2002.
DOI : 10.1145/604045.604116

C. Kiefer, A. Bernstein, and M. Stocker, The Fundamentals of iSPARQL: A Virtual Triple Approach for Similarity-Based Semantic Web Tasks, Procs of ISWC/ASWC, pp.295-309, 2007.
DOI : 10.1007/978-3-540-76298-0_22

A. Sabrina-kirrane, A. Abdelrahman, S. Mileo, and . Decker, Secure Manipulation of Linked Data, International Semantic Web Conference, pp.248-263, 2013.

K. Panu and J. Mäntyjärvi, An Ontology for Mobile Device Sensor-Based Context Awareness, Procs of the 4th International and Interdisciplinary Conference Modeling and Using Context (CONTEXT- 2003), pp.22-24, 2003.

]. Kulkarni and A. Tripathi, Context-aware role-based access control in pervasive computing systems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.113-122, 2008.
DOI : 10.1145/1377836.1377854

]. Lopez, V. S. Uren, M. Sabou, and E. Motta, Is Question Answering fit for the Semantic Web?: A survey, Semantic Web, pp.125-155, 2011.

T. Lovett, O. Eamonn, and . Neill, Mobile context awareness, p.16, 2012.
DOI : 10.1145/1864431.1864508

L. Schraefel and . Rutledge, User interaction in semantic web research, Web Semantics: Science, Services and Agents on the World Wide Web, vol.8, issue.4, pp.375-376, 2010.
DOI : 10.1016/j.websem.2010.10.003

D. Malandrino, F. Mazzoni, D. Riboni, C. Bettini, M. Colajanni et al., MIMOSA: context-aware adaptation for ubiquitous web access, Personal and Ubiquitous Computing, pp.301-320, 2010.
DOI : 10.1007/s00779-009-0232-9

]. B. Messmer and H. Bunke, A new algorithm for error-tolerant subgraph isomorphism detection. Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol.20, issue.46, pp.493-504, 1998.

H. Muhleisen, M. Kost, and J. Freytag, SWRL-based Access Policies for Linked Data, Procs of SPOT, pp.80-85, 2010.

A. Ngomo, L. Bühmann, C. Unger, J. Lehmann, and D. Gerber, Sorry, i don't speak SPARQL, Proceedings of the 22nd international conference on World Wide Web, WWW '13, pp.977-988
DOI : 10.1145/2488388.2488473

L. Nigay and J. Coutaz, A design space for multimodal systems, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '93, pp.172-178, 1993.
DOI : 10.1145/169059.169143

F. Paternò and G. Zichittella, Desktop-to-Mobile Web Adaptation through Customizable Two-Dimensional Semantic Redesign, HCSE, pp.79-94, 2010.
DOI : 10.1007/978-3-642-16488-0_7

]. C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, Context Aware Computing for The Internet of Things: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.1-41, 2013.
DOI : 10.1109/SURV.2013.042313.00197

E. Pietriga, C. Bizer, D. Karger, and R. Lee, Fresnel: A Browser-Independent Presentation Vocabulary for RDF, Procs of ISWC, pp.158-171, 2006.
DOI : 10.1007/11926078_12

URL : https://hal.archives-ouvertes.fr/inria-00001057

D. Bergh, A. Wagelaar, P. Georges, T. Rigole, Y. Clerckx et al., Viviane Jonckers and Koen Bosschere. Towards an Extensible Context Ontology for Ambient Intelligence, Panos Markopoulos, Berry Eggen, 2004.

. Crowley, Ambient Intelligence, Lecture Notes in Computer Science, vol.3295, issue.25, pp.148-159, 2004.
URL : https://hal.archives-ouvertes.fr/hal-00953343

D. Quan, D. Huynh, R. David, and . Karger, Haystack: A Platform for Authoring End User Semantic Web Applications, The semantic web-ISWC 2003, pp.738-753, 2003.
DOI : 10.1007/978-3-540-39718-2_47

D. Quan and D. R. Karger, Xenon: An RDF Stylesheet Ontology, Procs of WWW, 2005.

]. Reynolds, M. Hausenblas, A. Polleres, M. Hauswirth, and V. Hegde, Exploiting linked open data for mobile augmented reality, W3C Workshop: Augmented Reality on the Web, 2010.

X. Kaspar-riesen, H. Jiang, and . Bunke, Exact and Inexact Graph Matching: Methodology and Applications, Managing and Mining Graph Data, pp.217-247, 2010.

J. Lloyd-rutledge, L. Van-ossenbruggen, and . Hardman, Making RDF presentable, Proceedings of the 14th international conference on World Wide Web , WWW '05, pp.199-206, 2005.
DOI : 10.1145/1060745.1060777

O. Sacco and A. Passant, A Privacy Preference Manager for the Social Semantic Web, Procs of the 2nd Workshop on Semantic Personalized Information Management: Retrieval and Recommendation (SPIM-2011), 2011.

]. Sacco, A. Passant, and S. Decker, An Access Control Framework for the Web of Data, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp.456-463, 2011.
DOI : 10.1109/TrustCom.2011.59

M. Norman, . Sadeh, L. Fabien, . Gandon, B. Oh et al., Ambient intelligence: The mycampus experience. Rapport technique, DTIC Document, p.83, 2005.

S. Ravi, E. J. Sandhu, H. L. Coyne, C. E. Feinstein, and . Youman, Role-Based Access Control Models, IEEE Computer, vol.29, issue.85, pp.38-47, 1996.

A. and R. Want, Context-aware computing applications, Mobile Computing Systems and Applications, pp.85-90, 1994.

]. Shen and Y. Cheng, A Context-Aware Semantic-Based Access Control Model for Mobile Web Services, I. J. Computer Network and Information Security, vol.18, issue.3, pp.18-25, 2011.
DOI : 10.1007/978-3-642-13136-3_20

D. Sonntag and P. Heim, A Constraint-Based Graph Visualisation Architecture for Mobile Semantic Web Interfaces, Lecture Notes in Computer Science, vol.4816, pp.158-171, 2007.
DOI : 10.1007/978-3-540-77051-0_18

A. Toninelli, R. Montanari, L. Kagal, and O. Lassila, A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments, ISWC, LNCS, pp.473-486, 2006.
DOI : 10.1007/11926078_34

A. Toninelli, R. Montanari, L. Kagal, and O. Lassila, Proteus: A Semantic Context-Aware Adaptive Policy Model, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), pp.129-140, 2007.
DOI : 10.1109/POLICY.2007.40

A. Toninelli, A. Corradi, and R. Montanari, A Quality of Context-Aware Approach to Access Control in Pervasive Environments, Proceedings of the 2nd International Conference on Mobile Wireless Middleware, Operating Systems, and Applications, pp.236-251, 2009.
DOI : 10.1007/978-3-642-01802-2_18

]. J. Ullmann, An Algorithm for Subgraph Isomorphism, Journal of the ACM, vol.23, issue.1, pp.31-42, 1976.
DOI : 10.1145/321921.321925

S. Villata, N. Delaforge, F. Gandon, and A. Gyrard, An Access Control Model for Linked Data, Proceedings of the 7th International IFIP Workshop on Semantic Web & Web Semantics (SWWS-2011), pp.454-463, 2011.
DOI : 10.1016/j.websem.2005.09.001

URL : https://hal.archives-ouvertes.fr/hal-00695229

]. Villata, L. Costabello, N. Delaforge, and F. Gandon, A Social Semantic Web Access Control Model, Journal on Data Semantics, vol.29, issue.2, pp.21-36, 2013.
DOI : 10.1007/s13740-012-0014-9

URL : https://hal.archives-ouvertes.fr/hal-00907866

]. Villata, L. Costabello, and F. Gandon, Cathrine Faron- Zucker and Michel Buffa. Social Semantic Network-based Access Control, p.2013, 2013.

]. Volz, C. Bizer, M. Gaedke, and G. Kobilarov, Discovering and Maintaining Links on the Web of Data, Procs of ISWC, pp.650-665, 2009.
DOI : 10.1007/978-3-642-04930-9_41

]. X. Wang, D. Zhang, T. Gu, and H. K. Pung, Ontology based context modeling and reasoning using OWL, Pervasive Computing and Communications Workshops Proceedings of the Second IEEE Annual Conference on, pp.18-22, 2004.

W. Van-woensel, S. Casteleyn, and O. D. Troyer, A generic approach for on-the-fly adding of context-aware features to existing websites, Proceedings of the 22nd ACM conference on Hypertext and hypermedia, HT '11, pp.143-152, 2011.
DOI : 10.1145/1995966.1995987

]. H. Zimmermann, OSI Reference Model--The ISO Model of Architecture for Open Systems Interconnection, IEEE Transactions on Communications, vol.28, issue.4, pp.425-432, 1980.
DOI : 10.1109/TCOM.1980.1094702

]. Zou, L. Chen, M. T. Özsu, and D. Zhao, Answering pattern match queries in large graph databases via graph embedding, The VLDB Journal, vol.23, issue.2, pp.97-120, 2012.
DOI : 10.1007/s00778-011-0238-6