.. Politique-de-sensibilité-aux-résultats-de-déploiement, 86 4.2.4 Génération du graphe de déploiement et problème de monotonicité, p.88

P. Évaluation-des, 136 5.5.1 Temps d'exécution du processus d'adaptation

A. Kamoun, S. Tazi, and K. Drira, http://kaon2.semanticweb.org/ 6 Fadyrcos, a semantic interoperability framework for collaborative model-based dynamic reconfiguration of networked services, pp.63756-765, 2012.

A. Mougy, A. Kamoun, M. Ibnkahla, S. Tazi, and K. Drira, A context and application-aware framework for resource management in dynamic collaborative wireless M2M networks, Journal of Network and Computer Applications, issue.0, pp.4430-4475, 2014.

D. S. Allison, A. Kamoun, S. Capretz, M. A. Tazi, K. Drira et al., An ontology driven privacy framework for collaborative working environments, International Journal of Autonomous and Adaptive Communications Systems, vol.9, issue.3/4, 2014.
DOI : 10.1504/IJAACS.2016.079624

. A. Conférences-internationales-1, S. Kamoun, K. Tazi, and . Drira, A semantic adaptive framework for collaborative systems, European Concurrent Engineering Conference (ECEC), Bucharest (Romania), 2012.

A. Kamoun and S. Tazi, A Semantic Role-Based Access Control for Intra and Inter-organization Collaboration, 2014 IEEE 23rd International WETICE Conference, p.14, 2014.
DOI : 10.1109/WETICE.2014.77

S. Ramanathan, A. Kamoun, and C. Chassot, Ontology-Based Collaborative Framework for Disaster Recovery Scenarios, 2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.104-106, 2012.
DOI : 10.1109/WETICE.2012.75

URL : https://hal.archives-ouvertes.fr/hal-00683638

A. Kamoun, Virtuoso : yPBL cookbook, International Collaborative Tutorial of Multimedia Ontology-driven Learning Collaborative Approaches (MOLCA), 2012.

A. Kamoun, Access control in liferay, International Collaborative Tutorial of Multimedia Ontology-driven Learning Collaborative Approaches (MOLCA), 2014.

A. Kamoun, Mechanisms for Model-driven Team communication, 2012.

A. Kamoun, Communication Framework -Use Case Definition, 2013.

A. Kamoun, Framework-Tests Reports, 2013.

. [. Bibliographie, S. A. Atluri, and . Chun, A geotemporal role&#45 ;based authorisation system, Int. J. Inf. Comput. Secur, vol.1, issue.12, pp.143-168, 2007.

. D. Adb-+-99-]-g, A. K. Abowd, P. J. Dey, N. Brown, M. Davies et al., Towards a better understanding of context and context-awareness, Proceedings of the 1st International Symposium on Handheld and Ubiquitous Computing, HUC '99, pp.304-307, 1999.

K. [. Arnedo-moreno, L. Matsuo, F. Barolli, V. Xhafa, J. Bharadwaj et al., A security framework for jxta-overlay NBIS '09 Core and Hierarchical Role Based Access Control (RBAC) Profile of XACML v2.0. http://docs.oasis-open.org/xacml/2.0/access_ control-xacml-2.0-rbac-profile1-spec-os.pdf [Online ; accessed 19 Dynamic adaptation of access control policies, Cité page 34.) [And05] A. AndersonCité page 27.) [BB03 Military Communications Conference, 2003. MILCOM '03Cité page 12.) [BBC97] P.J. Brown, J.D. Bovey, and X. Chen. Context-aware applications : from the laboratory to the marketplace. Personal Communications, IEEE, pp.212-219, 1997.

B. [. Bertino, M. L. Catania, P. Damiani, and . Perlasca, Georbac : A spatially aware rbac, Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, SAC- MAT '05, pp.29-37, 2005.

]. F. Bcm-+-03, D. Baader, D. L. Calvanese, D. Mcguinness, P. F. Nardi et al., The Description Logic Handbook : Theory, Implementation, and Applications, 2003.

]. P. Bdcdvs02, S. Bonatti, P. De-capitani-di-vimercati, and . Samarati, An algebra for composing access control policies, ACM Trans. Inf. Syst. Secur, vol.5, issue.1, pp.1-35, 2002.

Y. [. Baina, A. A. Deswarte, M. Kalam, and . Kaaniche, Access control for cooperative systems: A comparative analysis, 2008 Third International Conference on Risks and Security of Internet and Systems, pp.19-26, 2008.
DOI : 10.1109/CRISIS.2008.4757460

A. [. Bhatti, E. Ghafoor, J. B. Bertino, and . Joshi, X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control, ACM Transactions on Information and System Security, vol.8, issue.2, pp.187-227, 2005.
DOI : 10.1145/1065545.1065547

H. [. Brachman and . Levesque, Knowledge Representation and Reasoning, pp.28-29, 2004.

. Brsv-+-09-]-i, G. Bouassida-rodriguez, T. Sancho, S. Villemur, K. Tazi et al., A model-driven adaptive approach for collaborative ubiquitous systems, Proceedings of the 3rd Workshop on Agent-oriented Software Engineering Challenges for Ubiquitous and Pervasive Computing, AUPC 09, pp.15-20, 2009.

]. A. Bul99, . Bullockbx11-]-l, F. Barolli, and . Xhafa, SPACE : SPatial Access Control for Collaborative Virtual Environments Jxta-overlay : A p2p platform for distributed, collaborative, and ubiquitous computing Tamassia. A role and attribute based access control system using semantic web technologies, Cité page 18.) [Cité page 34.) [CCT07] L. Cirio, I. Cruz, and R. Proceedings of the 2007 OTM Confederated International Conference on On the Move to Meaningful Internet Systems -Volume Part II, OTM'07, pp.2163-2172, 1999.

J. [. Coetzee and . Eloff, Virtual enterprise access control requirements, Proceedings of the 2003 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on Enablement Through Technology, SAICSIT '03 South African Institute for Computer Scientists and Information Technologists. (Cité page 36, pp.285-294, 2003.

]. T. Cha07 and . Chaari, Adaptation d'applications pervasives dans des environnements multi-contextes, 2007.

]. N. Cho56 and . Chomsky, Three models for the description of language. Information Theory, IRE Transactions on, vol.2, issue.3, pp.113-124, 1956.

J. [. Chandran and . Joshi, LoT-RBAC: A Location and Time-Based RBAC Model, Web Information Systems Engineering, pp.361-375, 2005.
DOI : 10.1007/11581062_27

]. B. Chang, D. Kim, H. Kim, J. Na, and T. Chung, Active security management based on Secure Zone Cooperation, Future Generation Computer Systems, vol.20, issue.2, pp.283-293, 2004.
DOI : 10.1016/S0167-739X(03)00144-4

. J. Cls-+-01-]-m, W. Covington, S. Long, A. K. Srinivasan, M. Dev et al., Securing context-aware applications using environment roles, Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, SACMAT '01, pp.10-20, 2001.

R. [. Corradi, D. Montanari, and . Tibaldi, Context-based access control for ubiquitous service provisioning Understanding and developing role-based administrative models, Computer Software and Applications Conference Proceedings of the 28th Annual InternationalCité page 31.) [Cra05] J. Crampton Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS '05 ACM. (Cité page 14.) [CS99], pp.444-451, 2004.

H. Peter, K. Carstensen, and . Schmidt, Computer supported cooperative work : New challenges to systems design, Handbook of Human Factors, pp.619-636, 1999.

D. [. Claycomb and . Shin, Enabling delegation for impromptu collaboration in pervasive computing, 2007 22nd international symposium on computer and information sciences, pp.1-6, 2007.
DOI : 10.1109/ISCIS.2007.4456898

I. [. Drira and . Rodriguez, A demonstration of an efficient tool for graph matching and transformation, 10ème Conférence Internationale Francophone sur l'Extraction et la Gestion des Connaissances, pp.71-73, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00448772

K. [. Davies, K. Cheverst, A. Mitchell, and . Efrat, Using and determining location in a context-sensitive tour guide, Computer, vol.34, issue.8, pp.35-41, 2001.
DOI : 10.1109/2.940011

K. Anind and . Dey, Context-aware computing : The cyberdesk project, AAAI 1998 Spring Symposium on Intelligent Environments, pp.51-54, 1998.

[. Dommel and J. Garcia-luna-aceves, Group coordination support for synchronous Internet collaboration, IEEE Internet Computing, vol.3, issue.2, pp.74-80, 1999.
DOI : 10.1109/4236.761656

]. G. Din03 and . Dini, A secure and available electronic voting service for a large-scale distributed system, Future Generation Computer Systems, vol.19, issue.1, pp.69-85, 2001.

L. [. Di, D. Jian, Z. Yabo, and . Miaoliang, Using semantic web technologies to specify constraints of rbac, Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies, PDCAT '05, pp.543-545, 2005.

R. [. Dersingh, A. Liscano, and . Jost, Utilizing semantic knowledge for access control in pervasive and ubiquitous systems, WIMOB '08. IEEE International Conference on Wireless and Mobile Computing, pp.435-441, 2008.

]. A. Emki-+-14, A. Mougy, M. Kamoun, S. Ibnkahla, K. Tazi et al., A context and application-aware framework for resource management in dynamic collaborative wireless {M2M} networks, Journal of Network and Computer Applications, issue.0, pp.4430-4475

J. [. Ferraiolo and . Barkley, Specifying and managing rolebased access control within a corporate intranet, Proceedings of the Second ACM Workshop on Role-based Access Control, RBAC '97, pp.77-82, 1997.

E. [. Ferrini and . Bertino, Supporting RBAC with XACML+OWL, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.145-154, 2009.
DOI : 10.1145/1542207.1542231

R. [. Ferraiolo, G. Chandramouli, S. I. Ahn, and . Gavrila, The role control center, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, pp.12-20, 2003.
DOI : 10.1145/775412.775415

J. [. Ferraiolo, D. R. Cugini, and . Kuhn, Role- Based Access Control (RBAC) : Features and Motivations, 11th Annual Computer Security Applications Proceedings, 1995.

T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu et al., BAC, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.73-82, 2008.
DOI : 10.1145/1377836.1377849

R. [. Ferraiolo, . B. Kuhnfm09-]-j, H. Filho, and . Martin, Role-based access control A generalized context-based access control model for pervasive environments, 15th NIST-NCSC National Computer Security ConferenceCité page 19.) [ Proceedings of the 2Nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, SPRINGL '09Cité page 31.) [For90] Charles L. Forgy. Expert systems. chapter Rete : A Fast Algorithm for the Many Pattern/Many Object Pattern Match Problem, pp.554-563, 1990.

E. Freudenthal, T. Pesin, L. Port, E. Keenan, V. Karamcheti et al., drbac : distributed role-based access control for dynamic coalition environments Proposed nist standard for role-based access control Rainbow : architecture-based self-adaptation with reusable infrastructure, 22nd International Conference on Distributed Computing Systems, pp.411-420224, 2001.

S. [. Groba, T. Grob, and . Springer, Context-Dependent Access Control for Contextual Information, The Second International Conference on Availability, Reliability and Security (ARES'07), pp.155-161, 2007.
DOI : 10.1109/ARES.2007.61

R. [. Gamma, R. Helm, J. Johnson, . K. Vlissidesgmpt01-]-c, I. Georgiadis et al., Design Patterns : Elements of Reusable Object-oriented Software Flexible team-based access control using contexts, Cité page 67.) [ Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, SACMAT '01 ACM. (Cité page 21.) [GP99] A. Gomez-Perez. Ontological engineering : A state of the art. Expert Update, pp.21-2733, 1995.

]. T. Gru93 and . Gruber, A translation approach to portable ontology specifications, Knowl. Acquis, vol.5, issue.2, pp.199-220, 1993.

J. Grudin, Computer-supported cooperative work: history and focus, Computer, vol.27, issue.5, pp.19-26, 1994.
DOI : 10.1109/2.291294

]. N. Gua97 and . Guarino, Some organizing principles for a unified toplevel ontology, AAAI 1997 SPRING SYMPOSIUM ON ON- TOLOGICAL ENGINEERING (LADSEB-CNR INT. REP. 02/97, 1997.

]. K. Gue06 and . Guennoun, Architectures dynamiques dans le contexte des applications à base de composants et orientà c es services, 2006.

I. [. Hannachi, K. Bouassida-rodriguez, S. Drira, and . Hernandez, GMTE: A Tool for Graph Transformation and Exact/Inexact Graph Matching, Graph-Based Representations in Pattern Recognition, pp.71-80
DOI : 10.1007/978-3-642-38221-5_8

]. Heilili, Y. Chen, C. Zhao, Z. Luo, and Z. Lin, An OWL-Based Approach for RBAC with Negative Authorization, Proceedings of the First International Conference on Knowledge Science, Engineering and Management, KSEM'06, pp.164-175, 2006.
DOI : 10.1007/11811220_15

J. [. Henricksen and . Indulska, A software engineering framework for context-aware pervasive computing, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the, pp.77-86, 2004.
DOI : 10.1109/PERCOM.2004.1276847

L. [. Hamadache and . Lancieri, Role-Based Collaboration Extended to Pervasive Computing, 2009 International Conference on Intelligent Networking and Collaborative Systems, pp.9-15, 2009.
DOI : 10.1109/INCOS.2009.45

URL : https://hal.archives-ouvertes.fr/hal-00811644

]. A. Hor51 and . Horn, On sentences which are true of direct unions of algebras, J. Symb. Log, vol.16, issue.1, pp.14-21, 1951.

]. P. Hor01 and . Horn, Autonomic computing : Ibm's perspective on the state of information technology, 2001.

P. F. Horrocks, H. Patel-schneider, S. Boley, B. Tabet, M. Grosof et al., Swrl : A semantic web rule language combining owl and ruleml. W3c member submission, World Wide Web Consortium, pp.30-48, 2004.

H. [. Huang, Y. Wang, J. Chen, and . Lin, A Context, Rule and Role-Based Access Control Model In Enterprise Pervasive Computing Environment, 2006 First International Symposium on Pervasive Computing and Applications, pp.497-502, 2006.
DOI : 10.1109/SPCA.2006.297443

E. [. Joshi, U. Bertino, A. Latif, and . Ghafoor, A generalized temporal role-based access control model, IEEE Transactions on Knowledge and Data Engineering, vol.17, issue.1, pp.4-23, 2005.
DOI : 10.1109/TKDE.2005.1

[. Javanmardi, R. Hemmati, and . Jalili, An access control framework for pervasive computing environments, pp.97-103, 2006.

[. Jin, R. Krishnan, and R. Sandhu, A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC, Data and Applications Security and Privacy XXVI, pp.41-55
DOI : 10.1007/978-3-642-31540-4_4

A. [. Jaeger and . Prakash, Requirements of role-based access control for collaborative systems, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, pp.14-16, 1996.
DOI : 10.1145/270152.270183

T. [. Kulkarni, A. Ahmed, and . Tripathi, A Generative Programming Framework for Context-Aware CSCW Applications, ACM Transactions on Software Engineering and Methodology, vol.21, issue.2
DOI : 10.1145/2089116.2089121

E. [. Kirkpatrick and . Bertino, (Cité pages 10 et 11 Enforcing spatial constraints for mobile rbac systems, Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, SACMAT '10, pp.11-12, 2010.

D. [. Kephart and . Chess, The vision of autonomic computing, Computer, vol.36, issue.1, pp.41-50, 2003.
DOI : 10.1109/MC.2003.1160055

J. [. Knechtel, F. Hladik, and . Dau, Using OWL DL Reasoning to decide about authorization in RBAC, OWLED'08 : Proceedings of the OWLED 2008 Workshop on OWL : Experiences and Directions, 2008.

D. Angelos, J. M. Keromytis, and . Smith, Requirements for scalable access control and security management architectures, ACM Trans. Internet Technol, vol.7, issue.2, 2007.

A. [. Kulkarni and . Tripathi, Context-aware role-based access control in pervasive computing systems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.113-122, 2008.
DOI : 10.1145/1377836.1377854

S. [. Kamoun and . Tazi, A Semantic Role-Based Access Control for Intra and Inter-organization Collaboration, 2014 IEEE 23rd International WETICE Conference, p.2014
DOI : 10.1109/WETICE.2014.77

]. A. Ktd12a, S. Kamoun, K. Tazi, and . Drira, Fadyrcos, a semantic interoperability framework for collaborative model-based dynamic reconfiguration of networked services Special Issue on Sustainable Interoperability : The Future of Internet Based Industrial Enterprises, Computers in Industry, vol.63, issue.8, pp.756-765, 2012.

]. A. Ktd12b, S. Kamoun, K. Tazi, and . Drira, A semantic adaptive framework for collaborative systems, European Concurrent Engineering Conference (ECEC), 2012.

]. R. Lad00 and . Laddaga, Active software, Proceedings of the First International Workshop on Self-adaptive Software, IWSAS' 2000, pp.11-26, 2000.

]. T. Lim and S. U. Shin, Intelligent Access Control Mechanism for Ubiquitous Applications, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), pp.18-24, 1974.
DOI : 10.1109/ICIS.2007.120

K. [. Liscano and . Wang, A SIP-based architecture model for contextual coalition access control for ubiquitous computing, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp.384-392, 2005.
DOI : 10.1109/MOBIQUITOUS.2005.8

K. [. Liscano and . Wang, A Context-Based Delegation Access Control Model for Pervasive Computing, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp.44-51, 2007.
DOI : 10.1109/AINAW.2007.14

]. S. Lwg-+-06, T. Lachmund, L. Walter, L. Gomez, E. Bussard et al., Context-aware access control ; making access control decisions based on context information, Third Annual International Conference on Mobile and Ubiquitous Systems : Networking Services, pp.1-8, 2006.

V. [. Meier and . Cahill, Taxonomy of distributed event-based programming systems, 22nd International Conference on Distributed Computing Systems Workshops, pp.585-586, 2002.

]. I. Mgvdhw10, J. Mistrãk, A. Grundy, J. Van-der-hoek, and . Whitehead, Collaborative software engineering : Challenges and prospects, Collaborative Software Engineering, pp.389-403, 2010.

K. [. Mizoguchi, T. Kozaki, Y. Sano, and . Kitamura, Construction and Deployment of a Plant Ontology, Knowledge Engineering and Knowledge Management Methods, Models, and Tools, pp.113-128, 1937.
DOI : 10.1007/3-540-39967-4_9

S. [. Mckinley, E. P. Sadjadi, B. Kasten, ]. P. H-c-chengmtpp13, P. A. Mahalle et al., Composing adaptive software, 3rd International Conference on Wireless Communications , Vehicular Technology, Information Theory and Aerospace Electronic Systems (VITAE), 2013, pp.56-64, 2004.
DOI : 10.1109/MC.2004.48

. Ogt-+-99-]-p, M. M. Oreizy, R. N. Gorlick, D. Taylor, G. Heimhigner et al., An architecture-based approach to self-adaptive software . Intelligent Systems and their Applications, Cité page 11.) [Pas98] J. Pascoe. Adding generic contextual capabilities to wearable computers Second International Symposium on Wearable Computers Digest of Papers, pp.54-62, 1998.

E. [. Priebe, J. I. Fernandez, G. Mehlau, R. Pernul, . In et al., A Pattern System for Access Control, IN PROCS OF THE 18TH. ANNUAL IFIP WG 11.3 WORKING CONFERENCE ON DATA AND APPLICATIONS SECURITY, pp.25-28, 2004.
DOI : 10.1007/1-4020-8128-6_16

A. Quinn, K. Kenny, D. Feeney, D. Lewis, V. P. O-'sullivan et al., A framework for the decentralisation and management of collaborative applications in ubiquitous computing environments A modelbased multi-level architectural reconfiguration applied to adaptability management in context-aware cooperative communication support systems, Network Operations and Management Symposium Software Architecture, pp.1-4, 2006.

S. Raje, C. Davuluri, M. Freitas, R. Ramnath, J. Ramanathan et al., Using ontology-based methods for implementing rolebased access control in cooperative systems Implementing a rule-driven approach for architectural self configuration in collaborative activities using a graph rewriting formalism As Transdisciplinary Science and Technology, CSTST '08 Lrbac : A location-aware role-based access control model Model based diagnosis and contexts in self adaptive software A novel access control framework for secure pervasive computing, European Conference on Software ArchitectureCité page 65.) [RDF + 12 Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12 ACM. (Cité page 30.) [RGD + 08] Proceedings of the 5th International Conference on Soft ComputingCité page 33.) [RL05 Self-star Properties in Complex Information SystemsCité page 13.) [RM10 Proceedings of the 6th International Wireless Communications and Mobile Computing Conference , IWCMC '10Cité page 32.) [RPM98] N. S. Ryan, J. Pascoe, and D. R. Morse. Enhanced reality fieldwork : the context-aware archaeological assistant. In V. Gaffney , M. van Leusen, and S. Exxon Computer Applications in Archaeology British Archaeological Reports Tempus Reparatum. (Cité pages 10 et 11.) [RR00], pp.353-356, 1997.

N. Pierre, M. P. Robillard, . S. Robillard-]-r, E. J. Sandhu, H. L. Coyne et al., Types of collaborative work in software engineering (Cité page 10.) [Sat01] M. Satyanarayanan. Pervasive computing : vision and challenges Role-based access control models, Cité page 7.) [SCFY96, pp.219-22410, 1996.

M. Schrage, . Shared-minds-[-sfk00-]-r, D. Sandhu, R. Ferraiolo, ]. A. Kuhn et al., The New Technologies of Collaboration The nist model for role-based access control : Towards a unified standard Context-aware adaptation of access-control policies An integrated approach to engineer and enforce context constraints in rbac environments Disseminating active map information to mobile hosts, Proceedings of the Fifth ACM Workshop on Role-based Access Control, RBAC '00 ACM. (Cité page 19.) [SGB08Cité page 32.) [SS96] R. Sandhu and P. Samarati. Authentication, access control, and auditCité page 14.) [ST94Cité pages 10 et 11.) [ST09] M. Salehie and L. Tahvildari. Self-adaptive software : Landscape and research challenges, pp.47-6351, 1990.

[. Sancho, S. Tazi, and T. Villemur, Gco : a generic collaboration ontology, Proceedings of the Fourth International Conference on Advances in Semantic Processing, pp.55-75, 2010.

. [. Smith, D. Welty, A. Mcguiness, T. Tripathi, D. Ahmed et al., Owl web ontology language guide. w3c recommendation [Online ; accessed 27 Context-based secure resource access in pervasive computing environments, Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp.159-163, 2004.

]. A. Tak-+-04b, T. Tripathi, D. Ahmed, R. Kulkarni, K. Kumar et al., Context-based secure resource access in pervasive computing environments, Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp.159-163, 2004.

G. [. Tolone, T. Ahn, S. Pai, and . Hong, Access control in collaborative systems, The03] O. Thereaux, pp.29-41, 2003.
DOI : 10.1145/1057977.1057979

R. K. Thomas, OSGi service platform core specification, release 4.1. http://www.osgi.org/Specifications Team-based access control (tmac) : A primitive for applying role-based access controls in collaborative environments, Proceedings of the Second ACM Workshop on Role-based Access Control, RBAC '97, pp.13-19, 1997.

R. [. Toninelli, L. Montanari, O. Kagal, and . Lassila, A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments, Proceedings of the 5th International Conference on The Semantic Web, ISWC'06, pp.473-486, 2006.
DOI : 10.1007/11926078_34

K. Ts98-]-roshan, R. S. Thomas, and . Sandhu, Task-based authorization controls (tbac) : A family of models for active and enterprise-oriented autorization management, Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI : Status and Prospects, pp.166-181, 1998.

D. [. Tamassia, W. H. Yao, and . Winsborough, Role-based cascaded delegation The computer for the 21st century, Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, SACMAT '04Cité page 34.) [Vil06] T. Villemur. Modèles et services logiciels pour le travail collaboratif . HdrCité page 9.) [Wei91] M. Weiser, pp.146-155, 1991.

]. T. Win01 and . Winograd, Architectures for context, Hum.-Comput. Interact, vol.16, issue.2, pp.401-419, 2001.

M. [. Wedde, H. F. Lischka, M. Wedde, and . Lischka, Modular authorization Role-based access control in ambient and remote space, Proceedings of the sixth ACM Symposium on Access Control Models and Technologies (SACMAT Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, SACMAT '04, pp.3-4, 2001.

Y. [. Wang, J. Zhang, and . Cao, Access control management for ubiquitous computing, Future Generation Computer Systems, vol.24, issue.8, pp.870-878, 2008.
DOI : 10.1016/j.future.2007.07.011

Y. [. Wang, J. Zhang, V. Cao, and . Varadharajan, Achieving secure and flexible m-services through tickets. Systems, Man and Cybernetics, Part A : Systems and Humans, IEEE Transactions on, vol.33, issue.6, pp.697-708, 2003.

J. [. Yuan, ]. D. Tong, R. Yao, S. Tamassia, and . Proctor, Attributed based access control (abac) for web services On improving the performance of role-based cascaded delegation in ubiquitous computing, IEEE International Conference on Web Services , 2005. ICWS 2005. Proceedings. 2005.Cité page 21.) [YTP05 First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005. Secure- Comm 2005, pp.157-170, 2005.

C. [. Zhou, V. H. Meinel, and . Raja, A framework for supporting distributed access control policies, 10th IEEE Symposium on Computers and Communications, 2005. ISCC 2005. Proceedings, pp.442-447, 2005.