A. Banerjee, A. David, and . Naumann, Historybased access control and secure information flow, International Workshop on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, pp.27-48, 2004.
DOI : 10.1007/978-3-540-30569-9_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.4093

&. Barker, S. Stuckey, . Barker, J. Peter, and . Stuckey, Flexible access control policy specification with constraint logic programming, ACM Transactions on Information and System Security, vol.6, issue.4, pp.501-546, 2003.
DOI : 10.1145/950191.950194

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.71.5636

]. Barker, The next 700 access control models or a unifying metamodel, Proceedings of the 14th ACM symposium on Access control models and technologies, pp.187-196, 2009.
DOI : 10.1145/1542207.1542238

. Bauer, Real life challenges in access-control management, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, pp.899-908, 2009.
DOI : 10.1145/1518701.1518838

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.4119

]. Bauer, Paranoid penguin: an introduction to Novell AppArmor, Linux Journal, vol.2006, issue.148, p.13, 2006.

&. Bell, E. Lapadula, . Bell, J. Leonard, and . Lapadula, Secure computer systems: Mathematical foundations, 1973.

. Bertino, TRBAC: A temporal role-based access control model, ACM Transactions on Information and System Security, vol.4, issue.3, pp.191-233, 2001.
DOI : 10.1145/501978.501979

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.4992

J. Kenneth and . Biba, Integrity considerations for secure computer systems, 1977.

. Bouwman, Bart Bouwman, Sjouke Mauw and Milan Petkovic Rights management for role-based access control, Proc 5th IEEE consumer communications and networking conf CCNC, pp.1085-90, 2008.
DOI : 10.1109/ccnc08.2007.246

URL : http://orbilu.uni.lu/bitstream/10993/25873/1/BMP08.pdf

D. Achim, H. Brucker, and . Petritsch, Extending access control models with break-glass, Proceedings of the 14th ACM symposium on Access control models and technologies, pp.197-206, 2009.

. Caputo, Detecting Insider Theft of Trade Secrets, IEEE Security & Privacy Magazine, vol.7, issue.6, pp.14-21, 2009.
DOI : 10.1109/MSP.2009.110

. Center, A guide to understanding audit in trusted systems, 1988.

C. and R. Clarke, Introduction to dataveillance and information privacy, and definitions of terms. Roger Clarke s Dataveillance and Information Privacy Pages, 1999.

. Coma, Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens and Ana-Rosa Cavalli. Context ontology for secure interoperability, Availability , Reliability and Security ARES 08. Third International Conference on, pp.821-827, 2008.

&. Corbató, J. Vyssotsky-fernando, . Corbató, A. Victor, and . Vyssotsky, Introduction and overview of the Multics system, fall joint computer conference, part I, Proceedings of the, pp.185-196, 1965.

A. Corrad, R. Montanari, and D. Tibaldi, Context-based access control management in ubiquitous environments, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings., pp.253-260, 2004.
DOI : 10.1109/NCA.2004.1347784

. Coyne, J. Edward, and . Coyne, Role engineering, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, p.4, 1996.
DOI : 10.1145/270152.270159

. Whitepapers, Cryptzone-Network-Access-Security-Survey-2015.pdf, 2015. Accessed: 2016-10-02

. Cuppens, High Level Conflict Management Strategies in Advanced Access Control Models, Electronic Notes in Theoretical Computer Science, vol.186, pp.3-26, 2007.
DOI : 10.1016/j.entcs.2007.01.064

URL : http://doi.org/10.1016/j.entcs.2007.01.064

. Cuppens, High Level Conflict Management Strategies in Advanced Access Control Models, Electronic Notes in Theoretical Computer Science, vol.186, pp.3-26, 2007.
DOI : 10.1016/j.entcs.2007.01.064

URL : http://doi.org/10.1016/j.entcs.2007.01.064

&. Daemen, J. Rijmen, V. Daemen, and . Rijmen, The design of rijndael: Aes-the advanced encryption standard, 2013.
DOI : 10.1007/978-3-662-04722-4

. Daud, Malik Imran Daud, David Sánchez and Alexandre Viejo. Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile, Trust, Privacy and Security in Digital Business, pp.18-29, 2015.

&. Dennis, . Van-horn, . Dennis, C. Earl, and . Van-horn, Programming semantics for multiprogrammed computations, Communications of the ACM, vol.26, issue.1, pp.29-35, 1983.
DOI : 10.1145/357980.357993

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.9948

V. Di, Efficient and private access to outsourced data, Distributed Computing Systems (ICDCS), 2011 31st International Conference on, pp.710-719, 2011.

P. Jones, US secure hash algorithm 1 (SHA1), 2001.

. Edjlali, Anurag Acharya and Vipin Chaudhary. Historybased access control for mobile code, Proceedings of the 5th ACM Conference on Computer and Communications Security, pp.38-48, 1998.

S. Robert and . Fabry, Capability-based addressing, Communications of the ACM, vol.17, issue.7, pp.403-412, 1974.

&. Ferguson, D. Ferguson, and . Senie, Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing, 1997.

. Ferraiolo, Rolebased access control (RBAC): Features and motivations, Proceedings of 11th annual computer security application conference, pp.241-289, 1995.

L. Charles and . Forgy, Rete: A fast algorithm for the many pattern/many object pattern match problem, Artificial intelligence, vol.19, issue.1, pp.17-37, 1982.

. Gafny, Detecting data misuse by applying context-based data linkage, Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, pp.3-12, 2010.
DOI : 10.1145/1866886.1866890

. Gasmi, Yacine Flexible and secure enterprise rights management based on trusted virtual domains, Proceedings of the 3rd ACM workshop on Scalable trusted computing, pp.71-80, 2008.
DOI : 10.1145/1456455.1456467

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.7566

. Gheorghe, Enforcing ucon policies on the enterprise service bus. On the Move to Meaningful Internet Systems, pp.876-893, 2010.

C. Gikas, A General Comparison of FISMA, HIPAA, ISO 27000 and PCI-DSS Standards, Information Security Journal: A Global Perspective, vol.19, issue.3, pp.132-141, 2010.
DOI : 10.1080/19393551003657019

. Gligor, On the formal definition of separation-of-duty policies and their composition, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), pp.172-183, 1998.
DOI : 10.1109/SECPRI.1998.674833

&. Graham, S. Denning, . Graham, J. Peter, and . Denning, Protection, Proceedings of the November 16-18, 1971, fall joint computer conference on, AFIPS '71 (Fall), pp.417-429, 1972.
DOI : 10.1145/1478873.1478928

K. Graves, Ceh: Official certified ethical hacker review guide: Exam 312-50, 2007.

&. Gray, J. Siewiorek, D. P. Gray, and . Siewiorek, High-availability computer systems, Computer, vol.24, issue.9, pp.39-48, 1991.
DOI : 10.1109/2.84898

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.9204

. Greene-2006-]-sari-stern and . Greene, Security policies and procedures. New Jersey: Pearson Education, 2006.

. Hamilton, A global look at authentication IAW'07, Information Assurance and Security Workshop, pp.1-8, 2007.
DOI : 10.1109/iaw.2007.381906

. Harada, Task oriented management obviates your onus on Linux, Linux Conference, 2004.

A. Harel, A. Shabtai, L. Rokach, and Y. Elovici, Mscore: estimating the potential damage of data leakage incident by assigning misuseability weight, Proceedings of the 2010 ACM workshop on Insider threats, pp.13-20

. Harel, Mscore: A misuseability weight measure, IEEE transactions on dependable and secure computing, pp.414-428
DOI : 10.1109/tdsc.2012.17

. Harrison, Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976.
DOI : 10.1145/360303.360333

D. Mark, . Hill, R. Michael, and . Marty, Amdahl's law in the multicore era, 2008.

. Hilty, A Policy Language for Distributed Usage Control, Computer Security?ESORICS 2007, pp.531-546, 2007.
DOI : 10.1007/978-3-540-74835-9_35

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.676.3356

. Houdek, IBM System/38 support for capability-based addressing, Proceedings of the 8th annual symposium on Computer Architecture, pp.341-348, 1981.

. Hu, Assessment of access control systems, 2006.
DOI : 10.6028/NIST.IR.7316

. Hu, Guide to attribute based access control (ABAC) definition and considerations (draft), NIST Special Publication, vol.800, pp.162-2013
DOI : 10.6028/nist.sp.800-162

. Jaeger, Analyzing integrity protection in the SELinux example policy, Proceedings of the 12th conference on USENIX Security Symposium, pp.5-5, 2003.

]. Jeager, Managing access control complexity using metrices, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.131-139, 2001.
DOI : 10.1145/373256.373283

. Jiang, Keystroke statistical learning model for web authentication, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, pp.359-361, 2007.
DOI : 10.1145/1229285.1229327

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.314.1573

&. Johnson, K. Filkins, . Johnson, L. Barbara, and . Filkins, SANS mobility - BYOD security survey. SANS Institute Whitepaper, 2012.

R. Baida, P. Balbiani, and S. Benferhat, Frédéric Cuppens, Yves Deswarte, Alexandre Miege, Claire Saurel and Gilles Trouessin. Organization based access control, Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on, pp.120-131, 2003.

. Kamel, A low-energy consuming and user-centric security management architecture adapted to mobile environments, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, pp.722-725, 2011.
DOI : 10.1109/INM.2011.5990665

URL : https://hal.archives-ouvertes.fr/hal-01342254

. Kandala, An Attribute Based Framework for Risk-Adaptive Access Control Models, 2011 Sixth International Conference on Availability, Reliability and Security, pp.236-241, 2011.
DOI : 10.1109/ARES.2011.41

A. Paul and . Karger, Multi-level security requirements for hypervisors, 21st Annual Computer Security Applications Conference (ACSAC 05), 2005.

A. Karp, H. Haury, and M. Davis, From ABAC to ZBAC: the evolution of access control models, International Conference on Information Warfare and Security, page 202. Academic Conferences International Limited, 2010.

. Kiczales, Aspect-oriented programming, European conference on object-oriented programming, pp.220-242, 1997.

C. Paul and . Kocher, Timing attacks on implementations of Diffie- Hellman, RSA, DSS, and other systems, Annual International Cryptology Conference, pp.104-113, 1996.

. Kremer, An intensive survey of fair non-repudiation protocols, Computer Communications, vol.25, issue.17, pp.1606-1621, 2002.
DOI : 10.1016/S0140-3664(02)00049-X

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.6607

&. Kulkarni and . Tripathi, Devdatta Kulkarni and Anand Tripathi. Context-aware role-based access control in pervasive computing systems, Proceedings of the 13th ACM symposium on Access control models and technologies, pp.113-122, 2008.

W. Butler and . Lampson, A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973.

. Lang, Attribute based access control for grid computing, 2006.
DOI : 10.1007/s10723-008-9112-1

. Le, Automated Inference of Access Control Policies for Web Applications, Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, SACMAT '15, pp.27-37
DOI : 10.1145/2752952.2752969

M. Henry and . Levy, Capability-based computer systems, 2014.

. Li, Xinyao Feng and Hongxia Ma. Leakage Prevention Method for Unstructured Data Based on Classification, Applications and Techniques in Information Security, pp.337-343

. Liu, Digital rights management for content distribution, Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, pp.49-58, 2003.

. Marinovic, Srdjan Marinovic, Naranker Dulay and Morris Sloman Rumpole: an introspective break-glass access control language, ACM Transactions on Information and System Security (TISSEC), vol.17, issue.1 2, p.2014, 2014.

. Mathew, A Data-Centric Approach to Insider Attack Detection in Database Systems, International Workshop on Recent Advances in Intrusion Detection, pp.382-401, 2010.
DOI : 10.1007/978-3-642-15512-3_20

J. Alastair and . Mayer, The architecture of the Burroughs B5000: 20 years later and still ahead of the times?, ACM SIGARCH Computer Architecture News, vol.10, issue.4, pp.3-10, 1982.

. Mcafee and . Mcafee, Grand theft Data, 2015.

&. Mccullagh and . Homsi, Declan McCullagh and Milana Homsi. Leave DRM Alone: A Survey of Legislative Proposals Relating to Digital Rights Management Technology and Their Problems, Mich. St. L. Rev, p.317, 2005.

]. Mclean, A comment on the ???basic security theorem??? of Bell and LaPadula, Information Processing Letters, vol.20, issue.2, pp.67-70, 1985.
DOI : 10.1016/0020-0190(85)90065-1

A. Mettler, D. Wagner, and T. Close, Joe-E: A Security-Oriented Subset of Java, NDSS, pp.357-374, 2010.

S. Mark, K. Miller, J. Yee, and . Shapiro, Capability myths demolished, 2003.

. Miller, Ihab Awad and Mike Stay. Safe active content in sanitized JavaScript, 2008.

&. Mogull and . Securosis, Rich Mogull and LLC Securosis Understanding and selecting a data loss prevention solution, 2007.

&. Morisset, C. Zannone, N. Morisset, and . Zannone, Reduction of access control decisions, Proceedings of the 19th ACM symposium on Access control models and technologies, SACMAT '14, pp.53-62
DOI : 10.1145/2613087.2613106

. Nelson, The Margrave Tool for Firewall Analysis, LISA, 2010.

. Nist-nist, Interagency Report 7316 Access to Access Contol Systems, 2006.

K. Nobelis, M. Boudaoud, and . Kamel, A usercentric approach for secure communication protocols NATO Science for Peace and Security Program, Architects of Secure Nteworks (ASIGE10), 2010.

. Nobelis, A Component-Based Approach to Security Protocol Design, 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, pp.279-284, 2011.
DOI : 10.1109/WAINA.2011.34

URL : https://hal.archives-ouvertes.fr/hal-01342279

P. Jaehong and R. Sandhu, The UCON ABC usage control model, ACM Transactions on Information and System Security (TIS- SEC), vol.7, issue.1, pp.128-174, 2004.

. Proctor, Drools documentation, JBoss, vol.5, issue.05, p.2008, 2008.

. Resondry, An alternative version of HTTPS to provide non-repudiation security property, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), pp.536-541
DOI : 10.1109/IWCMC.2014.6906413

URL : https://hal.archives-ouvertes.fr/hal-01318537

C. Martin, C. Rinard, D. Cadar, . Dumitran, M. Daniel et al., Enhancing Server Availability and Security Through Failure-Oblivious Computing, OSDI, pp.21-21, 2004.

&. Ritchie, . Thompson, K. Om-ritchie, and . Thompson, The UNIX Time-Sharing System???, Bell System Technical Journal, vol.57, issue.6, pp.1905-1929, 1978.
DOI : 10.1002/j.1538-7305.1978.tb02136.x

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.7314

. Rivest, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.5588

]. Rosen, The right to be forgotten, pp.88-2012, 2012.

. Rosenblatt, Digital rights management: business and technology, 2001.

S. Russell, P. Norvig, F. John, . Canny, M. Jitendra et al., Artificial intelligence: a modern approach, 2003.

&. Saltzer, H. Schroeder-jerome, . Saltzer, D. Michael, and . Schroeder, The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, pp.1278-1308, 1975.
DOI : 10.1109/PROC.1975.9939

H. Jerome and . Saltzer, Protection and the control of information sharing in Multics, Communications of the ACM, vol.17, issue.7, pp.388-402, 1974.

&. Samarati and . Vimercati, Access Control: Policies, Models, and Mechanisms, International School on Foundations of Security Analysis and Design, pp.137-196, 2000.
DOI : 10.1007/3-540-45608-2_3

&. Sandhu and . Park, Usage Control: A Vision for Next Generation Access Control, International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, pp.17-31, 2003.
DOI : 10.1007/978-3-540-45215-7_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.3866

. Sandhu, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3867

&. Selimi and . Freitag, Mennan Selimi and Felix Freitag Tahoe-lafs distributed storage service in community network clouds, Big Data and Cloud Computing (BdCloud), 2014 IEEE Fourth International Conference on, pp.17-24, 2014.

. Shabtai, Asaf Shabtai, Yuval Elovici and Lior Rokach. A survey of data leakage detection and prevention solutions, p.2012, 2012.

. Shapiro, Eros: a fast capability system, 1999.

. Shapiro, Coyotos microkernel specification . The EROS Group, LLC, 0.5 edition, 2007.

. Slimani, UACML: Unified Access Control Modeling Language, 2011 4th IFIP International Conference on New Technologies, Mobility and Security, pp.1-8, 2011.
DOI : 10.1109/NTMS.2011.5721143

. Slimani, UACML: Unified Access Control Modeling Language, 2011 4th IFIP International Conference on New Technologies, Mobility and Security, pp.1-8, 2011.
DOI : 10.1109/NTMS.2011.5721143

. Soliman, Enhancing efficiency of enterprise digital rights management, 2015 International Conference on Advanced Computer Science and Information Systems (ICACSIS), pp.91-96, 2015.
DOI : 10.1109/ICACSIS.2015.7415190

. Stepien, CatBAC: A generic framework for designing and validating hybrid access control models, 2012 IEEE International Conference on Communications (ICC), pp.6721-6726
DOI : 10.1109/ICC.2012.6364961

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.261.3281

. Tolone, Access control in collaborative systems, ACM Computing Surveys, vol.37, issue.1, pp.29-41, 2005.
DOI : 10.1145/1057977.1057979

. Mh-van-beek, Comparison of enterprise digital rights management systems Advice report, Aia Software, 2007.

. Vance, Security-enhanced darwin: Porting selinux to mac os x, Proceedings of the Third Annual Security Enhanced Linux Symposium, 2007.

. Venkatasubramanian, CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures, ACM Transactions on Autonomous and Adaptive Systems, vol.8, issue.4, pp.20-2014
DOI : 10.1109/2.485845

. Wang, Lingyu Wang, Duminda Wijesekera and Sushil Jajodia. A logicbased framework for attribute based access control, Proceedings of the 2004 ACM workshop on Formal methods in security engineering, pp.45-55, 2004.

&. Warren, . Brandeis, D. Samuel, . Warren, D. Louis et al., The Right to Privacy, Harvard Law Review, vol.4, issue.5, pp.193-220
DOI : 10.2307/1321160

R. Watson, W. Morrison, C. Vance, and B. Feldman, The TrustedBSD MAC Framework, Proceedings DARPA Information Survivability Conference and Exposition, pp.285-296, 2003.
DOI : 10.1109/DISCEX.2003.1194900

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.105.7149

. Wayman, An Introduction to Biometric Authentication Systems, 2005.
DOI : 10.1007/1-84628-064-8_1