.. Down} and .. , 71 12 Transformation Cases for the Set of Binary Operations {U p 84 13 Extension of Algorithm 12 with the Idle Operation, Garbage Collection Administrative Logs Procedures at site s, p.104

C. Logs and .. , 179 19 Transforming a Request Against a Log, 179 20 Control Concurrency Algorithm with Garbage Collection Scheme . . . . . . . . . . . . 184

. Otherwise, 1 ) then IT (I(op 1 , op 2 ), I(op j , op 2 )) = I(IT (op 1, op 2 ) and IT (I(op 1 , op 3 ), I(op j , op 3 )) = I(IT (op 1 op 3 ) Since I(IT (op 1

. Accordingly, the similarity is preserved by transformation against normal and idle operations Using the precedent Lemma we show that similarity relation is preserved by transformation against two equal logs. Given a log H and two similar idle operations op 1

. Proof, By induction on H's size and the use of Lemmas 8

B. A. and J. F. Barkley, Space: Spacial access control for collaborative virtual envoronments, 1998.

G. D. Abowd and A. J. Dix, Giving undo attention, Interacting with Computers, vol.4, issue.3, pp.317-342, 1992.
DOI : 10.1016/0953-5438(92)90021-7

G. Ahn and R. S. Sandhu, language for role-based separation of duty constraints, Proceedings of the fourth ACM workshop on Role-based access control , RBAC '99, pp.43-54, 1999.
DOI : 10.1145/319171.319176

J. E. Archer, J. , and R. W. Conway, Cope: A cooperative programming environment, 1981.

V. Atluri and W. Huang, An authorization model for workflows, Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security, ESORICS '96, pp.44-64, 1996.
DOI : 10.1007/3-540-61770-1_27

R. M. Baecker, J. Grudin, W. Buxton, and S. Greenberg, Readings in Human-Computer Interaction: Toward the Year 2000, 1995.

M. Y. Becker, C. Fournet, and A. D. Gordon, SecPAL: Design and semantics of a decentralized authorization language, Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF, 2006.
DOI : 10.3233/JCS-2009-0364

K. Berket, A. Essiari, and A. Muratas, PKI-based security for peer-to-peer information sharing, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings., 2004.
DOI : 10.1109/PTP.2004.1334930

T. Berlage, A selective undo mechanism for graphical user interfaces based on command objects, ACM Transactions on Computer-Human Interaction, vol.1, issue.3, pp.269-294, 1994.
DOI : 10.1145/196699.196721

E. Bertino, C. Bettini, E. Ferrari, and P. Samarati, A decentralized temporal autoritzation model, SEC, pp.271-280, 1996.

E. Bertino, P. A. Bonatti, and E. Ferrari, A generalized temporal role-based access control model, Ieee Transactions on Knowledge and Data Engineering, pp.4-23, 2005.

E. Bertino, S. Castano, and E. Ferrari, Securing xml documents: the author-x project demonstration, SIGMOD Conference, p.605, 2001.

L. Bouganim, F. D. Ngoc, and P. Pucheral, Client-Based Access Control Management for XML documents, VLDB, pp.84-95, 2004.
DOI : 10.1016/B978-012088469-8.50011-5

URL : https://hal.archives-ouvertes.fr/inria-00070718

A. Bullock and S. Benford, An access control framework for multi-user collaborative environments, Proceedings of the international ACM SIGGROUP conference on Supporting group work , GROUP '99, pp.140-149, 1999.
DOI : 10.1145/320297.320313

P. Cederqvist, Version Management with CVS, Network Theory Ltd, 2002.

A. Cherif, Du Contrôle d'Accès Dynamique pour les Editeurs Collaboratifs, Mémoire de Master Recherche, 2008.

A. Cherif and A. Imine, Undo-Based Access Control for Distributed Collaborative Editors, CDVE, pp.101-108, 2009.
DOI : 10.1145/586081.586085

URL : https://hal.archives-ouvertes.fr/inria-00431344

A. Cherif, A. Imine, and M. Rusinowitch, Optimistic access control for distributed collaborative editors, Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pp.861-868, 2011.
DOI : 10.1145/1982185.1982374

URL : https://hal.archives-ouvertes.fr/inria-00576880

R. Choudhary and P. Dewan, A General Multi-User Undo/Redo Model, Proceedings of the fourth conference on European Conference on Computer-Supported Cooperative Work, pp.231-246, 1995.
DOI : 10.1007/978-94-011-0349-7_15

M. J. Covington, W. Long, S. Srinivasan, A. K. Dev, M. Ahamad et al., Securing context-aware applications using environment roles, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.10-20, 2001.
DOI : 10.1145/373256.373258

B. Crispo, S. Sivasubramanian, P. Mazzoleni, and E. Bertino, P-Hera: Scalable fine-grained access control for P2P infrastructures, 11th International Conference on Parallel and Distributed Systems (ICPADS'05), pp.585-591, 2005.
DOI : 10.1109/ICPADS.2005.215

J. F. Da-silva, L. P. Gaspary, M. P. Barcellos, and A. Detsch, Policy-based access control in peerto-peer grid systems, GRID '05: Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing, pp.107-113, 2005.

E. Damiani, S. D. Di-vimercati, S. Paraboschi, and P. Samarati, A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, pp.169-202, 2002.
DOI : 10.1145/505586.505590

P. Dewan and R. Choudhary, Primitives for programming multi-user interfaces, Proceedings of the 4th annual ACM symposium on User interface software and technology , UIST '91, pp.69-78, 1991.
DOI : 10.1145/120782.120790

A. Dix, R. Mancini, and S. Levialdi, The cube -extending systems for undo, Proc. of DSVIS'97, pp.473-495, 1997.

J. Douceur and J. S. Donath, The Sybil Attack, pp.251-260, 2002.
DOI : 10.1007/3-540-45748-8_24

W. K. Edwards, Policies and roles in collaborative applications, Proceedings of the 1996 ACM conference on Computer supported cooperative work , CSCW '96, pp.11-20, 1996.
DOI : 10.1145/240080.240175

URL : http://cgit.nutn.edu.tw:8080/cgit/PaperDL/TKW_081017220736.pdf

W. K. Edwards, Coordination infrastructure in collaborative systems, Ph.D. dissertation, 1995.

C. A. Ellis and S. J. Gibbs, Concurrency Control in Groupware Systems, SIGMOD Conference33] Y. Elrakaiby, F. Cuppens, and N. Cuppens-Boulahia. Interactivity for reactive access control. In SECRYPT, pp.399-407, 1989.

C. Erbas, S. Sarkeshik, and M. M. Tanik, Different perspectives of the N-Queens problem, Proceedings of the 1992 ACM annual conference on Communications , CSC '92, pp.99-108, 1992.
DOI : 10.1145/131214.131227

D. F. Ferraiolo and J. F. Barkley, Specifying and managing role-based access control within a corporate intranet, Proceedings of the second ACM workshop on Role-based access control , RBAC '97, pp.77-82, 1997.
DOI : 10.1145/266741.266761

J. Ferrié, N. Vidot, and M. Cart, Concurrent Undo Operations in Collaborative Environments Using Operational Transformation, pp.155-173, 2004.
DOI : 10.1007/978-3-540-30468-5_12

C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas, Flexible team-based access control using contexts, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.21-27, 2001.
DOI : 10.1145/373256.373259

G. S. Graham and P. J. Denning, Protection, Proceedings of the November 16-18, 1971, fall joint computer conference on, AFIPS '71 (Fall), pp.417-429, 1972.
DOI : 10.1145/1478873.1478928

I. Greif and S. Sarin, Data sharing in group work, Proceedings of the 1986 ACM conference on Computer-supported cooperative work, CSCW '86, pp.175-183, 1986.

R. Guerraoui and C. Hari, On the consistency problem in mobile distributed computing, Proceedings of the second ACM international workshop on Principles of mobile computing , POMC '02, pp.51-57, 2002.
DOI : 10.1145/584490.584501

E. Halepovic and R. Deters, The JXTA performance model and evaluation, Future Generation Computer Systems, vol.21, issue.3, pp.377-390, 2005.
DOI : 10.1016/j.future.2004.04.016

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.204.8002

M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976.
DOI : 10.1145/360303.360333

N. Hayashibara, X. Défago, R. Yared, and T. Katayama, The f accrual failure detector, SRDS, pp.66-78, 2004.

C. V. Hu, The policy machine for universal access control, p.3055379, 2002.

V. C. Hu, D. F. Ferraiolo, and D. R. Kuhn, Assessment of access control systems, 2006.
DOI : 10.6028/NIST.IR.7316

C. Ignat and M. C. Norrie, Customizable Collaborative Editor Relying on treeOPT Algorithm, ECSCW, pp.315-334, 2003.
DOI : 10.1007/978-94-010-0068-0_17

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.70.9273

A. Imine, Conception Formelle d'Algorithmes de Réplication Optimiste. Vers l'Edition Collaborative dans les Réseaux Pair-à-Pair, 2006.

A. Imine, Coordination Model for Real-Time Collaborative Editors, In COORDINATION, vol.13, issue.4, pp.225-246, 2009.
DOI : 10.1145/1188816.1188821

URL : https://hal.archives-ouvertes.fr/inria-00576867

A. Imine, A. Cherif, and M. Rusinowitch, A Flexible Access Control Model for Distributed Collaborative Editors, Secure Data Management, pp.89-106, 2009.
DOI : 10.1016/j.is.2006.06.002

URL : https://hal.archives-ouvertes.fr/inria-00431341

A. Imine, M. Rusinowitch, G. Oster, and P. Molli, Formal design and verification of operational transformation algorithms for copies convergence, Theoretical Computer Science, vol.351, issue.2, pp.167-183, 2006.
DOI : 10.1016/j.tcs.2005.09.066

URL : https://hal.archives-ouvertes.fr/inria-00000426

T. Jaeger and A. Prakash, Requirements of role-based access control for collaborative systems, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, 1995.
DOI : 10.1145/270152.270183

T. Jaeger and A. Prakash, Requirements of role-based access control for collaborative systems, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, p.16, 1996.
DOI : 10.1145/270152.270183

T. Jaeger and A. Prakash, Requirements of role-based access control for collaborative systems, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, 1996.
DOI : 10.1145/270152.270183

M. H. Kang, J. S. Park, and J. N. Froscher, Access control mechanisms for inter-organizational workflow, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.66-74, 2001.
DOI : 10.1145/373256.373266

D. Kulkarni and A. Tripathi, Context-aware role-based access control in pervasive computing systems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.113-122, 2008.
DOI : 10.1145/1377836.1377854

L. Lamport, Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978.
DOI : 10.1145/359545.359563

B. W. Lampson, Protection, ACM SIGOPS Operating Systems Review, vol.8, issue.1, pp.18-24, 1974.
DOI : 10.1145/775265.775268

D. Li and R. Li, Ensuring content and intention consistency in real-time group editors, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., 2004.
DOI : 10.1109/ICDCS.2004.1281643

D. Li and R. Li, An Operational Transformation Algorithm and Performance Evaluation, Computer Supported Cooperative Work (CSCW), vol.4, issue.3, pp.469-508, 2008.
DOI : 10.1007/s10606-005-9008-6

D. Li and R. Li, An Admissibility-Based Operational Transformation Framework for Collaborative Editing Systems, Computer Supported Cooperative Work (CSCW), vol.13, issue.4, pp.1-43, 2010.
DOI : 10.1007/s10606-009-9103-1

P. B. Lowry, A. M. Curtis, and M. R. Lowry, Building a Taxonomy and Nomenclature of Collaborative Writing to Improve Interdisciplinary Research and Practice, Journal of Business Communication, vol.41, issue.1, pp.66-99, 2004.
DOI : 10.1177/0021943603259363

B. Lushman and G. V. Cormack, Proof of correctness of Ressel's adOPTed algorithm, Information Processing Letters, vol.86, issue.6, pp.303-310, 2003.
DOI : 10.1016/S0020-0190(03)00227-8

R. C. Mayer, J. H. Davis, and F. D. Schoorman, An Integrative Model of Organizational Trust, The Academy of Management Review, vol.20, issue.3, pp.709-734, 1995.

M. D. Mechaoui, A. Cherif, A. Imine, and F. Bendella, Log garbage collector-based real time collaborative editor for mobile devices Controlling access to published data using cryptography, CollaborateCom Proceedings of the 29th international conference on Very large data bases, pp.1-10, 2003.

P. Molli, G. Oster, H. Skaf-molli, and A. Imine, Using the transformational approach to build a safe and generic data synchronizer, Proceedings of the 2003 international ACM SIGGROUP conference on Supporting group work , GROUP '03, pp.212-220, 2003.
DOI : 10.1145/958160.958194

URL : https://hal.archives-ouvertes.fr/inria-00099815

S. Noël and J. Robert, Empirical study on collaborative writing: What do co-authors do, use, and like? Comput. Supported Coop, Work, vol.13, issue.1, pp.63-89, 2004.

D. A. Norman and S. W. Draper, User Centered System Design; New Perspectives on Human- Computer Interaction. L, 1986.

S. L. Osborn, R. S. Sandhu, and Q. Munawer, Configuring role-based access control to enforce mandatory and discretionary access control policies, ACM Transactions on Information and System Security, vol.3, issue.2, pp.85-106, 2000.
DOI : 10.1145/354876.354878

G. Oster, P. Urso, P. Molli, and A. Imine, Data consistency for P2P collaborative editing, Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work , CSCW '06, pp.259-268, 2006.
DOI : 10.1145/1180875.1180916

URL : https://hal.archives-ouvertes.fr/inria-00108523

J. S. Park, R. Sandhu, and G. Ahn, Role-based access control on the web, ACM Transactions on Information and System Security, vol.4, issue.1, pp.37-71, 2001.
DOI : 10.1145/383775.383777

B. C. Pierce and J. Vouillon, What's in unison? a formal specification and reference implementation of a file synchronizer, 2004.

D. Povey, Optimistic security, Proceedings of the 1999 workshop on New security paradigms , NSPW '99, pp.40-45, 2000.
DOI : 10.1145/335169.335188

A. Prakash and M. J. Knister, A framework for undoing actions in collaborative systems, ACM Transactions on Computer-Human Interaction, vol.1, issue.4, pp.295-330, 1994.
DOI : 10.1145/198425.198427

F. Rabitti, E. Bertino, W. Kim, and D. Woelk, A model of authorization for next-generation database systems, ACM Transactions on Database Systems, vol.16, issue.1, pp.88-131, 1991.
DOI : 10.1145/103140.103144

I. Ray and T. Xin, Concurrent and Real-Time Update of Access Control Policies, DEXA, pp.330-339, 2003.
DOI : 10.1007/978-3-540-45227-0_33

M. Ressel and R. Gunzenhäuser, Reducing the problems of group undo, Proceedings of the international ACM SIGGROUP conference on Supporting group work , GROUP '99, pp.131-139, 1999.
DOI : 10.1145/320297.320312

M. Ressel, D. Nitsche-ruhland, and R. Gunzenhauser, An integrating, transformation-oriented approach to concurrency control and undo in group editors, Proceedings of the 1996 ACM conference on Computer supported cooperative work , CSCW '96, pp.288-297, 1996.
DOI : 10.1145/240080.240305

P. Samarati, P. Ammann, and S. Jajodia, Maintaining replicated authorizations in distributed database systems, Data & Knowledge Engineering, vol.18, issue.1, pp.55-84, 1996.
DOI : 10.1016/0169-023X(95)00000-I

P. Samarati and S. D. Di-vimercati, Access Control: Policies, Models, and Mechanisms, FOSAD, pp.137-196, 2000.
DOI : 10.1007/3-540-45608-2_3

P. Samarati and S. D. Di-vimercati, Access Control: Policies, Models, and Mechanisms, FOSAD, pp.137-196, 2000.
DOI : 10.1007/3-540-45608-2_3

R. Sandhu and P. Samarati, Access control: principle and practice, IEEE Communications, pp.40-48, 1994.
DOI : 10.1109/35.312842

R. Sandhu and X. Zhang, Peer-to-peer access control architecture using trusted computing technology, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.147-158, 2005.
DOI : 10.1145/1063979.1064005

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

R. S. Sandhu, D. F. Ferraiolo, and D. R. Kuhn, The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.47-63, 2000.
DOI : 10.1145/344287.344301

R. S. Sandhu and R. K. Thomas, Conceptual foundations for a model of task-based authorizations, CSFW, pp.66-79, 1994.

B. Shao, D. Li, and N. Gu, An algorithm for selective undo of any operation in collaborative applications, Proceedings of the 16th ACM international conference on Supporting group work, GROUP '10, pp.131-140, 2010.
DOI : 10.1145/1880071.1880093

H. Shen and P. Dewan, Access control for collaborative environments, Proceedings of the 1992 ACM conference on Computer-supported cooperative work , CSCW '92, pp.51-58, 1992.
DOI : 10.1145/143457.143461

B. Shneiderman, The future of interactive systems and the emergence of direct manipulation???, Behaviour & Information Technology, vol.7, issue.3, pp.237-256, 1982.
DOI : 10.1080/01449298208914450

M. Sohlenkamp and G. Chwelos, Integrating communication, cooperation, and awareness, Proceedings of the 1994 ACM conference on Computer supported cooperative work , CSCW '94, pp.331-343, 1994.
DOI : 10.1145/192844.193041

R. Stallman, Gnu emacs manual, 2007.

C. Sturm, K. R. Dittrich, and P. Ziegler, An access control mechanism for P2P collaborations, Proceedings of the 2008 international workshop on Data management in peer-to-peer systems, DaMaP '08, pp.51-58, 2008.
DOI : 10.1145/1379350.1379358

M. Suleiman, M. Cart, and J. Ferrié, Serialization of concurrent operations in a distributed collaborative environment, Proceedings of the international ACM SIGGROUP conference on Supporting group work : the integration challenge the integration challenge, GROUP '97, pp.435-445, 1997.
DOI : 10.1145/266838.267369

M. Suleiman, M. Cart, and J. Ferrié, Concurrent operations in a distributed and mobile collaborative environment, Proceedings 14th International Conference on Data Engineering, pp.36-45, 1998.
DOI : 10.1109/ICDE.1998.655755

C. Sun, Undo any operation at any time in group editors, Proceedings of the 2000 ACM conference on Computer supported cooperative work , CSCW '00, pp.191-200, 2000.
DOI : 10.1145/358916.358990

C. Sun, Undo as concurrent inverse in group editors, ACM Transactions on Computer-Human Interaction, vol.9, issue.4, pp.309-361, 2002.
DOI : 10.1145/586081.586085

C. Sun and C. Ellis, Operational transformation in real-time group editors, Proceedings of the 1998 ACM conference on Computer supported cooperative work , CSCW '98, pp.59-68, 1998.
DOI : 10.1145/289444.289469

C. Sun, X. Jia, Y. Zhang, Y. Yang, and D. Chen, Achieving convergence, causality preservation, and intention preservation in real-time cooperative editing systems, ACM Transactions on Computer-Human Interaction, vol.5, issue.1, pp.63-108, 1998.
DOI : 10.1145/274444.274447

C. Sun, S. Xia, D. Sun, D. Chen, H. Shen et al., Transparent adaptation of single-user applications for multi-user real-time collaboration, ACM Transactions on Computer-Human Interaction, vol.13, issue.4, pp.531-582, 2006.
DOI : 10.1145/1188816.1188821

D. Sun and C. Sun, Context-Based Operational Transformation in Distributed Collaborative Editing Systems, IEEE Transactions on Parallel and Distributed Systems, vol.20, issue.10, pp.1454-1470, 2009.
DOI : 10.1109/TPDS.2008.240

D. Sun, S. Xia, C. Sun, and D. Chen, Operational transformation for collaborative word processing, Proceedings of the 2004 ACM conference on Computer supported cooperative work , CSCW '04, pp.437-446, 2004.
DOI : 10.1145/1031607.1031681

S. G. Tammaro, J. N. Mosier, N. C. Goodwin, and G. Spitz, Collaborative Writing Is Hard to Support: A Field Study of Collaborative Writing, Computer Supported Cooperative Work (CSCW), vol.22, issue.1, pp.19-51, 1997.
DOI : 10.1023/A:1008636321493

W. Teitelman, Interlisp reference manual, 1978.

R. K. Thomas, Team-based access control (TMAC), Proceedings of the second ACM workshop on Role-based access control , RBAC '97, pp.13-19, 1997.
DOI : 10.1145/266741.266748

R. K. Thomas and R. S. Sandhu, Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management, Proceedings of the IFIP WG11
DOI : 10.1007/978-0-387-35285-5_10

W. Tolone, G. Ahn, T. Pai, and S. Hong, Access control in collaborative systems, ACM Computing Surveys, vol.37, issue.1, pp.29-41, 2005.
DOI : 10.1145/1057977.1057979

E. Tsang, Foundations of constraint satisfaction, 1993.

N. Vidot, M. Cart, J. Ferrié, and M. Suleiman, Copies convergence in a distributed real-time collaborative environment, Proceedings of the 2000 ACM conference on Computer supported cooperative work , CSCW '00, 2000.
DOI : 10.1145/358916.358988

URL : https://hal.archives-ouvertes.fr/hal-00684563

J. S. Vitter, User: A new framework for redoing, Software Development Environments (SDE), pp.168-176, 1984.

W. Wang, Team-and-role-based organizational context and access control for cooperative hypermedia environments, Proceedings of the tenth ACM Conference on Hypertext and hypermedia : returning to our diverse roots returning to our diverse roots, HYPERTEXT '99, pp.37-46, 1999.
DOI : 10.1145/294469.294480

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.3048

R. W. Baldwin, Naming and grouping privileges to simplify security management in large databases, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.71-60, 1990.
DOI : 10.1109/RISP.1990.63844

S. Weiss, P. Urso, and P. Molli, Compensation in Collaborative Editing, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00138381

S. Weiss, P. Urso, and P. Molli, An Undo Framework for P2P Collaborative Editing, 4th International Conference on Collaborative Computing : Networking, Applications and Worksharing -CollaborateCom, pp.529-544, 2008.
DOI : 10.1007/978-3-540-30468-5_12

URL : https://hal.archives-ouvertes.fr/inria-00432373

T. Wobber, T. L. Rodeheffer, and D. B. Terry, Policy-based access control for weakly consistent replication, Proceedings of the 5th European conference on Computer systems, EuroSys '10, pp.293-306, 2010.
DOI : 10.1145/1755913.1755943

T. Xin and I. Ray, A lattice-based approach for updating access control policies in real-time, Information Systems, vol.32, issue.5, pp.755-772, 2007.
DOI : 10.1016/j.is.2006.06.002

T. Xin and I. Ray, A lattice-based approach for updating access control policies in real-time, Information Systems, vol.32, issue.5, pp.755-772, 2007.
DOI : 10.1016/j.is.2006.06.002

G. Zhang and M. Parashar, Context-aware dynamic access control for pervasive applications, In Communication Networks and Distributed Systems Modeling and Simulation Conference, 2004.