J. Bacon, D. Eyers, J. Singh, and P. Pietzuch, Access control in publish/subscribe systems, Proceedings of the second international conference on Distributed event-based systems, DEBS '08, pp.23-34, 2008.
DOI : 10.1145/1385989.1385993

J. Bacon, K. Moody, and W. Yao, A model of OASIS role-based access control and its support for active security, ACM Transactions on Information and System Security, vol.5, issue.4, pp.492-540, 2002.
DOI : 10.1145/581271.581276

D. G. Cholewka, R. A. Botha, and J. H. Eloff, A Context-sensitive Access Control Model and Prototype Implementation, In: Information Security for Global Information Infrastructures: IFIP TC 11 Sixteenth Annual Working Conference on Information Security, pp.341-350, 2000.
DOI : 10.1007/978-0-387-35515-3_35

J. Coutaz, J. L. Crowley, S. Dobson, and D. Garlan, Context is key, Communications of the ACM, vol.48, issue.3, pp.49-53, 2005.
DOI : 10.1145/1047671.1047703

P. Eugster, P. Felber, R. Guerraoui, and A. Kermarrec, The many faces of publish/subscribe, ACM Computing Surveys, vol.35, issue.2, pp.114-131, 2003.
DOI : 10.1145/857076.857078

V. Hourdin, J. Tigli, S. Lavirotte, G. Rey, and M. , SLCA, composite services for ubiquitous computing, Proceedings of the International Conference on Mobile Technology, Applications, and Systems, Mobility '08, 2008.
DOI : 10.1145/1506270.1506284

URL : https://hal.archives-ouvertes.fr/hal-00360509

R. Hulsebosch, A. Salden, M. Bargh, P. Ebben, and J. Reitsma, Context sensitive access control, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.111-119, 2005.
DOI : 10.1145/1063979.1064000

F. Jammes, A. Mensch, and H. Smit, Service-oriented device communications using the Devices Profile for Web Services, Proceedings of the 3rd international workshop on Middleware for pervasive and ad-hoc computing, pp.1-8, 2005.

G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. Lopes et al., Aspect-oriented programming, ECOOP. SpringerVerlag, 1997.

Y. Kim, C. Mon, D. Jeong, J. Lee, C. Song et al., Context-Aware Access Control Mechanism for Ubiquitous Applications, Lecture Notes in Computer ScienceLNCS), vol.3528, pp.236-242, 2005.
DOI : 10.1007/11495772_37

T. Kindberg, K. Zhang, and N. Shankar, Context authentication using constrained channels, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications, pp.14-21, 2002.
DOI : 10.1109/MCSA.2002.1017481

. Mobilegov, Mobilegov Access Control R . See related information on http, 2009.

R. Sandhu and P. Samarati, Access control: principle and practice, IEEE Communications Magazine, vol.32, issue.9, pp.40-48, 1994.
DOI : 10.1109/35.312842

J. Tigli, S. Lavirotte, G. Rey, V. Hourdin, D. Cheung-foo-wo et al., WComp middleware for ubiquitous computing: Aspects and composite event-based Web services, annals of telecommunications - annales des t??l??communications, vol.32, issue.11, pp.3-4197, 2009.
DOI : 10.1007/s12243-008-0081-y

URL : https://hal.archives-ouvertes.fr/hal-00378325

M. Weiser, The Computer for the 21st Century, Scientific American, vol.265, issue.3, pp.94-104, 1991.
DOI : 10.1038/scientificamerican0991-94

A. Westin and O. Ruebhausen, Privacy and freedom, 1967.