J. Covington, M. , J. Moyer, M. Ahamad, and M. , Generalized Role-Based Access Control for Securing Future Applications, 23rd National Information Systems Security Conference, pp.16-19, 2000.

K. Jean, K. Yang, and A. Galis, A Policy Based Context-aware Service for Next Generation Networks, 8th London Communication Symposium, 2003.

A. Kumar, M. Karnik, N. , C. , and G. , Context sensitivity in role-based access control, ACM SIGOPS Operating Systems Review, vol.36, issue.3, pp.53-66, 2002.
DOI : 10.1145/567331.567336

A. Toninelli, R. Montanari, L. Kagal, and O. Lassila, A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments, International Semantic Web Conference, pp.473-486, 2006.
DOI : 10.1007/11926078_34

R. Wolf and M. Schneider, Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach, MMM-ACNS 2003, pp.267-278, 2003.
DOI : 10.1007/978-3-540-45215-7_22

C. Wullems, M. Looi, and A. Clark, Towards Context-aware Security: An Authorization Architecture for Intranet Environments. PerCom Workshops, pp.132-137, 2004.

M. Davis, M. Smith, F. Stentiford, A. Bamidele, J. Canny et al., Using context and similarity for face and location identification, Internet Imaging VII, 2006.
DOI : 10.1117/12.650981

S. Mitchell, M. D. Spiteri, J. Bates, C. , and G. , Context-aware multimedia computing in the intelligent hospital, Proceedings of the 9th workshop on ACM SIGOPS European workshop beyond the PC: new challenges for the operating system, EW 9, pp.13-18, 2000.
DOI : 10.1145/566726.566730

J. R. Quinlan, Induction of Decision Trees -Machine Learning, 1986.

D. Poole, Logic, Knowledge Representation, and Bayesian Decision Theory. Computational Logic, pp.70-86, 2000.
DOI : 10.1007/3-540-44957-4_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.3241

G. Shafer, A Mathematical Theory of Evidence, 1976.

A. K. Dey, G. D. Abowd, and D. Salber, A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications, Human-Computer Interaction, vol.37, issue.3, pp.97-166, 2001.
DOI : 10.1109/98.626982

E. Dejene, V. Scuturici, and L. Brunie, Hybrid Approach to Collaborative Context- Aware Service Platform for Pervasive Computing, Journal of Computers (JCP), pp.40-50, 2008.
URL : https://hal.archives-ouvertes.fr/hal-01500590

X. Wang, D. Zhang, T. Gu, K. Pung, and H. , Ontology Based Context Modeling and Reasoning using OWL. PerCom Workshops, p.IEEE, 2004.

R. Bhatti, E. Bertino, and A. Ghafoor, A Trust-Based Context-Aware Access Control Model for Web-Services. Distributed and Parallel Databases, pp.83-105, 2005.

J. Hu, C. Weaver, and A. , A Dynamic, Context-Aware Security Infrastructure for Distributed Healthcare Applications. 5th Workshop on Pervasive Security Privacy and Trust (PSPT), 2004.

J. Covington, M. Fogla, P. Zhan, Z. Ahamad, and M. , A context-aware security architecture for emerging applications, 18th Annual Computer Security Applications Conference, 2002. Proceedings., pp.249-260, 2002.
DOI : 10.1109/CSAC.2002.1176296

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.7335

J. Covington, M. Long, W. Srinivasan, S. , K. Dey et al., Securing context-aware applications using environment roles, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.10-20, 2001.
DOI : 10.1145/373256.373258

C. A. Ardagna, M. Cremonini, E. Damiani, S. De-capitani-di-vimercati, and P. Samarati, Supporting location-based conditions in access control policies, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, pp.212-222, 2006.
DOI : 10.1145/1128817.1128850

P. Java and C. , Community Development of Java Technology Specifications, p.135, 2008.

J. R. Quinlan, C4.5: programs for machine learning, 1993.

F. Smach, C. Lemaitre, J. Miteran, J. P. Gauthier, and M. Abid, Colour Object recognition combining Motion Descriptors, Zernike Moments and Support Vector Machine, IECON 2006, 32nd Annual Conference on IEEE Industrial Electronics, pp.3238-3242, 2006.
DOI : 10.1109/IECON.2006.347588

P. Dempster and A. , A Generalization of Bayesian Inference, Journal of Royal Statistical, pp.205-447, 1968.
DOI : 10.1007/978-3-540-44792-4_4

X. An, D. Jutla, and N. Cercone, Privacy intrusion detection using dynamic Bayesian networks. 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet, pp.208-215, 2006.
DOI : 10.1145/1151454.1151493

F. Jemili, M. Zaghdoud, B. Ahmed, and M. , A Framework for an Adaptive Intrusion Detection System using Bayesian Network. ISI, Computer Science, pp.66-70, 2007.

Y. Chen and D. Liginlal, Bayesian Networks for Knowledge-Based Authentication, IEEE Transactions on Knowledge and Data Engineering, vol.19, issue.5, pp.695-710, 2007.
DOI : 10.1109/TKDE.2007.1024

Y. Yuan and M. J. Shaw, Induction of fuzzy decision trees, Fuzzy Sets and Systems, vol.69, issue.2, 1995.
DOI : 10.1016/0165-0114(94)00229-Z