. Shibboleth, JRA3: Global Security Architecture, rev. 1. EGEE project deliverable, https://edms.cern.ch/document, 2005.

R. Alfieri, R. Cecchini, V. Ciaschini, L. Lo, Á. Frohner et al., VOMS, an Authorization System for Virtual Organizations, European Across Grids Conference, 2003.
DOI : 10.1007/978-3-540-24689-3_5

I. Blanquer, . Hernandez, E. Segrelles, and . Torres, Enhancing Privacy and Authorization Control Scalability in the Grid Through Ontologies, IEEE Transactions on Information Technology in Biomedicine, vol.13, issue.1, pp.16-24, 2009.
DOI : 10.1109/TITB.2008.2003369

D. W. Chadwick, G. Zhao, S. Otenko, R. Laborde, L. Su et al., Permis: a modular authorization infrastructure. Concurrency and Computation: Practice and Experience, pp.1341-1357, 2008.

F. David, R. S. Ferraiolo, S. I. Sandhu, D. R. Gavrila, R. Kuhn et al., Proposed NIST standard for role-based access control, ACM Trans. Inf. Syst. Secur, vol.4, issue.3, pp.224-274, 2001.

J. Montagnat, Á. Frohner, D. Jouvenot, C. Pera, P. Kunszt et al., A Secure Grid Medical Data Manager Interfaced to the gLite Middleware, Journal of Grid Computing, vol.22, issue.5, pp.45-59, 2008.
DOI : 10.1007/s10723-007-9088-2

URL : https://hal.archives-ouvertes.fr/hal-00683989

J. Montagnat, A. Gaignard, D. Lingrand, J. R. Balderrama, P. Collet et al., NeuroLOG: a community-driven middleware design, HealthGrid, pp.49-58, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00461611

D. Scardaci and G. Scuderi, Managing Confidential Data in the gLite Middleware, 16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2007), pp.298-299, 2007.
DOI : 10.1109/WETICE.2007.4407175

L. Seitz, J. Pierson, and L. Brunie, Key Management for Encrypted Data Storage in Distributed Systems, Second IEEE International Security in Storage Workshop, pp.20-30, 2003.
DOI : 10.1109/SISW.2003.10001

A. Stell, R. O. Sinnott, O. Ajayi, and J. Jiang, Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials, The Second International Conference on Availability, Reliability and Security (ARES'07), pp.629-636, 2007.
DOI : 10.1109/ARES.2007.137