D. Artz and Y. Gil, A survey of trust in computer science and the Semantic Web, Web Semantics: Science, Services and Agents on the World Wide Web, vol.5, issue.2, pp.58-71, 2007.
DOI : 10.1016/j.websem.2007.03.002

[. Blaze, J. Feigenbaum, and J. Lacy, Decentralized trust management, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.164-173, 1996.
DOI : 10.1109/SECPRI.1996.502679

C. Bier, How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective, 2013 IEEE Security and Privacy Workshops, pp.13-17, 2013.
DOI : 10.1109/SPW.2013.24

S. Peter-buneman, W. Khanna, and . Tan, Why and Where: A Characterization of Data Provenance, ICDT, pp.316-330, 2001.

[. Bell, J. Leonard, and . Lapadula, Secure computer systems: Mathematical foundations, 1973.

A. Banerjee and D. A. Naumann, History-Based Access Control and Secure Information Flow, CASSIS, pp.27-48, 2004.
DOI : 10.1007/978-3-540-30569-9_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.4093

U. Braun, A. Shinnar, and M. I. Seltzer, Securing Provenance, HotSec, 2008.

L. Carata, S. Akoush, N. Balakrishnan, T. Bytheway, R. Sohan et al., A primer on provenance, Communications of the ACM, vol.57, issue.5, pp.52-60, 2014.
DOI : 10.1145/2596628

J. Cheney, L. Chiticariu, and W. Tan, Provenance in Databases: Why, How, and Where, Foundations and Trends in Databases, vol.1, issue.4, pp.379-474, 2009.
DOI : 10.1561/1900000006

[. Carminati, E. Ferrari, and A. Perego, Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, vol.13, issue.1, 2009.
DOI : 10.1145/1609956.1609962

T. Cadenhead, V. Khadilkar, M. Kantarcioglu, and B. M. Thuraisingham, A language for provenance access control, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.133-144, 2011.
DOI : 10.1145/1943513.1943532

E. J. Coyne, Role engineering, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, 1995.
DOI : 10.1145/270152.270159

S. Manuel-serra-da-cruz, M. L. Machado-campos, and M. Mattoso, Towards a Taxonomy of Provenance in Scientific Workflow Management Systems, SERVICES I, pp.259-266, 2009.

[. Foster, T. J. Green, and V. Tannen, Annotated XML, Proceedings of the twenty-seventh ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '08, pp.271-280, 2008.
DOI : 10.1145/1376916.1376954

F. Geerts and G. Karvounarakis, Vassilis Christophides, and Irini Fundulaki Algebraic structures for capturing the provenance of SPARQL queries, ICDT, pp.153-164, 2013.

T. J. Green, G. Karvounarakis, and V. Tannen, Provenance semirings, Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '07, pp.31-40, 2007.
DOI : 10.1145/1265530.1265535

R. Graubart, On the need for a third form of access control, Proceedings of the 12th National Computer Security Conference, pp.296-304, 1989.

A. Hilty, D. A. Pretschner, C. Basin, T. Schaefer, and . Walter, A Policy Language for Distributed Usage Control, ESORICS, pp.531-546, 2007.
DOI : 10.1007/978-3-540-74835-9_35

A. Hilty, D. A. Pretschner, C. Basin, T. Schaefer, and . Walter, A Policy Language for Distributed Usage Control, ESORICS, pp.531-546, 2007.
DOI : 10.1007/978-3-540-74835-9_35

[. Karvounarakis, Provenance in collaborative data sharing, 2009.

[. Karvounarakis and T. J. Green, Semiring-annotated data, ACM SIGMOD Record, vol.41, issue.3, pp.5-14, 2012.
DOI : 10.1145/2380776.2380778

S. Sebastian-ryszard-kruk, A. Grzonkowski, T. Gzella, H. Woroniecki, and . Choi, D-FOAF: Distributed Identity Management with Access Rights Delegation, ASWC, pp.140-154, 2006.

G. Karvounarakis, T. J. Green, Z. G. Ives, and V. Tannen, Collaborative data sharing via update exchange and provenance Querying data provenance, SIGMOD Conference, pp.19-951, 2010.

F. Kelbert and A. Pretschner, Data usage control enforcement in distributed systems, Proceedings of the third ACM conference on Data and application security and privacy, CODASPY '13, pp.71-82, 2013.
DOI : 10.1145/2435349.2435358

P. Kumari, A. Pretschner, J. Peschla, and J. Kuhn, Distributed data usage control for web applications, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.85-96, 2011.
DOI : 10.1145/1943513.1943526

X. Katt, R. Zhang, M. Breu, J. Hafner, and . Seifert, A general obligation model and continuity, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.123-132, 2008.
DOI : 10.1145/1377836.1377856

A. Lazouski, F. Martinelli, and P. Mori, Usage control in computer security: A survey, Computer Science Review, vol.4, issue.2, pp.81-99, 2010.
DOI : 10.1016/j.cosrev.2010.02.002

Z. Li and X. Ye, Towards a dynamic multi-policy dissemination control model, ACM SIGMOD Record, vol.35, issue.1, pp.33-38, 2006.
DOI : 10.1145/1121995.1122001

J. Stephan and . Van-den-bussche, The Open Provenance Model core specification

C. Jensen-mccollum, R. Judith, L. Messing, and . Notargiacomo, Beyond the pale of MAC and DAC-defining new forms of access control, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.190-200, 1990.
DOI : 10.1109/RISP.1990.63850

S. Nxb-+-09-]-qun-ni, E. Xu, R. S. Bertino, W. Sandhu, and . Han, An Access Control Language for a General Provenance Model, Secure Data Management, pp.68-88, 2009.

A. Pretschner, M. Hilty, and D. A. Basin, Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006.
DOI : 10.1145/1151030.1151053

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.3191

[. Park, D. Nguyen, and R. S. Sandhu, A provenance-based access control model, 2012 Tenth Annual International Conference on Privacy, Security and Trust, pp.137-144, 2012.
DOI : 10.1109/PST.2012.6297930

[. Park and R. S. Sandhu, Originator Control in Usage Control, POLICY, pp.60-66, 2002.

[. Park and R. S. Sandhu, Towards usage control models: beyond traditional access control, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.57-64, 2002.
DOI : 10.1145/507711.507722

O. Sibert, D. Bernstein, and D. Van-wie, Digibox: A self-protecting container for information commerce, Proceedings of the first USENIX workshop on electronic commerce, pp.1-13, 1995.

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

B. Paul and . Schneck, Persistent access control to prevent piracy of digital information, Proceedings of the IEEE, pp.1239-1250, 1999.

[. Simmhan, B. Plale, and D. Gannon, A survey of data provenance in e-science, ACM SIGMOD Record, vol.34, issue.3, pp.31-36, 2005.
DOI : 10.1145/1084805.1084812

W. J. Tolone, G. Ahn, T. Pai, and S. Hong, Access control in collaborative systems, ACM Computing Surveys, vol.37, issue.1, pp.29-41, 2005.
DOI : 10.1145/1057977.1057979

E. Nicholas, Z. G. Taylor, and . Ives, Reliable storage and querying for collaborative data sharing systems, ICDE, pp.40-51, 2010.

[. Thion, F. Lesueur, and M. Talbi, Tuple-based access control, Proceedings of the 30th Annual ACM Symposium on Applied Computing, SAC '15, 2014.
DOI : 10.1145/2695664.2695758

URL : https://hal.archives-ouvertes.fr/hal-01192900

X. Zhang, Formal Model and Analysis of Usage Control, p.3221391, 2006.