A survey of trust in computer science and the Semantic Web, Web Semantics: Science, Services and Agents on the World Wide Web, vol.5, issue.2, pp.58-71, 2007. ,
DOI : 10.1016/j.websem.2007.03.002
Decentralized trust management, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.164-173, 1996. ,
DOI : 10.1109/SECPRI.1996.502679
How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective, 2013 IEEE Security and Privacy Workshops, pp.13-17, 2013. ,
DOI : 10.1109/SPW.2013.24
Why and Where: A Characterization of Data Provenance, ICDT, pp.316-330, 2001. ,
Secure computer systems: Mathematical foundations, 1973. ,
History-Based Access Control and Secure Information Flow, CASSIS, pp.27-48, 2004. ,
DOI : 10.1007/978-3-540-30569-9_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.4093
Securing Provenance, HotSec, 2008. ,
A primer on provenance, Communications of the ACM, vol.57, issue.5, pp.52-60, 2014. ,
DOI : 10.1145/2596628
Provenance in Databases: Why, How, and Where, Foundations and Trends in Databases, vol.1, issue.4, pp.379-474, 2009. ,
DOI : 10.1561/1900000006
Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, vol.13, issue.1, 2009. ,
DOI : 10.1145/1609956.1609962
A language for provenance access control, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.133-144, 2011. ,
DOI : 10.1145/1943513.1943532
Role engineering, Proceedings of the first ACM Workshop on Role-based access control , RBAC '95, 1995. ,
DOI : 10.1145/270152.270159
Towards a Taxonomy of Provenance in Scientific Workflow Management Systems, SERVICES I, pp.259-266, 2009. ,
Annotated XML, Proceedings of the twenty-seventh ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '08, pp.271-280, 2008. ,
DOI : 10.1145/1376916.1376954
Vassilis Christophides, and Irini Fundulaki Algebraic structures for capturing the provenance of SPARQL queries, ICDT, pp.153-164, 2013. ,
Provenance semirings, Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '07, pp.31-40, 2007. ,
DOI : 10.1145/1265530.1265535
On the need for a third form of access control, Proceedings of the 12th National Computer Security Conference, pp.296-304, 1989. ,
A Policy Language for Distributed Usage Control, ESORICS, pp.531-546, 2007. ,
DOI : 10.1007/978-3-540-74835-9_35
A Policy Language for Distributed Usage Control, ESORICS, pp.531-546, 2007. ,
DOI : 10.1007/978-3-540-74835-9_35
Provenance in collaborative data sharing, 2009. ,
Semiring-annotated data, ACM SIGMOD Record, vol.41, issue.3, pp.5-14, 2012. ,
DOI : 10.1145/2380776.2380778
D-FOAF: Distributed Identity Management with Access Rights Delegation, ASWC, pp.140-154, 2006. ,
Collaborative data sharing via update exchange and provenance Querying data provenance, SIGMOD Conference, pp.19-951, 2010. ,
Data usage control enforcement in distributed systems, Proceedings of the third ACM conference on Data and application security and privacy, CODASPY '13, pp.71-82, 2013. ,
DOI : 10.1145/2435349.2435358
Distributed data usage control for web applications, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.85-96, 2011. ,
DOI : 10.1145/1943513.1943526
A general obligation model and continuity, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.123-132, 2008. ,
DOI : 10.1145/1377836.1377856
Usage control in computer security: A survey, Computer Science Review, vol.4, issue.2, pp.81-99, 2010. ,
DOI : 10.1016/j.cosrev.2010.02.002
Towards a dynamic multi-policy dissemination control model, ACM SIGMOD Record, vol.35, issue.1, pp.33-38, 2006. ,
DOI : 10.1145/1121995.1122001
The Open Provenance Model core specification ,
Beyond the pale of MAC and DAC-defining new forms of access control, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.190-200, 1990. ,
DOI : 10.1109/RISP.1990.63850
An Access Control Language for a General Provenance Model, Secure Data Management, pp.68-88, 2009. ,
Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006. ,
DOI : 10.1145/1151030.1151053
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.3191
A provenance-based access control model, 2012 Tenth Annual International Conference on Privacy, Security and Trust, pp.137-144, 2012. ,
DOI : 10.1109/PST.2012.6297930
Originator Control in Usage Control, POLICY, pp.60-66, 2002. ,
Towards usage control models: beyond traditional access control, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.57-64, 2002. ,
DOI : 10.1145/507711.507722
Digibox: A self-protecting container for information commerce, Proceedings of the first USENIX workshop on electronic commerce, pp.1-13, 1995. ,
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Persistent access control to prevent piracy of digital information, Proceedings of the IEEE, pp.1239-1250, 1999. ,
A survey of data provenance in e-science, ACM SIGMOD Record, vol.34, issue.3, pp.31-36, 2005. ,
DOI : 10.1145/1084805.1084812
Access control in collaborative systems, ACM Computing Surveys, vol.37, issue.1, pp.29-41, 2005. ,
DOI : 10.1145/1057977.1057979
Reliable storage and querying for collaborative data sharing systems, ICDE, pp.40-51, 2010. ,
Tuple-based access control, Proceedings of the 30th Annual ACM Symposium on Applied Computing, SAC '15, 2014. ,
DOI : 10.1145/2695664.2695758
URL : https://hal.archives-ouvertes.fr/hal-01192900
Formal Model and Analysis of Usage Control, p.3221391, 2006. ,