Enabling Advanced and Context-Dependent Access Control in RDF Stores, 6th Int. Semantic Web Conference (ISWC), pp.1-14, 2007. ,
DOI : 10.1007/978-3-540-76298-0_1
Reasoning with semantics-aware access control policies for geospatial web services, Proceedings of the 3rd ACM workshop on Secure web services , SWS '06, pp.69-76, 2006. ,
DOI : 10.1145/1180367.1180380
Location-Aware Authentication and Access Control, IEEE 23rd Int. Conf. on Advanced Information Networking and Applications (AINA), pp.10-15, 2009. ,
DOI : 10.1109/aina.2009.50
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.556.6266
A data-oriented survey of context models, ACM SIGMOD Record, vol.36, issue.4, pp.19-26, 2007. ,
DOI : 10.1145/1361348.1361353
The Social Semantic Web, 2009. ,
Ontology-Based Access Rights Management, Advances in Knowledge Discovery and Management, pp.49-61, 2012. ,
DOI : 10.1007/978-3-642-25838-1_3
URL : https://hal.archives-ouvertes.fr/hal-01202126
SweetWiki: A semantic wiki, Web Semantics: Science, Services and Agents on the World Wide Web, vol.6, issue.1, pp.84-97, 2008. ,
DOI : 10.1016/j.websem.2007.11.003
URL : https://hal.archives-ouvertes.fr/hal-01154473
Semantic web-based social network access control, Computers & Security, vol.30, issue.2-3, pp.108-115, 2011. ,
DOI : 10.1016/j.cose.2010.08.003
Named graphs, Web Semantics: Science, Services and Agents on the World Wide Web, vol.3, issue.4, pp.247-267, 2005. ,
DOI : 10.1016/j.websem.2005.09.001
Querying the Semantic Web with Corese Search Engine, 16th Eureopean Conference on Artificial Intelligence (ECAI), pp.705-709, 2004. ,
Searching the Semantic Web: Approximate Query Processing Based on Ontologies, IEEE Intelligent Systems, vol.21, issue.1, pp.20-27, 2006. ,
DOI : 10.1109/MIS.2006.16
URL : https://hal.archives-ouvertes.fr/hal-01150215
The KGRAM Abstract Machine for Knowledge Graph Querying, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp.338-341, 2010. ,
DOI : 10.1109/WI-IAT.2010.144
Context-based access control management in ubiquitous environments, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings., pp.253-260, 2004. ,
DOI : 10.1109/NCA.2004.1347784
PRISSMA, Towards Mobile Adaptive Presentation of the Web of Data, Doctoral Consortium, 10th Int. Semantic Web Conference (ISWC), pp.269-276, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00691359
Ubiquitous access control for SPARQL endpoints, Proceedings of the 21st international conference companion on World Wide Web, WWW '12 Companion, pp.487-488, 2012. ,
DOI : 10.1145/2187980.2188090
URL : https://hal.archives-ouvertes.fr/hal-00691271
Securing context-aware applications using environment roles, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.10-20, 2001. ,
DOI : 10.1145/373256.373258
A Contextual Attribute-Based Access Control Model, Workshops On the Move to Meaningful Internet Systems (OTM), pp.1996-2006, 2006. ,
Rights Management and Digital Library Requirements, 2004. ,
Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008. ,
DOI : 10.1007/s10207-007-0051-9
URL : https://hal.archives-ouvertes.fr/hal-01207773
High Level Conflict Management Strategies in Advanced Access Control Models, Electronic Notes in Theoretical Computer Science, vol.186, pp.3-26, 2007. ,
DOI : 10.1016/j.entcs.2007.01.064
Understanding and Using Context. Personal and Ubiquitous Computing, pp.4-7, 2001. ,
BAC, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.73-82, 2008. ,
DOI : 10.1145/1377836.1377849
Controlling Access to RDF Graphs, 3rd Future Internet Symposium (FIS), pp.107-117, 2010. ,
DOI : 10.1007/11926078_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.5998
Ontology Driven Community Access Control, 1st Workshop on Trust and Privacy on the Social and Semantic Web, 2009. ,
Using RDF Metadata to Enable Access Control on the Social Semantic Web, Workshop on Collaborative Construction, Management and Linking of Structured Knowledge (CK). CEUR-WS.org, 2009. ,
Context sensitive access control, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.111-119, 2005. ,
DOI : 10.1145/1063979.1064000
Analyzing the AIR Language: A Semantic Web (Production) Rule Language, Web Reasoning and Rule Systems, 4th Int. Conference (RR), pp.58-72, 2010. ,
DOI : 10.1007/978-3-642-15918-3_6
An Ontology for Mobile Device Sensor-Based Context Awareness, Modeling and Using Context, 4th Int. and Interdisciplinary Conference (CONTEXT), pp.451-458, 2003. ,
DOI : 10.1007/3-540-44958-2_37
Extensible Access Control (EAC) Ontology Specification, 2008. ,
JeromeDL -Semantic and Social Technologies for Improving User Experience in Digital Libraries, World Wide Web Conference, 2008. ,
Context-aware role-based access control in pervasive computing systems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.113-122, 2008. ,
DOI : 10.1145/1377836.1377854
Fedora: an architecture for complex objects and their relationships, International Journal on Digital Libraries, vol.6, issue.2, pp.124-138, 2006. ,
DOI : 10.1007/s00799-005-0130-3
SWRL-based Access Policies for Linked Data, 2nd Workshop on Trust and Privacy on the Social and Semantic Web (SPOT). CEUR-WS.org, 2010. ,
Extracting and Utilizing Social Networks from Log Files of Shared Workspaces, 10th IFIP Working Conference on Virtual Enterprises, pp.643-650, 2009. ,
DOI : 10.1145/1379092.1379105
A Privacy Preference Manager for the Social Semantic Web, 2nd Workshop on Semantic Personalized Information Management: Retrieval and Recommendation (SPIM), 2011. ,
A Privacy Preference Ontology (PPO) for Linked Data, Linked Data on the Web Workshop (LDOW). CEUR-WS.org, 2011. ,
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
A Context-Aware Semantic-Based Access Control Model for Mobile Web Services, Int. J. Computer Network and Information Security, vol.18, issue.3, 2011. ,
DOI : 10.1007/978-3-642-13136-3_20
FOAF+TLS: RESTful Authentication for Distributed Social Networks, 1st Workshop on Trust and Privacy on the Social and Semantic Web (SPOT). CEUR-WS.org, 2009. ,
Access Control in the Social Semantic Web -Extending the idea of FOAF+SSL in KiWi, 2nd Workshop on Trust and Privacy on the Social and Semantic Web (SPOT). CEUR-WS.org, 2010. ,
A Quality of Context-Aware Approach to Access Control in Pervasive Environments, 2nd Int. Conf. on Mobile Wireless Middleware, Operating Systems, and Applications (MOBILWARE), pp.236-251, 2009. ,
DOI : 10.1007/978-3-642-01802-2_18
A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments, 5th International Semantic Web Conference (ISWC), pp.473-486, 2006. ,
DOI : 10.1007/11926078_34
Proteus: A Semantic Context-Aware Adaptive Policy Model, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), pp.129-140, 2007. ,
DOI : 10.1109/POLICY.2007.40
An Access Control Model for Linked Data, 7th Int. IFIP Workshop on Semantic Web & Web Semantics (SWWS), pp.454-463, 2011. ,
DOI : 10.1016/j.websem.2005.09.001
URL : https://hal.archives-ouvertes.fr/hal-00695229
A Social Semantic Web Access Control Model, 4th Int. Workshop Social Data on the Web (SDoW), pp.48-59, 2011. ,
DOI : 10.1007/s13740-012-0014-9
URL : https://hal.archives-ouvertes.fr/hal-00907866