F. Abel, J. Luca-de-coi, N. Henze, A. W. Koesling, D. Krause et al., Enabling Advanced and Context-Dependent Access Control in RDF Stores, 6th Int. Semantic Web Conference (ISWC), pp.1-14, 2007.
DOI : 10.1007/978-3-540-76298-0_1

A. Alam, G. Subbiah, B. M. Thuraisingham, and L. Khan, Reasoning with semantics-aware access control policies for geospatial web services, Proceedings of the 3rd ACM workshop on Secure web services , SWS '06, pp.69-76, 2006.
DOI : 10.1145/1180367.1180380

E. Bertino and M. S. Kirkpatrick, Location-Aware Authentication and Access Control, IEEE 23rd Int. Conf. on Advanced Information Networking and Applications (AINA), pp.10-15, 2009.
DOI : 10.1109/aina.2009.50

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.556.6266

C. Bolchini, C. Curino, E. Quintarelli, F. A. Schreiber, and L. Tanca, A data-oriented survey of context models, ACM SIGMOD Record, vol.36, issue.4, pp.19-26, 2007.
DOI : 10.1145/1361348.1361353

J. Breslin, A. Passant, and S. Decker, The Social Semantic Web, 2009.

M. Buffa and C. Faron-zucker, Ontology-Based Access Rights Management, Advances in Knowledge Discovery and Management, pp.49-61, 2012.
DOI : 10.1007/978-3-642-25838-1_3

URL : https://hal.archives-ouvertes.fr/hal-01202126

M. Buffa, F. L. Gandon, G. Erétéo, P. Sander, and C. Faron, SweetWiki: A semantic wiki, Web Semantics: Science, Services and Agents on the World Wide Web, vol.6, issue.1, pp.84-97, 2008.
DOI : 10.1016/j.websem.2007.11.003

URL : https://hal.archives-ouvertes.fr/hal-01154473

B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. M. Thuraisingham, Semantic web-based social network access control, Computers & Security, vol.30, issue.2-3, pp.108-115, 2011.
DOI : 10.1016/j.cose.2010.08.003

J. J. Carroll, C. Bizer, P. J. Hayes, and P. Stickler, Named graphs, Web Semantics: Science, Services and Agents on the World Wide Web, vol.3, issue.4, pp.247-267, 2005.
DOI : 10.1016/j.websem.2005.09.001

O. Corby, R. Dieng-kuntz, and C. Faron-zucker, Querying the Semantic Web with Corese Search Engine, 16th Eureopean Conference on Artificial Intelligence (ECAI), pp.705-709, 2004.

O. Corby, R. Dieng-kuntz, C. Faron-zucker, and F. L. Gandon, Searching the Semantic Web: Approximate Query Processing Based on Ontologies, IEEE Intelligent Systems, vol.21, issue.1, pp.20-27, 2006.
DOI : 10.1109/MIS.2006.16

URL : https://hal.archives-ouvertes.fr/hal-01150215

O. Corby and C. Faron-zucker, The KGRAM Abstract Machine for Knowledge Graph Querying, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp.338-341, 2010.
DOI : 10.1109/WI-IAT.2010.144

A. Corradi, R. Montanari, and D. Tibaldi, Context-based access control management in ubiquitous environments, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings., pp.253-260, 2004.
DOI : 10.1109/NCA.2004.1347784

L. Costabello, PRISSMA, Towards Mobile Adaptive Presentation of the Web of Data, Doctoral Consortium, 10th Int. Semantic Web Conference (ISWC), pp.269-276, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00691359

L. Costabello, S. Villata, N. Delaforge, and F. L. Gandon, Ubiquitous access control for SPARQL endpoints, Proceedings of the 21st international conference companion on World Wide Web, WWW '12 Companion, pp.487-488, 2012.
DOI : 10.1145/2187980.2188090

URL : https://hal.archives-ouvertes.fr/hal-00691271

M. J. Covington, W. Long, S. Srinivasan, A. K. Dey, M. Ahamad et al., Securing context-aware applications using environment roles, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.10-20, 2001.
DOI : 10.1145/373256.373258

J. Michael, M. R. Covington, and . Sastry, A Contextual Attribute-Based Access Control Model, Workshops On the Move to Meaningful Internet Systems (OTM), pp.1996-2006, 2006.

K. Coyle, Rights Management and Digital Library Requirements, 2004.

F. Cuppens and N. Cuppens-boulahia, Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, pp.285-305, 2008.
DOI : 10.1007/s10207-007-0051-9

URL : https://hal.archives-ouvertes.fr/hal-01207773

F. Cuppens and N. Cuppens-boulahia, High Level Conflict Management Strategies in Advanced Access Control Models, Electronic Notes in Theoretical Computer Science, vol.186, pp.3-26, 2007.
DOI : 10.1016/j.entcs.2007.01.064

K. Anind and . Dey, Understanding and Using Context. Personal and Ubiquitous Computing, pp.4-7, 2001.

T. W. Finin, A. Joshi, L. Kagal, J. Niu, R. S. Sandhu et al., BAC, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.73-82, 2008.
DOI : 10.1145/1377836.1377849

G. Flouris, I. Fundulaki, M. Michou, and G. Antoniou, Controlling Access to RDF Graphs, 3rd Future Internet Symposium (FIS), pp.107-117, 2010.
DOI : 10.1007/11926078_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.5998

F. Giunchiglia, R. Zhang, and B. Crispo, Ontology Driven Community Access Control, 1st Workshop on Trust and Privacy on the Social and Semantic Web, 2009.

J. Hollenbach, J. Presbrey, and T. Berners-lee, Using RDF Metadata to Enable Access Control on the Social Semantic Web, Workshop on Collaborative Construction, Management and Linking of Structured Knowledge (CK). CEUR-WS.org, 2009.

R. J. Hulsebosch, A. H. Salden, M. S. Bargh, P. W. Ebben, and J. Reitsma, Context sensitive access control, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.111-119, 2005.
DOI : 10.1145/1063979.1064000

A. Khandelwal, J. Bao, L. Kagal, I. Jacobi, L. Ding et al., Analyzing the AIR Language: A Semantic Web (Production) Rule Language, Web Reasoning and Rule Systems, 4th Int. Conference (RR), pp.58-72, 2010.
DOI : 10.1007/978-3-642-15918-3_6

P. Korpipää and J. Mäntyjärvi, An Ontology for Mobile Device Sensor-Based Context Awareness, Modeling and Using Context, 4th Int. and Interdisciplinary Conference (CONTEXT), pp.451-458, 2003.
DOI : 10.1007/3-540-44958-2_37

S. R. Kruk, Extensible Access Control (EAC) Ontology Specification, 2008.

S. R. Kruk, M. Cygan, and A. Gzella, JeromeDL -Semantic and Social Technologies for Improving User Experience in Digital Libraries, World Wide Web Conference, 2008.

D. Kulkarni and A. Tripathi, Context-aware role-based access control in pervasive computing systems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.113-122, 2008.
DOI : 10.1145/1377836.1377854

C. Lagoze, S. Payette, E. Shin, and C. Wilper, Fedora: an architecture for complex objects and their relationships, International Journal on Digital Libraries, vol.6, issue.2, pp.124-138, 2006.
DOI : 10.1007/s00799-005-0130-3

H. Muhleisen, M. Kost, and J. Freytag, SWRL-based Access Policies for Linked Data, 2nd Workshop on Trust and Privacy on the Social and Semantic Web (SPOT). CEUR-WS.org, 2010.

P. Nasirifard, V. Peristeras, C. Hayes, and S. Decker, Extracting and Utilizing Social Networks from Log Files of Shared Workspaces, 10th IFIP Working Conference on Virtual Enterprises, pp.643-650, 2009.
DOI : 10.1145/1379092.1379105

O. Sacco and A. Passant, A Privacy Preference Manager for the Social Semantic Web, 2nd Workshop on Semantic Personalized Information Management: Retrieval and Recommendation (SPIM), 2011.

O. Sacco and A. Passant, A Privacy Preference Ontology (PPO) for Linked Data, Linked Data on the Web Workshop (LDOW). CEUR-WS.org, 2011.

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

H. Shen and Y. Cheng, A Context-Aware Semantic-Based Access Control Model for Mobile Web Services, Int. J. Computer Network and Information Security, vol.18, issue.3, 2011.
DOI : 10.1007/978-3-642-13136-3_20

H. Story, B. Harbulot, I. Jacobi, and M. Jones, FOAF+TLS: RESTful Authentication for Distributed Social Networks, 1st Workshop on Trust and Privacy on the Social and Semantic Web (SPOT). CEUR-WS.org, 2009.

S. Stroka, S. Schaffert, and T. Burger, Access Control in the Social Semantic Web -Extending the idea of FOAF+SSL in KiWi, 2nd Workshop on Trust and Privacy on the Social and Semantic Web (SPOT). CEUR-WS.org, 2010.

A. Toninelli, A. Corradi, and R. Montanari, A Quality of Context-Aware Approach to Access Control in Pervasive Environments, 2nd Int. Conf. on Mobile Wireless Middleware, Operating Systems, and Applications (MOBILWARE), pp.236-251, 2009.
DOI : 10.1007/978-3-642-01802-2_18

A. Toninelli, R. Montanari, L. Kagal, and O. Lassila, A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments, 5th International Semantic Web Conference (ISWC), pp.473-486, 2006.
DOI : 10.1007/11926078_34

A. Toninelli, R. Montanari, L. Kagal, and O. Lassila, Proteus: A Semantic Context-Aware Adaptive Policy Model, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), pp.129-140, 2007.
DOI : 10.1109/POLICY.2007.40

S. Villata, N. Delaforge, F. Gandon, and A. Gyrard, An Access Control Model for Linked Data, 7th Int. IFIP Workshop on Semantic Web & Web Semantics (SWWS), pp.454-463, 2011.
DOI : 10.1016/j.websem.2005.09.001

URL : https://hal.archives-ouvertes.fr/hal-00695229

S. Villata, N. Delaforge, F. Gandon, and A. Gyrard, A Social Semantic Web Access Control Model, 4th Int. Workshop Social Data on the Web (SDoW), pp.48-59, 2011.
DOI : 10.1007/s13740-012-0014-9

URL : https://hal.archives-ouvertes.fr/hal-00907866