J. Biskup, Security in Computing Systems: Challenges, Approaches and Solutions, 1st edn, 2008.

M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976.
DOI : 10.1145/360303.360333

D. Ferraiolo and D. Kuhn, Role-based access controls, 15th National Computer Security Conference. NSA/NIST, pp.554-563, 1992.

E. Bertino, P. A. Bonatti, and E. Ferrari, TRBAC, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.191-233, 2001.
DOI : 10.1145/344287.344298

F. Hansen and V. Oleshchuk, SRBAC: A spatial role-based access control model for mobile systems, Proceedings of the 7th Nordic Workshop on Secure IT Systems, 2003.

G. Zhang and M. Parashar, Dynamic context-aware access control for grid applications, Proceedings. First Latin American Web Congress, pp.101-108, 2003.
DOI : 10.1109/GRID.2003.1261704

S. H. Chae, W. Kim, and D. Kim, uT-RBAC: Ubiquitous Role-Based Access Control Model, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.89, issue.1, pp.238-239, 2006.
DOI : 10.1093/ietfec/e89-a.1.238

D. Kulkarni and A. Tripathi, Context-aware role-based access control in pervasive computing systems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.113-122, 2008.
DOI : 10.1145/1377836.1377854

D. Povey, Optimistic security, Proceedings of the 1999 workshop on New security paradigms , NSPW '99, pp.40-45, 1999.
DOI : 10.1145/335169.335188

E. Rissanen, B. S. Firozabadi, and M. J. Sergot, Towards a Mechanism for Discretionary Overriding of Access Control, Protocols 2004, pp.312-319, 2006.
DOI : 10.1007/978-3-540-45126-6_13

N. Joint, P. Security, and . Committee, Break-glass -an approach to granting emergency access to healthcare systems, 2004.

T. Catarci, M. De-leoni, A. Marrella, M. Mecella, B. Salvatore et al., Pervasive Software Environments for Supporting Disaster Responses, IEEE Internet Computing, vol.12, issue.1, pp.26-37, 2008.
DOI : 10.1109/MIC.2008.18

K. Kawagoe and K. Kasai, Situation, Team and Role based Access Control, Journal of Computer Science, vol.7, issue.5, pp.629-637, 2011.
DOI : 10.3844/jcssp.2011.629.637

M. Sánchez, G. López, Ó. Cánovas, J. A. Sánchez, and A. F. Gómez-skarmeta, An Access Control System for Multimedia Content Distribution, EuroPKI 2006, pp.169-183, 2006.
DOI : 10.1007/11774716_14

V. El-khoury, A multi-level access control scheme for multimedia database, Proceedings of the 9th Workshop on Multimedia Metadata, p.2009, 2009.
URL : https://hal.archives-ouvertes.fr/hal-01437650

S. Chen, M. Shyu, and N. Zhao, SMARXO, Proceedings of the 12th annual ACM international conference on Multimedia , MULTIMEDIA '04, pp.432-435, 2004.
DOI : 10.1145/1027527.1027631

B. Thuraisingham, G. Lavee, E. Bertino, J. Fan, and L. Khan, Access control, confidentiality and privacy for video surveillance databases, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.1-10, 2006.
DOI : 10.1145/1133058.1133061

M. Brut, D. Codreanu, S. Dumitrescu, A. Manzat, and F. Sedes, A Distributed Architecture for Flexible Multimedia Management and Retrieval, Part II, pp.249-263, 2011.
DOI : 10.1023/B:MTAP.0000046380.27575.a5

A. Kukhun, D. Sedes, and F. , Adaptive Solutions for Access Control within Pervasive Healthcare Systems, ICOST 2008, pp.42-53, 2008.
DOI : 10.1007/978-3-540-69916-3_6