D. O. Tcsec, Trusted computer system evaluation criteria, pp.28-83, 1985.

J. H. Saltzer and M. D. Schroeder, The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, pp.1278-1288, 1975.
DOI : 10.1109/PROC.1975.9939

G. Graham, P. J. Scott, and . Denning, Protection, Proceedings of the November 16-18, 1971, fall joint computer conference on, AFIPS '71 (Fall), 1972.
DOI : 10.1145/1478873.1478928

R. S. Sandhu, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

V. C. Hu, D. Ferraiolo, R. Kuhn, A. Schnitzer, K. Sandlin et al., Guide to attribute based access control (ABAC) definition and considerations, NIST Special Publication, vol.800, pp.162-167, 2014.
DOI : 10.6028/NIST.SP.800-162

W. Han and C. Lei, A survey on policy languages in network and security management, Computer Networks, vol.56, issue.1, pp.477-489, 2012.
DOI : 10.1016/j.comnet.2011.09.014

B. Jack, E. C. Dennis, and . Van-horn, Programming Semantics for Multiprogrammed Computations, Communications of the ACM, vol.9, issue.3, pp.365252-365257, 1966.

R. S. Fabry, Capability-based addressing, Communications of the ACM, vol.17, issue.7, pp.403-412, 1974.
DOI : 10.1145/361011.361070

A. K. Jones, StarOS, a multiprocessor operating system for the support of task forces, Proceedings of the seventh symposium on Operating systems principles , SOSP '79, p.multics, 1979.
DOI : 10.1145/800215.806579

M. and F. Freitag, Tahoe-LAFS Distributed Storage Service in Community Network Clouds, Big Data and Cloud Computing (BdCloud), 2014 IEEE Fourth International Conference on. IEEE, p.5, 2014.

M. S. Miller, Safe active content in sanitized JavaScript, Tech. Rep, p.5, 2008.

A. Mettler, D. Wagner, and T. Close, Joe-E : A Security-Oriented Subset of Java, NDSS, vol.10, p.5, 2010.

M. S. Miller, K. Yee, and J. Shapiro, Capability myths demolished, p.5, 2003.

D. Bell, The bell-lapadula model, Journal of computer security, vol.42, pp.3-5, 1996.

K. J. Biba, Integrity considerations for secure computer systems. No. MTR-3153- REV-1, MITRE CORP BEDFORD MA, p.5, 1977.

F. J. Corbato and V. A. Vyssotsky, Introduction and overview of the Multics system, fall joint computer conference, part I, Proceedings of the, p.5, 1965.

D. D. Clark and D. R. Wilson, A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, p.5, 1987.
DOI : 10.1109/SP.1987.10001

A. Shabtai, Y. Elovici, and L. Rokach, A survey of data leakage detection and prevention solutions, 2012.
DOI : 10.1007/978-1-4614-2053-8

M. Gafny, Detecting data misuse by applying context-based data linkage, Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, 2010.
DOI : 10.1145/1866886.1866890

. Li and . Hao, Leakage Prevention Method for Unstructured Data Based on Classification Applications and Techniques in Information Security, pp.2015-337, 2015.

C. Chae, A privacy data leakage prevention method in P2P networks Peer-to-Peer Networking and Applications, pp.1-12, 2015.

P. Zilberman, Analyzing group communication for preventing data leakage via email, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, 2011.
DOI : 10.1109/ISI.2011.5984047

M. Alawneh and I. M. Abbadi, Preventing information leakage between collaborating organisations, Proceedings of the 10th international conference on Electronic commerce, ICEC '08, 2008.
DOI : 10.1145/1409540.1409592

T. Wuchner and A. Pretschner, Data Loss Prevention Based on Data-Driven Usage Control, 2012 IEEE 23rd International Symposium on Software Reliability Engineering, 2012.
DOI : 10.1109/ISSRE.2012.10

F. Kelbert and A. Pretschner, Data usage control enforcement in distributed systems Proceedings of the third ACM conference on Data and application security and privacy, 2013.

J. Park and R. Sandhu, The UCON ABC usage control model, ACM Transactions on Information and System Security (TISSEC), vol.71, issue.6, pp.128-174, 2004.

M. Hilty, A Policy Language for Distributed Usage Control Proc, European Symp. Research in Computer Security, pp.531-546, 2007.

F. Cuppens, N. Cuppens-boulahia, and M. B. Ghorbel, High Level Conflict Management Strategies in Advanced Access Control Models, Electronic Notes in Theoretical Computer Science, vol.186, pp.3-26, 2007.
DOI : 10.1016/j.entcs.2007.01.064

S. Ayed, N. Cuppens-boulahia, and F. Cuppens, Managing access and flow control requirements in distributed workflows, 2008 IEEE/ACS International Conference on Computer Systems and Applications, p.7, 2008.
DOI : 10.1109/AICCSA.2008.4493605

S. Ayed, N. Cuppens-boulahia, and F. Cuppens, An integrated model for access control and information flow requirements Advances in Computer Science ASIAN 2007. Computer and Network Security, pp.2007111-125, 2007.

K. Johnson and B. L. Filkins, SANS Mobility/BYOD Security Survey SANS Institute Whitepaper. https://www.sans.org/reading-room/whitepapers/ analyst/cybersecurity-professional-trends-survey, pp.34615-34622, 2012.

. Cryptzone, Network Security Survey Results : Is Network Access Putting You at Risk ? https

Y. Bertrand, M. Blay-fornarino, and K. Boudaoud, Michel Riveill : Generation of Transmission Control Rules Compliant with Existing Access Control Policies, Secure- Comm, vol.2015, pp.438-455, 2015.

S. Barker, Logical Approaches to Authorization Policies, Logic Programs, Norms and Action, pp.349-373, 2012.
DOI : 10.1007/978-3-642-29414-3_19

N. Slimani, Unified access control modeling language. New Technologies , Mobility and Security (NTMS), 4th IFIP International Conference on, p.14, 2011.

S. Khamadja, K. Adi, and L. Logrippo, An access control framework for hybrid policies, Proceedings of the 6th International Conference on Security of Information and Networks, SIN '13, pp.282-286, 2013.
DOI : 10.1145/2523514.2523549