A. Kalam, S. Benferhat, A. Miege, R. Baida, F. Cuppens et al., Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003.
DOI : 10.1109/POLICY.2003.1206966

URL : https://hal.archives-ouvertes.fr/hal-01483818

A. Kalam, Y. Deswarte, A. Baina, and M. Kaaniche, PolyOrBAC: A security framework for Critical Infrastructures, International Journal of Critical Infrastructure Protection, vol.2, issue.4, pp.154-169, 2009.
DOI : 10.1016/j.ijcip.2009.08.005

URL : https://hal.archives-ouvertes.fr/hal-00851762

A. Baina, A. Kalam, Y. Deswarte, and M. Kaaniche, Collaborative access control framework for critical infrastructures, Critical Infrastructure Protection II, pp.189-201, 2008.

D. Bell and L. Lapadula, Secure Computer Systems: Unified Exposition and Multics Interpretation, MITRE Corporation, 1975.

S. Benferhat, R. Baida, and F. Cuppens, A stratification-based approach for handling conflicts in access control, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, pp.189-195, 2003.
DOI : 10.1145/775412.775437

K. Biba, Integrity Considerations for Secure Computer Systems, MITRE Corporation, 1977.

M. Bishop, What is computer security?, IEEE Security & Privacy Magazine, vol.1, issue.1, 2003.
DOI : 10.1109/MSECP.2003.1176998

D. Brewer and M. Nash, The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.206-214, 1988.
DOI : 10.1109/SECPRI.1989.36295

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.8977

D. Clark and D. Wilson, A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, pp.184-195, 1987.
DOI : 10.1109/SP.1987.10001

N. Essaouini, A. Kalam, and A. A. Ouahman, Access control policy: A framework to enforce recommendations, International Journal of Computer Science and Information Technologies, vol.2, issue.5, pp.2452-2463, 2011.

D. Ferraiolo and D. Kuhn, Role based access control, Proceedings of the Fifteenth National Computer Security Conference, pp.554-563, 1992.

D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001.
DOI : 10.1145/501978.501980

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.4562

J. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982.
DOI : 10.1109/SP.1982.10014

M. Krause and H. Tipton, Handbook of Information Security Management, EDPACS, vol.26, issue.3, 1998.
DOI : 10.1201/1079/43275.26.3.19980901/31739.5

R. Sandhu and J. Park, Usage Control: A Vision for Next Generation Access Control, Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, pp.17-31, 2003.
DOI : 10.1007/978-3-540-45215-7_2

E. Totel, J. Blanquart, Y. Deswarte, and D. Powell, Supporting multiple levels of criticality, Digest of Papers. Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing (Cat. No.98CB36224), pp.70-79, 1998.
DOI : 10.1109/FTCS.1998.689456