M. Ali and L. Moreau, A Provenance-Aware Policy Language (cProvl) and a Data Traceability Model (cProv) for the Cloud, 2013 International Conference on Cloud and Green Computing, pp.479-486, 2013.
DOI : 10.1109/CGC.2013.81

URL : http://roar.uel.ac.uk/5265/1/PRISECCSN%237.pdf

S. Barker, The next 700 access control models or a unifying meta-model?, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.187-196, 2009.
DOI : 10.1145/1542207.1542238

W. Chen and D. S. Warren, Tabled evaluation with delaying for general logic programs, Journal of the ACM, vol.43, issue.1, pp.20-74, 1996.
DOI : 10.1145/227595.227597

J. Lacroix and O. Boucelma, Design and Implementation of a Trust Service for the Cloud, Proc. of OTM '15, pp.620-638, 2015.
DOI : 10.1007/978-3-319-26148-5_42

G. Lin, Y. Bie, and M. Lei, Trust Based Access Control Policy in Multi-domain of Cloud Computing, Journal of Computers, vol.8, issue.5, 2013.
DOI : 10.4304/jcp.8.5.1357-1365

L. Moreau and P. Missier, PROV-DM: The PROV Data Model, 2013.

L. Moreau and P. Missier, PROV-N: The Provenance Notation, 2013.
DOI : 10.2200/s00528ed1v01y201308wbe007

J. Park, D. Nguyen, and R. Sandhu, A provenance-based access control model, 2012 Tenth Annual International Conference on Privacy, Security and Trust, pp.137-144, 2012.
DOI : 10.1109/PST.2012.6297930

L. Sun, J. Park, and R. Sandhu, Engineering access control policies for provenance-aware systems, Proceedings of the third ACM conference on Data and application security and privacy, CODASPY '13, pp.285-292, 2013.
DOI : 10.1145/2435349.2435390