S. Relations and .. , 58 4.4.1 Basic Roles, p.60

O. Structures and .. , 67 4.7.1 NS-N: Network Structure for Nodes, Network Structure for Permissions, p.68

P. Specification and .. , 76 4.9.1 The XACML, p.78

A. Requirements and .. , 82 5.1.1 Context-Aware Updates, p.83

A. Computing-support-in and A. , 95 5.5.1 Context-Aware Information, p.97

.. Srbac-in-a-home-network, 111 6.1.1 Regular Roles and Node-Role Assignment, 112 6.1.2 Permissions and Permission-Role Assignment . . . . . . . . . . . . . 114

A. Roles and .. Their-assignments, 118 6.2.3 Evolution Scenario 1: Visitor, Evolution Scenario, vol.2, p.124

A. Project, Autonomic network architecture

A. Kalam, R. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003.
DOI : 10.1109/POLICY.2003.1206966

URL : https://hal.archives-ouvertes.fr/hal-01483818

A. Adnane, R. T. De-sousa, J. , C. Bidan, and L. Mé, Autonomic trust reasoning enables misbehavior detection in OLSR, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, 2008.
DOI : 10.1145/1363686.1364173

URL : https://hal.archives-ouvertes.fr/hal-00353032

M. Aljnidi and . Telecom-paristech, Modèles et protocoles de sécurité pour un réseau domestique, 2005.

M. Aljnidi, Sécurité des réseaux mobiles autonomes, Actes du Premier workshop GET sur les réseaux spontanés, 2006.

M. Aljnidi and J. Leneutre, Autonomic Security for Home Networks, Proceedings of the First International Workshop on Self-Organizing Systems, 2006.
DOI : 10.1007/11822035_21

M. Aljnidi and J. Leneutre, A Security Policy System for Mobile Autonomic Networks, Proceedings of the 1st International ICST Conference on Autonomic Computing and Communication Systems, 2007.
DOI : 10.4108/ICST.AUTONOMICS2007.2205

M. Aljnidi and J. Leneutre, Towards an autonomic security system for mobile ad hoc networks, Proceedings of the Third International Symposium on Information Assurance and Security, 2007.

M. Aljnidi and J. Leneutre, Security Solutions in Mobile Autonomic Networks, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008.
DOI : 10.1109/ICTTA.2008.4530194

M. Aljnidi and J. Leneutre, ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets), Proceedings of the Second International Workshop on Autonomous and Spontaneous Security, 2009.
DOI : 10.1007/978-3-642-11207-2_13

R. Ananthanarayanan, M. Mohania, and A. Gupta, Management of Conflicting Obligations in Self-Protecting Policy-Based Systems, Second International Conference on Autonomic Computing (ICAC'05), 2005.
DOI : 10.1109/ICAC.2005.38

A. Anderson, Core and Hierarchical Role Based Access Control (RBAC) Profile of XACML v2.0. OASIS, 2005.

R. J. Anthony, A Policy-Definition Language and Prototype Implementation Library for Policy-based Autonomic Systems, 2006 IEEE International Conference on Autonomic Computing, 2006.
DOI : 10.1109/ICAC.2006.1662407

J. Bacon, K. Moody, and W. Yao, A model of OASIS role-based access control and its support for active security, ACM Transactions on Information and System Security, vol.5, issue.4, 2002.
DOI : 10.1145/581271.581276

S. Barker, M. J. Sergot, and D. Wijesekera, Status-Based Access Control, ACM Transactions on Information and System Security, vol.12, issue.1, 2008.
DOI : 10.1145/1410234.1410235

J. Barkley, K. Beznosov, and J. Uppal, Supporting relationships in access control using role based access control, Proceedings of the fourth ACM workshop on Role-based access control , RBAC '99, 1999.
DOI : 10.1145/319171.319177

R. Barrett, P. P. Maglio, E. Kandogan, and J. Bailey, Usable autonomic computing systems: The system administrators' perspective, Proceedings of the First International Conference on Autonomic Computing, 2004.
DOI : 10.1016/j.aei.2004.11.001

E. Bertino, P. A. Bonatti, and E. Ferrari, TRBAC, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, 2001.
DOI : 10.1145/344287.344298

R. Bhatti, B. Shafiq, E. Bertino, A. Ghafoor, and J. B. Joshi, X-gtrbac admin: A decentralized administration model for enterprise-wide access control, ACM Transactions on Information and System Security, 2005.

V. Cahill, E. Gray, J. Seigneur, C. D. Jensen, Y. Chen et al., Using trust for secure collaboration in uncertain environments, IEEE Pervasive Computing, vol.2, issue.3, 2003.
DOI : 10.1109/MPRV.2003.1228527

S. Capkun, L. Buttyan, and J. Hubaux, Self-organized public-key management for mobile ad hoc networks, IEEE Transactions on Mobile Computing, vol.2, issue.1, 2003.
DOI : 10.1109/TMC.2003.1195151

L. Capra, W. Emmerich, and C. Mascolo, CARISMA: Context-Aware Reflective mIddleware System for Mobile Applications, IEEE Transactions on Software Engineering, vol.29, issue.10, 2003.
DOI : 10.1109/TSE.2003.1237173

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.324.4706

S. Chang, Q. Chen, and M. Hsu, Managing security policy in a large distributed web services environment, Proceedings of the 27th Annual International Conference on Computer Software and Applications, 2003.

M. J. Covington, W. Long, S. Srinivasan, A. K. Dey, M. Ahamad et al., Securing context-aware applications using environment roles, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, 2001.
DOI : 10.1145/373256.373258

J. Crampton and G. Loizou, Administrative scope and role hierarchy operations, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, 2002.
DOI : 10.1145/507711.507736

J. Crampton and G. Loizou, Administrative scope, ACM Transactions on Information and System Security, vol.6, issue.2, 2003.
DOI : 10.1145/762476.762478

F. Cuppens and N. , Cuppens-Boulahia, and C. Coma. Multi-granular licences to decentralize security administration, Proceedings of the First International Workshop on Reliability, Availability and Security, 2007.

F. Cuppens and A. Miege, Administration model for or-bac. In On The Move to Meaningful Internet Systems, 2003.
DOI : 10.1007/978-3-540-39962-9_76

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.2905

F. Cuppens and C. Saurel, Specifying a security policy: a case study, Proceedings 9th IEEE Computer Security Foundations Workshop, 1996.
DOI : 10.1109/CSFW.1996.503697

N. Damianou, A. Bandara, M. Sloman, and E. Lupu, A survey of policy specification approaches, 2002.

N. Damianou, N. Dulay, E. Lupu, and M. Sloman, The Ponder Policy Specification Language, Proceedings of the International Workshop on Policies for Distributed Systems and Networks, 2001.
DOI : 10.1007/3-540-44569-2_2

R. Darimont and A. V. Lamsweerde, Formal refinement patterns for goal-driven requirements elaboration, Proceedings of the 4th ACM SIGSOFT Symposium on Foundations of Software Engineering, 1996.

M. A. Dekker, J. Crampton, and S. Etalle, RBAC administration in distributed systems, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, 2008.
DOI : 10.1145/1377836.1377852

S. Dobson, Putting Meaning into the Network: Some Semantic Issues for the Design of Autonomic Communications Systems, Proceedings of the 1st International Workshop on Autonomic Communication, 2005.
DOI : 10.1007/11520184_16

S. Dobson, Achieving an acceptable design model for autonomic systems, Fourth IEEE International Workshop on Engineering of Autonomic and Autonomous Systems (EASe'07), 2007.
DOI : 10.1109/EASE.2007.4

S. Dobson, L. Coyle, and P. Nixon, Hybridising events and knowledge as a basis for building autonomic systems, Journal of Trusted and Autonomic Computing, 2006.

S. Dobson, S. Denazis, A. Fernandez, D. Gaiti, E. Gelenbe et al., A survey of autonomic communications, ACM Transactions on Autonomous and Adaptive Systems, vol.1, issue.2, 2006.
DOI : 10.1145/1186778.1186782

H. M. Faheem, A multiagent-based approach for managing security policy, Proceedings of the Second IFIP International Conference on Wireless and Optical Communications Networks, 2005.

L. M. Feeney, B. Ahlgren, and A. Westerlund, Spontaneous networking: an application oriented approach to ad hoc networking, IEEE Communications Magazine, vol.39, issue.6, 2001.
DOI : 10.1109/35.925687

A. Garg, R. Battiti, and G. Costanzi, Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme, Proceedings of the 1st IFIP TC6 WG6.6 International Workshop on Autonomic Communication, 2004.
DOI : 10.1007/11520184_13

E. Gelenbe, Towards autonomic networks, International Symposium on Applications and the Internet (SAINT'06), 2006.
DOI : 10.1109/SAINT.2006.54

E. Gelenbe, Steps toward self-aware networks, Communications of the ACM, vol.52, issue.7, 2009.
DOI : 10.1145/1538788.1538809

M. B. Ghorbel-talbi, F. Cuppens, N. Cuppens-boulahia, and A. Bouhoula, Managing Delegation in Access Control Models, 15th International Conference on Advanced Computing and Communications (ADCOM 2007), 2007.
DOI : 10.1109/ADCOM.2007.105

J. Glasgow, G. Macewen, and P. Panangaden, A logic for reasoning about security, ACM Transactions on Computer Systems, 1992.

J. Y. Halpern and V. Weissman, Using first-order logic to reason about policies, ACM Transactions on Information and System Security, 2008.
DOI : 10.1145/1380564.1380569

URL : http://arxiv.org/abs/cs/0601034

P. Horn, Autonomic computing: Ibm's perspective on the state of information technology, IBM Research, 2001.

S. Jajodia, P. Samarati, and V. S. Subrahmanian, A logical language for expressing authorizations, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), 1997.
DOI : 10.1109/SECPRI.1997.601312

Y. Karabulut, Implementation of an Agent-Oriented Trust Management Infrastructure Based on a Hybrid PKI Model, Proceedings of the 1st International Conference on Trust Management, 2003.
DOI : 10.1007/3-540-44875-6_23

S. L. Keoh, E. Lupu, and M. Sloman, PEACE: A Policy-Based Establishment of Ad-hoc Communities, 20th Annual Computer Security Applications Conference, 2004.
DOI : 10.1109/CSAC.2004.26

J. O. Kephart, Research challenges of autonomic computing, Proceedings of the 27th International Conference on Software Engineering, 2005.

J. O. Kephart and D. M. Chess, The vision of autonomic computing, Computer, vol.36, issue.1, 2003.
DOI : 10.1109/MC.2003.1160055

M. Koch and K. Pauls, Engineering Self-protection for Autonomous Systems, Proceedings of the 9th International Conference on Fundamental Approaches to Software Engineering, 2006.
DOI : 10.1007/11693017_5

H. Koshutanski and F. Massacci, E Pluribus Unum, Proceedings of the 1st IFIP TC6 WG6.6 International Workshop on Autonomic Communication, 2004.
DOI : 10.1007/11520184_14

H. Koshutanski and F. Massacci, Interactive Access Control for Web Services, Proceedings of the 19th IFIP Information Security Conference, 2004.
DOI : 10.1007/1-4020-8143-X_10

M. Lacoste, A. Saxena, T. Jarboui, U. Lucking, B. Steinke et al., Towards autonomic security in beyond 3g infrastructures -end-toend reconfigurability ii white paper, 2007.

B. Lampson, Protection, Proceedings of the 5th Princeton Symposium on Information Science and Systems, 1971.
DOI : 10.1145/775265.775268

J. Ligatti, L. Bauer, and D. Walker, Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, 2009.
DOI : 10.1145/1455526.1455532

M. P. Locatelli and G. Vizzari, Awareness in collaborative ubiquitous environments, ACM Transactions on Autonomous and Adaptive Systems, vol.2, issue.4, 2007.
DOI : 10.1145/1293731.1293733

Y. Lu, L. Zhang, Y. Liu, and J. Sun, A Distributed Domain Administration of RBAC Model in Collaborative Environments, 2006 10th International Conference on Computer Supported Cooperative Work in Design, 2006.
DOI : 10.1109/CSCWD.2006.253050

H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, Self-securing ad hoc wireless networks, Proceedings of the 7th IEEE Symposium on Computers and Communications, 2002.

P. Mazzoleni, B. Crispo, S. Sivasubramanian, and E. Bertino, Xacml policy integration algorithms, ACM Transactions on Information and System Security, 2008.

T. Messerges, J. Curkier, T. Kevenaar, L. Puhl, R. Struik et al., A security design for a general purpose, self-organizing, multi-hop ad-hoc wireless network, Proceedings of the First ACM Workshop on Security of Ad-hoc and Sensor Networks, 2003.

P. Michiardi and R. Molva, Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, Proceedings of the IFIP 6th Joint Working Conference on Communications and Multimedia Security, 2002.
DOI : 10.1007/978-0-387-35612-9_9

A. Miege, Definition of a Formal Framework for Specifying Security Policies. The Or-BAC Model and Extensions, 2005.
URL : https://hal.archives-ouvertes.fr/pastel-00001376

D. L. Mills, The autokey security architecture, protocol and algorithms, 2006.

S. Oh and S. Park, An improved administration method on role-based access control in the enterprise environment, Journal of Information Science and Engineering, 2001.

S. Oh and R. Sandhu, A model for role administration using organization structure, Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, 2002.

S. Oh, R. Sandhu, and X. Zhang, An effective role administration model using organization structure, ACM Transactions on Information and System Security, vol.9, issue.2, 2006.
DOI : 10.1145/1151414.1151415

S. Osborn, R. Sandhu, and Q. Munawer, Configuring role-based access control to enforce mandatory and discretionary access control policies, ACM Transactions on Information and System Security, vol.3, issue.2, 2000.
DOI : 10.1145/354876.354878

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.8753

J. Park and J. Chung, Design of sps model using mobile agent system, Proceedings of the IEEE 37th Annual International Carnahan Conference on Security Technology, 2003.

J. Park and R. Sandhu, usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, 2004.
DOI : 10.1145/984334.984339

A. A. Pirzada and C. Mcdonald, Trust establishment in pure ad-hoc networks. Wireless Personal Communications, 2006.

S. Poslad, Specifying protocols for multi-agent systems interaction, ACM Transactions on Autonomous and Adaptive Systems, vol.2, issue.4, 2007.
DOI : 10.1145/1293731.1293735

N. Prigent, C. Bidan, J. Andreaux, and O. Heen, Secure long term communities in ad hoc networks, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks , SASN '03, 2003.
DOI : 10.1145/986858.986874

M. A. Razzaque, S. Dobson, and P. Nixon, Cross-layer architectures for autonomic communications, Journal of Network and Systems Management, 2006.

A. J. Rocke and R. F. Demara, CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions, Autonomous Agents and Multi-Agent Systems, vol.10, issue.1, 2006.
DOI : 10.1007/s10458-005-4195-6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.3383

P. V. Roy, Self management and the future of software design, 2006.

M. Salehie and L. Tahvildari, Self-adaptive software, ACM Transactions on Autonomous and Adaptive Systems, vol.4, issue.2, 2009.
DOI : 10.1145/1516533.1516538

R. Sandhu, V. Bhamidipati, and Q. Munawer, The arbac97 model for role-based administration of roles, ACM Transactions on Information and System Security, 1999.

R. Sandhu, D. Ferraiolo, and R. Kuhn, The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, 2000.
DOI : 10.1145/344287.344301

R. Sandhu and Q. Munawer, The ARBAC99 model for administration of roles, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), 1999.
DOI : 10.1109/CSAC.1999.816032

R. Sandhu, K. Ranganathan, and X. Zhang, Secure information sharing enabled by Trusted Computing and PEI models, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, 2006.
DOI : 10.1145/1128817.1128820

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.9724

R. S. Sandhu, Lattice-based access control models, Computer, vol.26, issue.11, 1993.
DOI : 10.1109/2.241422

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.5742

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, 1996.
DOI : 10.1109/2.485845

K. E. Seamons, T. Chan, E. Child, M. Halcrow, A. Hess et al., TrustBuilder: negotiating trust in dynamic coalitions, Proceedings DARPA Information Survivability Conference and Exposition, 2003.
DOI : 10.1109/DISCEX.2003.1194912

M. Seredynski, P. Bouvry, and M. A. Klopotek, Evolution of cooperation in ad hoc networks under game theoretic model, Proceedings of the international workshop on Mobility management and wireless access , MobiWac '06, 2006.
DOI : 10.1145/1164783.1164807

B. Shafiq, J. Joshi, E. Bertino, and A. Ghafoor, Secure interoperation in a multidomain environment employing RBAC policies, IEEE Transactions on Knowledge and Data Engineering, vol.17, issue.11, 2005.
DOI : 10.1109/TKDE.2005.185

M. Shehab, E. Bertino, and A. Ghafoor, Secure collaboration in mediator-free environments, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, 2005.
DOI : 10.1145/1102120.1102130

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.159.456

D. K. Smetters and R. E. Grinter, Moving from the design of usable security technologies to the design of useful secure applications, Proceedings of the 2002 workshop on New security paradigms , NSPW '02, 2002.
DOI : 10.1145/844102.844117

M. Smirnov, Autonomic communication: Research agenda for a new communication paradigm, 2004.
DOI : 10.1007/b138981

F. Stajano and R. Anderson, The Resurrecting Duckling: security issues for ubiquitous computing, Computer, vol.35, issue.4, 2002.
DOI : 10.1109/MC.2002.1012427

R. K. Thomas, Team-based access control (TMAC), Proceedings of the second ACM workshop on Role-based access control , RBAC '97, 1997.
DOI : 10.1145/266741.266748

R. K. Thomas and R. S. Sandhu, Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management, Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects, 1997.
DOI : 10.1007/978-0-387-35285-5_10

W. Tolone, G. Ahn, T. Pai, and S. Hong, Access control in collaborative systems, ACM Computing Surveys, vol.37, issue.1, 2005.
DOI : 10.1145/1057977.1057979

S. S. Yau, Y. Yao, Z. Chen, and L. Zhu, An Adaptable Security Framework for Service-based Systems, 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, 2005.
DOI : 10.1109/WORDS.2005.15

F. Zambonelli, M. Gleizes, M. Mamei, and R. Tolksdorf, Spray computers: Explorations in self-organization, Pervasive and Mobile Computing, vol.1, issue.1, 2005.
DOI : 10.1016/j.pmcj.2005.01.001

G. Zhang and M. Parashar, Dynamic context-aware access control for grid applications, Proceedings. First Latin American Web Congress, 2003.
DOI : 10.1109/GRID.2003.1261704

X. Zhang, M. Nakae, M. J. Covington, and R. Sandhu, Toward a Usage-Based Security Framework for Collaborative Computing Systems, ACM Transactions on Information and System Security, vol.11, issue.1, 2008.
DOI : 10.1145/1330295.1330298

X. Zhang, F. Parisi-presicci, and R. Sandhu, Formal model and policy specification of usage control, ACM Transactions on Information and System Security, vol.8, issue.4, 2005.
DOI : 10.1145/1108906.1108908

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.2670

Z. Zhang, X. Zhang, and R. Sandhu, ROBAC: Scalable Role and Organization Based Access Control Models, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2006.
DOI : 10.1109/COLCOM.2006.361879

Z. Zhang, X. Zhang, and R. Sandhu, Towards a Scalable Role and Organization Based Access Control Model with Decentralized Security Administration, Handbook of Research on Social and Organizational Liabilities in Information Security. Information Science Reference, 2009.
DOI : 10.4018/978-1-60566-132-2.ch006

H. Zhou and S. N. Foley, A collaborative approach to autonomic security protocols, Proceedings of the 2004 workshop on New security paradigms , NSPW '04, 2004.
DOI : 10.1145/1065907.1066029