A. Short, S. Of-access-control-models, and .. , 45 4.2.1 Discretionary Access Control (DAC), 46 4.2.2 Mandatory Access Control (MAC), p.46

R. Aspf-design, 64 5.1.2, p.65

M. Aspf-implementation, 76 5.4.4.1 Cluster Implementation Model, p.78

E. Support-mechanisms and .. , 81 5.6.1 Delegation Approach, Authorization Policy Enforcement, p.81

D. Requirements and .. , 102 7.1.2 Self-managed Enabling Trade-off between Multiple Concerns, p.102

D. From and .. To-run-time-representation, 109 7.6.1 Autonomic Adaptation Policies, p.112

.. Vsk-implementation, 117 8.1.1 Overview of Implementation Framework 117 8.1.2 VSK Architecture Overview, Control Plane Implementation, p.123

.. Vsk-evaluation, 124 8.2.1 Authorization Overheads of 124 8.2.2 Authorization Validation and Enforcement Overheads of VSK, Comparison with Microkernel, p.126

R. Overhead and V. , 127 8.2.5 Kernel Occupation Rate, VSK Qualitative Evaluation, p.129

A. Second, 136 9.2.1 Platform Overview, p.137

M. Agarwal, V. Bhat, H. Liu, V. Matossian, V. Putty et al., AutoMate: enabling autonomic applications on the grid, 2003 Autonomic Computing Workshop, pp.48-57, 2003.
DOI : 10.1109/ACW.2003.1210204

J. Agosta, J. Chandrashekar, D. Dash, M. Dave, D. Durham et al., Towards Autonomic Enterprise Security: Self-Defending Platforms, Distributed Detection, and Adaptive Feedback, Intel Technology Journal, vol.10, issue.04, 2006.
DOI : 10.1535/itj.1004.04

D. Agrawal, K. Lee, and J. Lobo, Policy-based Management of Networked Computing Systems. Communication Magazine, IEEE, issue.10, pp.4369-75, 2005.

M. Alia, M. Lacoste, R. He, and F. Eliassen, Putting together QoS and security in autonomic pervasive systems, Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks, Q2SWinet '10, 2010.
DOI : 10.1145/1868630.1868634

M. Aljnidi and J. Leneutre, ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets) In Data Privacy Management and Autonomous Spontaneous Security, pp.163-177, 2010.

S. Ames, M. M. Gasser, and R. Schell, Security Kernel Design and Implementation: An Introduction, Computer, vol.16, issue.7, pp.14-22, 1983.
DOI : 10.1109/MC.1983.1654439

E. Amoroso, Fundamentals of Computer Security Technology, 1994.

A. Anderson, XACML profile for role based access control (RBAC). OASIS Access Control TC committee, 2004.

M. Anne, R. He, T. Jarboui, M. Lacoste, O. Lobry et al., Think: View-Based Support of Non-functional Properties in Embedded Systems, 2009 International Conference on Embedded Software and Systems, 2009.
DOI : 10.1109/ICESS.2009.30

C. Ardagna, S. Capitani-di-vimercati, S. Paraboschi, E. Pedrini, and P. Samarati, An XACML-based privacy-centered access control system, Proceedings of the first ACM workshop on Information security governance, WISG '09, pp.49-58, 2009.
DOI : 10.1145/1655168.1655178

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.611

S. Ayed and N. Cuppens, An Integrated Model for Access Control and Information Flow Requirements, Asian Computing Science Conference Focusing on Secure Software and Related Issues (ASIAN), 2007.
DOI : 10.1007/978-3-540-76929-3_12

L. Badger, D. Sterne, D. Sherman, K. Walker, and S. Haghighat, Practical Domain and Type Enforcement for UNIX, Proceedings 1995 IEEE Symposium on Security and Privacy, p.66, 1995.
DOI : 10.1109/SECPRI.1995.398923

P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris et al., Xen and the Art of Virtualization, 9th ACM symposium on Operating Systems Principles, pp.164-177, 2003.

A. Baumann, J. Kerr, D. Silva, O. Krieger, and R. Wisniewski, Module Hot Swapping for Dynamic Update and Reconfiguration in K42, 6th Linux Conference Au, 2005.

B. Bell and L. Lapadula, Secure Computer System Unified Exposition and Multics Interpretation, 1976.

S. Berger, R. Caceres, D. Pendarakis, R. Sailer, E. Valdez et al., TVDc, ACM SIGOPS Operating Systems Review, vol.42, issue.1, pp.40-47, 2008.
DOI : 10.1145/1341312.1341321

B. N. Bershad, C. Chambers, S. Eggers, C. Maeda, D. Mcnamee et al., SPIN, Proceedings of the 6th workshop on ACM SIGOPS European workshop Matching operating systems to application needs, EW 6, 1994.
DOI : 10.1145/504390.504408

B. N. Bershad, S. Savage, P. Pardyak, E. G. Sirer, M. E. Fiuczynski et al., Extensibility Safety and Performance in the SPIN Operating System, 5th ACM Symporium on Operating Systems Principles, pp.267-283, 1995.

K. Biba, Integrity Considerations for Secure Computer System, 1977.

M. Bishop, Introduction to Computer Security, 2004.

C. Blanco, J. Lasheras, R. Valencia-garcia, E. Fernandew-medina, A. Toval et al., A Systematic Review and Comparison of Security Ontologies, 2008 Third International Conference on Availability, Reliability and Security, pp.813-820, 2008.
DOI : 10.1109/ARES.2008.33

M. Blaze, J. Feigenbaum, and J. Lacy, Decentralized trust management, Proceedings 1996 IEEE Symposium on Security and Privacy, p.164, 1996.
DOI : 10.1109/SECPRI.1996.502679

G. Boudol and M. Kolundzija, Access Control and Declassification, COMPUTER NETWORK SECURITY Communications in Computer and Information Science, vol.1, pp.85-98, 2007.
DOI : 10.1007/978-3-540-73986-9_7

J. Bourcier, Auto-Home: A Framework for Autonomic Pervasive Applications, 2008.

L. Broto, D. Hagimont, P. Stolf, N. Depalma, and S. Temate, Autonomic management policy specification in Tune, Proceedings of the 2008 ACM symposium on Applied computing , SAC '08, pp.1658-1663, 2008.
DOI : 10.1145/1363686.1364080

A. Brown and C. Redlin, Measuring the Effectiveness of Self-Healing Autonomic Systems, Second International Conference on Autonomic Computing (ICAC'05), pp.328-329, 2005.
DOI : 10.1109/ICAC.2005.39

A. Brown and K. Wallnau, Engineering of component-based systems, Proceedings of ICECCS '96: 2nd IEEE International Conference on Engineering of Complex Computer Systems (held jointly with 6th CSESAW and 4th IEEE RTAW), pp.414-422, 1996.
DOI : 10.1109/ICECCS.1996.558485

E. Bruneton, T. Coupaye, M. Leclercq, and V. Quema, The FRACTAL component model and its support in Java, Software: Practice and Experience Special Issue: Experiences with Auto-adaptive and Reconfigurable Systems, pp.1257-1284, 2006.
DOI : 10.1002/spe.767

J. Camenisch and T. Grob, Efficient Attributes for Anonymous Credentials, 15th ACM conference on Computer and Communications Security, pp.345-356, 2008.
DOI : 10.1145/1455770.1455814

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.7806

H. Cervantes and R. Hall, Autonomous adaptation to dynamic availability using a service-oriented component model, Proceedings. 26th International Conference on Software Engineering, pp.614-623, 2004.
DOI : 10.1109/ICSE.2004.1317483

O. Chebaro, L. Broto, J. Bahsoun, and D. Hagimont, Self-TUNe-ing of a J2EE Clustered Application, 2009 Sixth IEEE Conference and Workshops on Engineering of Autonomic and Autonomous Systems, pp.23-31, 2009.
DOI : 10.1109/EASe.2009.16

S. Cheng, A. Huang, D. Garlan, B. Schmerl, and P. Steenkiste, Rainbow Architecture-based Self-adaptation with Reusable Infrastructure, 1st International Conference on Autonomic Computing, pp.276-277, 2004.

D. Chess, C. Palmer, and S. White, Security in an autonomic computing environment, IBM Systems Journal, vol.42, issue.1, pp.107-118, 2003.
DOI : 10.1147/sj.421.0107

M. Clarke and G. Coulson, An architecture for dynamically extensible operating systems, Proceedings. Fourth International Conference on Configurable Distributed Systems (Cat. No.98EX159), p.145, 1998.
DOI : 10.1109/CDS.1998.675768

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.53.1772

B. Claudel, N. Depalma, R. Lachaize, and D. Hagimont, Self-protection for Distributed Component-Based Applications, Stabilization, Safety, and Security of Distributed Systems, 2006.
DOI : 10.1007/978-3-540-49823-0_13

URL : https://hal.archives-ouvertes.fr/hal-00689149

C. Coma, N. Cuppens, F. Cuppens, and A. R. Cavalli, Context Ontology for Secure Interoperability, 2008 Third International Conference on Availability, Reliability and Security, 2008.
DOI : 10.1109/ARES.2008.133

URL : https://hal.archives-ouvertes.fr/hal-00796516

R. Cook and I. Lee, DYMOS: A Dynamic Modification System, Symposium on High-level debugging, pp.201-202, 1983.

M. Covington, M. Moyer, and M. Ahamad, Generalized Role-Based Access Control for Securing Future Applications, National Information Systems Security Conference, 2000.

M. J. Covington, V. Long, S. Srinivasan, A. K. Dev, M. Ahamad et al., Securing context-aware applications using environment roles, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.10-20, 2001.
DOI : 10.1145/373256.373258

J. Crampton and G. Loizou, Administrative scope and role hierarchy operations, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.145-154, 2002.
DOI : 10.1145/507711.507736

J. Crampton and G. Loizou, Administrative scope, ACM Transactions on Information and System Security, vol.6, issue.2, pp.201-231, 2003.
DOI : 10.1145/762476.762478

F. Cuppens, S. Gombault, and T. Sans, Selecting appropriate counter-measures in an intrusion detection framework, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., p.78, 2004.
DOI : 10.1109/CSFW.2004.1310733

F. Cuppens and A. Miege, AdOrBAC An Administration Model for Or-BAC, Computer Systems Science and Engineering, vol.19, 2004.

N. Cuppens, F. Cuppens, J. Lopew-de-vergara, E. Vazquez, J. Guerra et al., An Ontology-based Approach to React to Network Attacks, International Journal of Information and Computer Security, vol.3, issue.34, pp.280-305, 2009.

N. Damianou, N. Dulay, E. Lupu, and M. Sloman, The Ponder Policy Specification Language, Workshop on Policies for Distributed Systems and Networks, 2001.
DOI : 10.1007/3-540-44569-2_2

S. Davy, K. Barrett, S. Balasubramaniam, S. Meer, and J. Strassner, Policy-based architecture to enable autonomic communications - a position paper, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006., 2006.
DOI : 10.1109/CCNC.2006.1593092

H. Debar, D. Curry, and B. Feinstein, The Intrusion Detection Message Exchange Format, 2006.
DOI : 10.17487/rfc4765

H. Debar, Y. Thomas, F. Cuppens, and N. Cuppens, Enabling automated threat response through the use of a dynamic security policy, Journal in Computer Virology, vol.29, issue.2, pp.195-210, 2007.
DOI : 10.1007/s11416-007-0039-z

URL : https://hal.archives-ouvertes.fr/hal-00439845

H. Debar, Y. Thomas, N. Cuppens, and F. Cuppens, Using Contextual Security Policies for Threat Response, 3rd International Conference on Detection of Intrusions and Malware Vulnerability Assessment, 2006.
DOI : 10.1007/11790754_7

A. Deursen, P. Klint, and J. Visser, Domain-specific languages, ACM SIGPLAN Notices, vol.35, issue.6, pp.26-36, 2000.
DOI : 10.1145/352029.352035

S. Dobson, S. Denazis, A. Femandez, D. Gaiti, F. Massacci et al., A survey of autonomic communications, ACM Transactions on Autonomous and Adaptive Systems, vol.1, issue.2, pp.223-259, 2006.
DOI : 10.1145/1186778.1186782

A. Dunkels, N. Finne, J. Eriksson, and T. Voigt, Run-time dynamic linking for reprogramming wireless sensor networks, Proceedings of the 4th international conference on Embedded networked sensor systems , SenSys '06, pp.15-28, 2006.
DOI : 10.1145/1182807.1182810

P. Efstathopoulos, M. Krohn, S. Vanebogart, C. Frey, D. Ziegler et al., Labels and Event Processes in the Asbestos Operating System, 20th ACM Symposium on Operating Systems Principles, pp.17-30, 2005.

D. Engler, M. Kaashoek, and J. O. Toole, Exokernel: an Operating System Architecture for Application-level, 15th ACM Symposium Operating System Principles, pp.251-268, 1995.

G. Faden, Reconciling CMW Requirements with Those of X11Applications, 14th Annual National Computer Security Conference, 1991.

J. Fassino, T. Jarboui, and M. Lacoste, An Access Control System and Method, A Component-Based Kernel Including It, and Its Use. US Patent Application n 11, 2008.

J. Fassino, J. Stefani, J. Lawall, and G. Muller, Think: A Software Framework for Component-Based Operating System Kernels, USENIX Annual Technical Conference, pp.73-86, 2002.

D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001.
DOI : 10.1145/501978.501980

B. Ford, G. Back, G. Benson, J. Lepreau, A. Lin et al., The Flux OSKit A Substrate for Kernel and Language Research, 16th ACM symposium on Operating systems principles, pp.38-51, 1997.

A. Ganek and T. Corbi, The dawning of the autonomic computing era, IBM Systems Journal, vol.42, issue.1, pp.5-18, 2003.
DOI : 10.1147/sj.421.0005

J. Garcia-alfaro, F. Cuppens, N. Cuppens-boulahia, and S. Preda, MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies, 3rd International Workshop on Autonomous and Spontaneous Security, 2010.
DOI : 10.1109/2.485845

URL : https://hal.archives-ouvertes.fr/hal-00623634

R. Grimm and B. N. Bershad, Separating access control policy, enforcement, and functionality in extensible systems, ACM Transactions on Computer Systems, vol.19, issue.1, pp.36-70, 2001.
DOI : 10.1145/367742.367773

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.4879

S. Hallyn and P. Kearns, Domain and Type Enforcement for Linux, 4th annual Linux Showcase Conference, pp.15-15, 2000.

Z. Hayat, J. Reeve, and C. Boutle, Ubiquitous security for ubiquitous computing, Information Security Technical Report, vol.12, issue.3, pp.172-178, 2007.
DOI : 10.1016/j.istr.2007.05.002

R. He, M. Lacoste, and J. Leneutre, An OS Architecture for Device Self-protection, 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, 2009.

R. He, M. Lacoste, and J. Leneutre, A Policy Management Framework for Selfprotection of Pervasive Systems, 6th International Conference on Autonomic and Autonomous Systems, pp.104-109, 2010.

R. He, M. Lacoste, and J. Leneutre, Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection, 2010 10th IEEE International Conference on Computer and Information Technology, 2010.
DOI : 10.1109/CIT.2010.160

J. Helander and A. Forin, MMLite, Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications , EW 8, pp.96-103, 1998.
DOI : 10.1145/319195.319210

J. Hellerstein, Self-managing systems: a control theory foundation, 29th Annual IEEE International Conference on Local Computer Networks, 2004.
DOI : 10.1109/LCN.2004.112

M. Huebscher and J. Mccann, A survey of autonomic computing???degrees, models, and applications, ACM Computing Surveys, vol.40, issue.3, 2008.
DOI : 10.1145/1380584.1380585

P. Inverardi and M. Tivoli, The Future of Software: Adaptation and Dependability, Software Engineering, vol.116, issue.3, pp.1-31, 2009.
DOI : 10.1007/11663430_14

S. Jajodia, P. Samarati, and V. Subrahmanian, A logical language for expressing authorizations, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.31-42, 1997.
DOI : 10.1109/SECPRI.1997.601312

A. Kalam, R. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003.
DOI : 10.1109/POLICY.2003.1206966

URL : https://hal.archives-ouvertes.fr/hal-01483818

J. Kephart and D. Chess, The vision of autonomic computing, Computer, vol.36, issue.1, pp.41-50, 2003.
DOI : 10.1109/MC.2003.1160055

J. Kephart and W. Walsh, An artificial intelligence perspective on autonomic computing policies, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004., pp.3-12, 2004.
DOI : 10.1109/POLICY.2004.1309145

A. Kim, J. Luo, and M. Kang, Security Ontology for Annotating Resources, International Conference on Ontologies, Databases, and Application of Semantics (ODBASE), 2005.
DOI : 10.1007/11575801_34

I. Kuz, Y. Liu, I. Gorton, and G. Heiser, CAmkES: A component model for secure microkernel-based embedded systems, Journal of Systems and Software, vol.80, issue.5, pp.687-699, 2006.
DOI : 10.1016/j.jss.2006.08.039

M. Lacoste, T. Jarboui, and R. He, A component-based policy-neutral architecture for kernel-level access control, annals of telecommunications - annales des t??l??communications, vol.25, issue.4, pp.121-146, 2009.
DOI : 10.1007/s12243-008-0071-0

M. Lacoste, G. Privat, and F. Ramparany, Evaluating Confidence in Context for Context-Aware Security, Ambient Intelligence, pp.211-229, 2007.
DOI : 10.1007/978-3-540-76652-0_13

B. Lampson, Protection, ACM SIGOPS Operating Systems Review, vol.8, issue.1, pp.18-24, 1974.
DOI : 10.1145/775265.775268

B. Lang, I. Foster, F. Siebenlist, R. Ananthakrishnam, and T. Freeman, A Flexible Attribute Based Access Control Method for Grid Computing, Journal of Grid Computing, vol.19, issue.2, pp.169-180, 2009.
DOI : 10.1007/s10723-008-9112-1

H. Levy, Capability- and Object-Based System Concepts, Capability-based Computer System, p.250, 1984.
DOI : 10.1016/B978-0-932376-22-0.50006-5

Y. Lim, P. Cheng, J. Clark, and P. Rohatgi, Policy Evolution with Grammatical Evolution, Simulated Evolution and Learning, pp.71-80, 2008.
DOI : 10.1007/3-540-36599-0_37

S. Lipner, Non-discretionary Controls for Commercial Applications, IEEE Symposium on Security and Privacy, pp.2-10, 1982.

M. Litoiu, M. Woodside, and T. Zheng, Hierarchical Model-based Autonomic Control of Software Systems, Workshop on the Design and Evolution of Autonomic Application Software, pp.1-7, 2005.

O. Lobry, J. Navas, and J. Babau, Optimizing Component-Based Embedded Software, 2009 33rd Annual IEEE International Computer Software and Applications Conference, pp.491-496, 2009.
DOI : 10.1109/COMPSAC.2009.181

URL : https://hal.archives-ouvertes.fr/hal-00670192

P. Loscocco and S. Smalley, Integrating Flexible Support for Security Policies into the Linux Operating System, USENIX Annual Technical Conference, pp.29-42, 2001.

D. Menasce and J. Kephart, Guest Editors' Introduction: Autonomic Computing, IEEE Internet Computing, vol.11, issue.1, pp.18-21, 2007.
DOI : 10.1109/MIC.2007.11

M. Mernik, J. Heering, and A. Sloane, When and how to develop domain-specific languages, ACM Computing Surveys, vol.37, issue.4, pp.316-344, 2005.
DOI : 10.1145/1118890.1118892

N. Milanovic and M. Malek, Service-Oriented Operating System: A Key Element in Improving Service Availability, 4th International Symposium on Service Availability, pp.31-42, 2007.
DOI : 10.1007/978-3-540-72736-1_4

H. Muller, M. Pezze, and M. Shaw, Visibility of control in adaptive systems, Proceedings of the 2nd international workshop on Ultra-large-scale software-intensive systems , ULSSIS '08, pp.23-26, 2008.
DOI : 10.1145/1370700.1370707

H. Muller, H. Kienle, and U. Stege, Autonomic Computing Now You See It, Now You Don???t, Software Engineering/ Design and Evolution of Autonomic Software Science, pp.32-54, 2009.
DOI : 10.1145/310930.310984

P. Muller, F. Fleurey, and J. Jezequel, Weaving Executability into Object-Oriented Meta-languages, 8th International Conference on Medel Driven Engineering Languages and Systems, pp.264-278, 2005.
DOI : 10.1007/11557432_19

URL : https://hal.archives-ouvertes.fr/hal-00795095

S. Oh, R. Sandhu, and X. Zhang, An effective role administration model using organization structure, ACM Transactions on Information and System Security, vol.9, issue.2, pp.113-137, 2006.
DOI : 10.1145/1151414.1151415

F. Hnsen and V. Oleshchuk, SRBAC: A Spatial Role-Based Access Control Model for Mobile Systems, 7th Nordic Workshop on Secure IT Systems, pp.129-141, 2003.

S. Osborn, R. Sandhu, and Q. Munawer, Configuring role-based access control to enforce mandatory and discretionary access control policies, ACM Transactions on Information and System Security, vol.3, issue.2, pp.85-106, 2000.
DOI : 10.1145/354876.354878

J. Park and R. Sandhu, Towards usage control models: beyond traditional access control, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.57-64, 2002.
DOI : 10.1145/507711.507722

J. Polakovic and J. Stefani, Architecting reconfigurable component-based operating systems, Journal of Systems Architecture, vol.54, issue.6, 2008.
DOI : 10.1016/j.sysarc.2007.12.005

C. Prehofer and C. Bettstetter, Self-organization in communication networks: principles and design paradigms, IEEE Communications Magazine, vol.43, issue.7, pp.78-85, 2005.
DOI : 10.1109/MCOM.2005.1470824

C. Rippert, Protection dans les architectures de systmes flexibles, 2004.

T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, Hey, You, Get Off of My Cloud Exploring Information Leakage in Third-Party Compute Clouds.pdf, 16th ACM conference on Computer and Communications Security, pp.199-212, 2009.

P. Ruth, J. Rhee, D. Xu, R. Kennell, and S. Goasguen, Autonomic Live Adaptation of Virtual Computational Environments in a Multi-Domain Infrastructure, 2006 IEEE International Conference on Autonomic Computing, pp.5-14, 2006.
DOI : 10.1109/ICAC.2006.1662376

J. Rutkowska and R. Wojtczuk, The Qubes OS Architecture, 2010.

R. Sailer, T. Jaeger, E. Valdez, R. Caceres, R. Perez et al., Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.276-285, 2005.
DOI : 10.1109/CSAC.2005.13

R. Sandhu, Lattice-based access control models, Computer, vol.26, issue.11, pp.9-19, 1993.
DOI : 10.1109/2.241422

R. Sandhu, V. Bhamidipati, and A. Munawer, The ARBAC97 model for role-based administration of roles, ACM Transactions on Information and System Security, vol.2, issue.1, pp.105-135, 1999.
DOI : 10.1145/300830.300839

R. Sandhu, E. Goyne, H. Feinstein, and G. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

A. Saxena, M. Lacoste, T. Jarboui, U. Lucking, and B. Steinke, A Software Framework for Autonomic Security in Pervasive Environments, Information System Security, pp.91-109, 2007.
DOI : 10.1007/978-3-540-77086-2_8

M. Serrano, S. Meer, J. Strassner, S. Paoli, A. Kerr et al., Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications, 6th Internation Confernece on Autonomic and Trusted Computing, pp.249-267, 2009.
DOI : 10.4135/9781452243610.n9

M. Serrano, S. Van-der-meer, J. Strassner, S. De-paoli, A. Kerr et al., Trust and Reputation Poicy-based Mechanisms for Self-protection in Autonomic Communications, 6th International Conference on Autonomic and Trusted Computing, pp.249-267, 2009.

J. Shapiro, J. Smith, and D. Farber, EROS, ACM SIGOPS Operating Systems Review, vol.33, issue.5, pp.170-185, 1999.
DOI : 10.1145/319344.319163

J. Silva, L. Gaspary, M. Barcellos, and A. Detsch, Policy-based access control in peer-to-peer grid systems, The 6th IEEE/ACM International Workshop on Grid Computing, 2005., pp.107-113, 2005.
DOI : 10.1109/GRID.2005.1542731

A. Simmonds, P. Sandilands, and L. Van-ekert, An Ontology for Network Security Attacks, 2nd Asian Applied Computing Conference, pp.317-323, 2004.
DOI : 10.1007/978-3-540-30176-9_41

C. Small and M. Seltzer, Structuring the kernel as a toolkit of extensible, reusable components, Proceedings of International Workshop on Object Orientation in Operating Systems, pp.134-137, 1995.
DOI : 10.1109/IWOOS.1995.470567

J. Smith and R. Nair, An Overview of Virtual Machine Architectures, 2004.

R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen et al., The Flask Security Architecture System Support for Diverse Security Policies, 8th USENIX Security Symposium, pp.123-139, 1999.

R. Sterritt, M. Hinchey, J. Rash, W. Truszkowski, G. Rouff et al., Towards Formal Specification and Generation of Autonomic Policies, Embedded and Ubiquitous Computing, pp.1245-1254, 2005.
DOI : 10.1007/11596042_126

J. Strassner, Policy-based Network Management: Solutions for the Next Generation, 2003.

J. Strassner, S. Samudrala, G. Cox, Y. Liu, M. Jiang et al., The Design of a New Context-Aware Policy Model for Autonomic Networking, 2008 International Conference on Autonomic Computing, 2008.
DOI : 10.1109/ICAC.2008.36

M. Toure, G. Berhe, P. Stolf, L. Broto, N. Depalma et al., Autonomic Management for Grid Applications, 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP 2008), pp.79-86, 2008.
DOI : 10.1109/PDP.2008.39

D. Truex, R. Baskerville, and H. Klein, Growing systems in emergent organizations, Communications of the ACM, vol.42, issue.8, pp.117-123, 1999.
DOI : 10.1145/310930.310984

K. Twidle, N. Dulay, E. Lupu, and M. Sloman, Ponder2: A Policy System for Autonomous Pervasive Environments, 5th International Conference on Autonomic and Autonomous Systems, 2009.

J. Undercoffer, A. Joshi, and J. Pinkston, Modeling Computer Attacks: An Ontology for Intrusion Detection, 6th International Symposium on Recent Advances in Intrusion Detection, pp.113-135, 2003.
DOI : 10.1007/978-3-540-45248-5_7

D. C. Verma, S. B. Calo, and G. Cirincione, A State Transition Model for Policy Specification, 2009.

J. Walters, Z. Liang, W. Shi, and V. Chaudhary, Wireless Sensor Network Security: A Survey, Security in Distributed, Grid, and Pervasive Computing, 2006.

T. Watteyne, D. Barthel, M. Dohler, and I. Auge-blum, WiFly: Experimenting with Wireless Sensor Networks and Virtual Coordinates, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00263534

M. Weiser, century, ACM SIGMOBILE Mobile Computing and Communications Review, vol.3, issue.3, pp.3-11, 1999.
DOI : 10.1145/329124.329126

S. White, J. Hanson, I. Whalley, D. Chess, and J. Kephart, An architectural approach to autonomic computing, International Conference on Autonomic Computing, 2004. Proceedings., 2004.
DOI : 10.1109/ICAC.2004.1301340

M. Wooldridge, Agent-based software engineering, IEEE Proceedings on Software Engineering, pp.26-37, 1997.
DOI : 10.1049/ip-sen:19971026

C. Wright, C. Cowan, and J. Morris, Linux security modules: general security support for the linux kernel, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], pp.17-31, 2002.
DOI : 10.1109/FITS.2003.1264934

M. Xu, X. Jiang, R. Sandhu, and X. Zhang, Towards a VMM-based usage control framework for OS kernel integrity protection, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.71-80, 2007.
DOI : 10.1145/1266840.1266852

R. Yavatkar, D. Pendarakis, and R. Guerin, A Framework for Policy-based Admission Control, International RFC, 2000.
DOI : 10.17487/rfc2753

N. Zeldovich, S. Boyd-wichizer, E. Kohler, and D. Mazieres, Making information flow explicit in HiStar, 7th USENIX Symposium on Operating Systems Design and Implementation, p.19, 2006.
DOI : 10.1145/2018396.2018419

G. Zhang and M. Parashar, Dynamic context-aware access control for grid applications, Proceedings. First Latin American Web Congress, p.101, 2003.
DOI : 10.1109/GRID.2003.1261704