Frédéric Fondement, and Benoît Baudry, Modeling Modeling, in Model Driven Engineering Languages and Systems, pp.2-16, 2009. ,
A Model-Based Framework for Security Policy Specification, Deployment and Testing, 2008. ,
DOI : 10.1007/978-3-540-87875-9_38
Weaving executability into object-oriented meta-languages. in MoDELS'05, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00795095
Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001. ,
DOI : 10.1145/501978.501980
Organization Based Access Control, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003. ,
Integrity consideration for secure computer systems, in Tech. Rep. MTR-3153, The MITRE Corporation, 1975. ,
Secure computer systems: Unified exposition and multics interpretation ESD-TR-73-306, The MITRE Corporation Test-Driven Assessment of Access Control in Legacy Applications, Tech. Rep ICST 2008: First IEEE International Conference on Software, Testing, Verification and Validation, 1976. ,
Hints on Test Data Selection: Help for the Practicing Programmer, Computer, vol.11, issue.4, pp.34-41, 1978. ,
DOI : 10.1109/C-M.1978.218136
Mutation analysis for security tests qualification, in Mutation'07 : third workshop on mutation analysis in conjuction with TAIC-Part A Fault Model and Mutation Testing of Access Control Policies 14. OMG. MOF 2.0 Core Final Adopted Specification Testing security policies : going beyond functional testing, Proceedings of the 16th International Conference on World Wide Web ISSRE'07 : The 18th IEEE International Symposium on Software Reliability Engineering. 2007. 17. J. Jürjens. UMLsec: Extending UML for Secure Systems Development. in Proceedings of the 5th International Conference on The Unified Modeling Language, 2002. ,
SecureUML: A UML-Based Modeling Language for Model-Driven Security, Proceedings of the 5th International Conference on The Unified Modeling Language, 2002. ,
DOI : 10.1007/3-540-45800-X_33
An aspect-based approach to modeling access control concerns. Information and Software Technology, pp.575-587, 2004. ,