Organization Based Access Control, IEEE 4th Intl. Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003. ,
URL : https://hal.archives-ouvertes.fr/hal-01483818
The B-Book ? Assigning Programs to Meanings, 1996. ,
Formal Derivation of Spanning Trees Algorithms, LNCS 2651, pp.457-476, 2003. ,
DOI : 10.1007/3-540-44880-2_27
URL : https://hal.archives-ouvertes.fr/inria-00099793
MotOrBAC 2: A security policy tool, 2008. ,
Integration of Security Policy into System Modeling, 7th International B Conference, pp.232-247, 2007. ,
DOI : 10.1007/11955757_19
URL : https://hal.archives-ouvertes.fr/inria-00155143
Formal correctness of conflict detection for firewalls, Proceedings of the 2007 ACM workshop on Formal methods in security engineering , FMSE '07, pp.22-30, 2007. ,
DOI : 10.1145/1314436.1314440
POWER prototype: towards integrated policy-based management, Network Operations and Management Symposium, pp.789-802, 2000. ,
High Level Conflict Management Strategies in Advanced Access Control Models, Electronic Notes in Theoretical Computer Science, vol.186, pp.3-26, 2007. ,
DOI : 10.1016/j.entcs.2007.01.064
The Ponder Policy Specification Language, POLICY '01, pp.18-38, 2001. ,
DOI : 10.1007/3-540-44569-2_2
Minimum Spanning Tree, pp.79-114, 1999. ,
DOI : 10.1007/978-1-4471-0585-5_3
Complete analysis of configuration rules to guarantee reliable network security policies, International Journal of Information Security, vol.29, issue.2, pp.103-122, 2008. ,
DOI : 10.1007/s10207-007-0045-7
URL : https://hal.archives-ouvertes.fr/hal-01207771
Secure Systems Development with UML, 2004. ,
Model-based security analysis for mobile communications, Proceedings of the 13th international conference on Software engineering , ICSE '08, pp.683-692, 2008. ,
DOI : 10.1145/1368088.1368186
Implementation of a Formal Security Policy Refinement Process in WBEM Architecture, Journal of Network and Systems Management, vol.15, issue.2, 2007. ,
DOI : 10.1007/s10922-007-9063-z
M: Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications, In: International Journal of Network Security, vol.4, issue.1, pp.69-80, 2007. ,
Rewriting of imperative programs into logical equations, Science of Computer Programming, vol.56, issue.3, pp.363-401, 2005. ,
DOI : 10.1016/j.scico.2004.10.001
Semantic context aware security policy deployment, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, 2009. ,
DOI : 10.1145/1533057.1533092
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Theorem Proving for Modeling and Conflict Checking of Authorization Policies, 2006 International Symposium on Computer Networks, 2006. ,
DOI : 10.1109/ISCN.2006.1662524