A. Abou-el-kalam, R. E. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Organization Based Access Control, IEEE 4th Intl. Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003.
URL : https://hal.archives-ouvertes.fr/hal-01483818

J. R. Abrial, The B-Book ? Assigning Programs to Meanings, 1996.

J. R. Abrial, D. Cansell, and D. Méry, Formal Derivation of Spanning Trees Algorithms, LNCS 2651, pp.457-476, 2003.
DOI : 10.1007/3-540-44880-2_27

URL : https://hal.archives-ouvertes.fr/inria-00099793

F. Autrel, F. Cuppens, N. Cuppens-boulahia, and C. Coma, MotOrBAC 2: A security policy tool, 2008.

N. Benaissa, D. Cansell, and D. Méry, Integration of Security Policy into System Modeling, 7th International B Conference, pp.232-247, 2007.
DOI : 10.1007/11955757_19

URL : https://hal.archives-ouvertes.fr/inria-00155143

V. Capretta, B. Stepien, A. Felty, and S. Matwin, Formal correctness of conflict detection for firewalls, Proceedings of the 2007 ACM workshop on Formal methods in security engineering , FMSE '07, pp.22-30, 2007.
DOI : 10.1145/1314436.1314440

C. Mont, M. Baldwin, A. Goh, and C. , POWER prototype: towards integrated policy-based management, Network Operations and Management Symposium, pp.789-802, 2000.

F. Cuppens, N. Cuppens-boulahia, B. Ghorbel, and M. , High Level Conflict Management Strategies in Advanced Access Control Models, Electronic Notes in Theoretical Computer Science, vol.186, pp.3-26, 2007.
DOI : 10.1016/j.entcs.2007.01.064

N. Damianou, N. Dulay, E. Lupu, and M. Sloman, The Ponder Policy Specification Language, POLICY '01, pp.18-38, 2001.
DOI : 10.1007/3-540-44569-2_2

R. Fraer, Minimum Spanning Tree, pp.79-114, 1999.
DOI : 10.1007/978-1-4471-0585-5_3

J. Garcia-alfaro, N. Cuppens, C. , and F. , Complete analysis of configuration rules to guarantee reliable network security policies, International Journal of Information Security, vol.29, issue.2, pp.103-122, 2008.
DOI : 10.1007/s10207-007-0045-7

URL : https://hal.archives-ouvertes.fr/hal-01207771

J. Jürjens, Secure Systems Development with UML, 2004.

J. Jürjens, J. Schreck, and P. Bartmann, Model-based security analysis for mobile communications, Proceedings of the 13th international conference on Software engineering , ICSE '08, pp.683-692, 2008.
DOI : 10.1145/1368088.1368186

R. Laborde, M. Kamel, F. Barrere, and A. Benzekri, Implementation of a Formal Security Policy Refinement Process in WBEM Architecture, Journal of Network and Systems Management, vol.15, issue.2, 2007.
DOI : 10.1007/s10922-007-9063-z

S. Ioannidis, S. M. Bellovin, J. Ioannidis, A. D. Keromitis, K. Anagnostakis et al., M: Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications, In: International Journal of Network Security, vol.4, issue.1, pp.69-80, 2007.

O. Ponsini, C. Fédèle, and E. Kounalis, Rewriting of imperative programs into logical equations, Science of Computer Programming, vol.56, issue.3, pp.363-401, 2005.
DOI : 10.1016/j.scico.2004.10.001

S. Preda, F. Cuppens, N. Cuppens-boulahia, J. G. Alfaro, L. Toutain et al., Semantic context aware security policy deployment, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, 2009.
DOI : 10.1145/1533057.1533092

R. Sandhu, E. J. Coyne, H. L. Feinstein, Y. , and C. E. , Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

D. Unal, C. Ufuk, and M. ¸-aglayan, Theorem Proving for Modeling and Conflict Checking of Authorization Policies, 2006 International Symposium on Computer Networks, 2006.
DOI : 10.1109/ISCN.2006.1662524