Formalisation, spécification et implantation de politiques de contrôle d'accès avec l'atelier focal, 2008. ,
Formalisation et implantation d'une politique de sécurité d'une base de données, pp.71-86, 2006. ,
Un moniteur de r??f??rence s??r d'une base de donn??es, Techniques et sciences informatiques, vol.26, issue.9, pp.1091-1110, 2007. ,
DOI : 10.3166/tsi.26.1091-1110
Zenon: An Extensible Automated Theorem Prover Producing Checkable Proofs, In Logic for Programming Artificial Intelligence and Reasoning LNCS/LNAI, vol.4790, pp.151-165, 2007. ,
DOI : 10.1007/978-3-540-75560-9_13
URL : https://hal.archives-ouvertes.fr/inria-00315920
A formal and sound transformation from Focal to UML: an application to airport security regulations, UML and Formal Methods (UML&FM), Innovations in Systems and Software Engineering (ISSE) NASA Journal, Kitakyushu-City (Japan), 2008. ,
DOI : 10.1007/s11334-008-0060-5
URL : https://hal.archives-ouvertes.fr/hal-01125584
Formal Modeling of Airport Security Regulations using the Focal Environment, 2008 Requirements Engineering and Law, 2008. ,
DOI : 10.1109/RELAW.2008.5
URL : https://hal.archives-ouvertes.fr/hal-01125583
Zenon, version 0.4.1. http://focal.inria.fr/zenon, 2006. ,
Building certified components within focal, Symposium on Trends in Functional Programming, 2004. ,
URL : https://hal.archives-ouvertes.fr/hal-01124970
A few remarks about developing secure systems in b, 2008. ,
A full formalisation of the Bell and Lapadula security model, 2003. ,
A Formal Comparison of the Bell & LaPadula and RBAC Models, 2008 The Fourth International Conference on Information Assurance and Security, 2008. ,
DOI : 10.1109/IAS.2008.18
Formalisation and implementation of access control models, International Conference on Information Technology: Coding and Computing (ITCC'05), Volume II, pp.703-708, 2005. ,
DOI : 10.1109/ITCC.2005.154
URL : https://hal.archives-ouvertes.fr/hal-01416686
A formal approach to implement access control, Journal of Information Assurance and Security, vol.2, pp.137-148, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-01195854
Towards a formal specification of access control, Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis FCS-ARSPA'06 (Satellite Workshop to LICS'2006), 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-01352113
Contrôler le contrôle d'accès : Approches formelles, Approches Formelles dans l'Assistance au Développement de Logiciels, AFADL'07, 2007. ,
On specifying, implementing and comparing access control models. A Semantical Framework, 2007. ,
MITRE Technical Report 2547, Volume II, Journal of Computer Security, vol.4, issue.2-3, pp.239-263, 1996. ,
DOI : 10.3233/JCS-1996-42-308
Focdoc: The documentation system of foc, Proceedings of the 11th Calculemus Symposium, 2003. ,
Functional Testing in the Focal Environment, Tests and Proofs, Second International Conference Proceedings, pp.84-98, 2008. ,
DOI : 10.1007/978-3-540-79124-9_7
URL : https://hal.archives-ouvertes.fr/hal-01125411
The algebra of security, Proceedings. 1988 IEEE Symposium on Security and Privacy, pp.2-7, 1988. ,
DOI : 10.1109/SECPRI.1988.8092
Sémantique des systèmes de contrôle d'accès, 2007. ,
Conception et Implantation du langage FoC pour le développement de logiciels certifiés, 2003. ,
Algorithms and proof inheritance in the Foc language, Journal of Automated Reasoning, vol.29, issue.3/4, pp.337-363, 2002. ,
DOI : 10.1023/A:1021979218446
Making proofs in a hierarchy of mathematical structures, Proceedings of the 11th Calculemus Symposium, 2003. ,
The Coq Proof Assistant Reference Manual. INRIA-Rocquencourt, 2006. ,
Programmer le Calcul Formel, des AlgorithmesàAlgorithmes`Algorithmesà la Sémantique, 2002. ,