A. Arnold, G. Point, A. Griffault, and A. Rauzy, The altarica formalism for describing concurrent systems, Fundamenta Informaticae, vol.40, issue.23, pp.109-124, 1999.

P. Bieber and J. Brunel, From Safety Models to Security Models: Preliminary Lessons Learnt, Computer Safety, Reliability, and Security. Proc. of the 1st Workshop on the Integration of Safety and Security Engineering, pp.269-281, 2014.
DOI : 10.1007/978-3-319-10557-4_30

M. Bozzano, A. Villafiorita, O. Aakerlund, P. Bieber, C. Bougnol et al., Esacs: an integrated methodology for design and safety analysis of complex systems, Proceedings of ESREL 2003. Balkema publisher, 2003.

J. Brunel, D. Chemouil, N. Mélédo, and V. Ibanez, Formal modelling and safety analysis of an avionic functional architecture with alloy, Embedded Real Time Software and Systems (ERTSS 2014), 2014.

J. Brunel, D. Chemouil, L. Rioux, M. Bakkali, and F. Vallée, A viewpoint-based approach for formal safety & security assessment of system architectures, 11th Workshop on Model-Driven Engineering, Verification, and Validation, pp.39-48, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01070960

J. Brunel, L. Rioux, S. Paul, A. Faucogney, and F. Vallée, Formal Safety and Security Assessment of an Avionic Architecture with Alloy, Proceedings Third International Workshop on Engineering Safety and Security Systems of Electronic Proceedings in Theoretical Computer Science (EPTCS), pp.8-19, 2014.
DOI : 10.4204/EPTCS.150.2

A. Cimatti, E. Clarke, F. Giunchiglia, and M. Roveri, NuSMV: A New Symbolic Model Verifier, Computer Aided Verification, pp.495-499, 1999.
DOI : 10.1007/3-540-48683-6_44

G. J. Holzmann, The model checker SPIN, IEEE Transactions on Software Engineering, vol.23, issue.5, pp.279-295, 1997.
DOI : 10.1109/32.588521

D. Jackson, Software Abstractions: Logic, Language, and Analysis, 2006.

A. Lin, M. Bond, and J. Clulow, Modeling Partial Attacks with Alloy, Security Protocols, pp.20-33, 2010.
DOI : 10.1007/978-3-642-17773-6_4

M. C. Reynolds, Lightweight Modeling of Java Virtual Machine Security Constraints, Abstract State Machines, pp.146-159, 2010.
DOI : 10.1007/978-3-642-11811-1_12

M. Toahchoodee and I. Ray, Using Alloy to analyse a spatio-temporal access control model supporting delegation, IET Information Security, vol.3, issue.3, pp.75-113, 2009.
DOI : 10.1049/iet-ifs.2008.0074