Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003. ,
DOI : 10.1109/POLICY.2003.1206966
URL : https://hal.archives-ouvertes.fr/hal-01483818
PolyOrBAC: A security framework for Critical Infrastructures, International Journal of Critical Infrastructure Protection, vol.2, issue.4, pp.154-169, 2009. ,
DOI : 10.1016/j.ijcip.2009.08.005
URL : https://hal.archives-ouvertes.fr/hal-00851762
Collaborative access control framework for critical infrastructures, Critical Infrastructure Protection II, pp.189-201, 2008. ,
Secure Computer Systems: Unified Exposition and Multics Interpretation, MITRE Corporation, 1975. ,
A stratification-based approach for handling conflicts in access control, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, pp.189-195, 2003. ,
DOI : 10.1145/775412.775437
Integrity Considerations for Secure Computer Systems, MITRE Corporation, 1977. ,
What is computer security?, IEEE Security & Privacy Magazine, vol.1, issue.1, 2003. ,
DOI : 10.1109/MSECP.2003.1176998
The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.206-214, 1988. ,
DOI : 10.1109/SECPRI.1989.36295
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.8977
A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, pp.184-195, 1987. ,
DOI : 10.1109/SP.1987.10001
Access control policy: A framework to enforce recommendations, International Journal of Computer Science and Information Technologies, vol.2, issue.5, pp.2452-2463, 2011. ,
Role based access control, Proceedings of the Fifteenth National Computer Security Conference, pp.554-563, 1992. ,
Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001. ,
DOI : 10.1145/501978.501980
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.4562
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
DOI : 10.1109/SP.1982.10014
Handbook of Information Security Management, EDPACS, vol.26, issue.3, 1998. ,
DOI : 10.1201/1079/43275.26.3.19980901/31739.5
Usage Control: A Vision for Next Generation Access Control, Proceedings of the Second International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, pp.17-31, 2003. ,
DOI : 10.1007/978-3-540-45215-7_2
Supporting multiple levels of criticality, Digest of Papers. Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing (Cat. No.98CB36224), pp.70-79, 1998. ,
DOI : 10.1109/FTCS.1998.689456