J. Alferes, L. Pereira, H. Przymusinska, and T. Przymusinski, LUPS ? A language for updating logic programs. Logic Programming and Nonmonotonic Reasoning pp, pp.162-176, 1999.

F. Baader and T. Nipkow, Term Rewriting and All That, 1998.

S. Barker, Access Control for Deductive Databases by Logic Programming, 18th International Conference of Logic Programming, pp.54-69, 2002.
DOI : 10.1007/3-540-45619-8_5

S. Barker and P. J. Stuckey, Flexible access control policy specification with constraint logic programming, ACM Transactions on Information and System Security, vol.6, issue.4, pp.501-546, 2003.
DOI : 10.1145/950191.950194

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.71.5636

M. Y. Becker and S. Nanz, A logic for state-modifying authorization policies, ESORICS 2007, pp.203-218, 2007.

D. Bell and L. Lapadula, Secure Computer Systems: a Mathematical Model, MITRE Corp, 1973.

E. Bertino, A logical framework for reasoning about access control models, ACM Transactions on Information and System Security, vol.6, issue.1, pp.71-127, 2003.
DOI : 10.1145/605434.605437

T. Bourdier and H. Cirstea, Constrained rewriting in recognizable theories, Tech. rep., INRIA, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00456848

A. Chander, J. Mitchell, and D. Dean, A state-transition model of trust management and access control, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.27-43, 2001.
DOI : 10.1109/CSFW.2001.930134

M. Clavel, F. Durán, S. Eker, P. Lincoln, N. Martí-oliet et al., All About Maude -A High-Performance Logical Framework, How to Specify, Program and Verify Systems in Reriting Logic, 2007.

N. Damianou, A survey of policy specification approaches. Tech. rep., Department of Computing, Imperial College of Science Technology and Medicine, 2002.

D. J. Dougherty, K. Fisler, and S. Krishnamurthi, Specifying and Reasoning About Dynamic Access-Control Policies, 3rd International Joint Conference on Automated Reasoning (IJ- CAR). LNCS, pp.632-646, 2006.
DOI : 10.1007/11814771_51

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.8098

M. Gelfond and V. Lifschitz, Action languages, Electron. Trans. Artif. Intell, vol.2, pp.193-210, 1998.

L. George, V. V. Tong, and L. Mé, Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy, Recent Advances in Intrusion Detection, 12th International Symposium, RAID. Proceedings. Lecture Notes in Computer Science, pp.355-356, 2009.
DOI : 10.1007/978-3-642-04342-0_22

URL : https://hal.archives-ouvertes.fr/hal-00420117

L. Habib, M. Jaume, and C. Morisset, Formal definition and comparison of access control models, Journal of Information Assurance and Security, vol.4, issue.4, pp.372-381, 2009.
URL : https://hal.archives-ouvertes.fr/hal-01195856

P. Hinman, Fundamentals of mathematical logic, 2005.

S. Jajodia, A unified framework for enforcing multiple access control policies, ACM SIGMOD international conference on Management of data, pp.474-485, 1997.

M. Jaume, Security Rules versus Security Properties, Information Systems Security -6th International Conference, pp.231-245, 2010.
DOI : 10.1007/978-3-642-17714-9_17

URL : https://hal.archives-ouvertes.fr/hal-00593937

M. Jaume, V. V. Tong, and L. Mé, Contrôle d'accès versus contrôle de flots, Approches Formelles dans l'Assistance au Développement de Logiciels, pp.27-41, 2010.

C. Kirchner, H. Kirchner, and A. Santana-de-oliveira, Analysis of Rewrite-Based Access Control Policies, Proceedings of the Third International Workshop on Security and Rewriting Techniques, pp.55-75, 2008.
DOI : 10.1016/j.entcs.2009.02.072

URL : https://hal.archives-ouvertes.fr/inria-00433409

N. Li and M. V. Tripunitara, Security analysis in role-based access control, ACM Transactions on Information and System Security, vol.9, issue.4, pp.391-420, 2006.
DOI : 10.1145/1187441.1187442

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

M. V. Tripunitara and N. Li, A theory for comparing the expressive power of access control models1, Journal of Computer Security, vol.15, issue.2, pp.231-272, 2007.
DOI : 10.3233/JCS-2007-15202

J. Ullman, Database and Knowledge -Base Systems, 1988.