C. Des, P. De-sécurité-le-modéliseur-comme-aperçu, M. {idw, and A. }. Low-}_{idet, du formulaire lors de sa modélisation Nous avons également vu que dans le modèle QualNet qu'un rôle particulier est associé à chaque étape (cf. partie 4.3.2) Ce rôle etait noté de manière empirique, accès aux fichiers de Saisie doit donc être autorisé pour tous les utilisateurs possédant le rôle M {IDW ORKF LOW }_{IDET AT } associé à l'étape considérée. L'accès aux fichiers d'aperçu est autorisé pour tous les utilisateurs ayant le rôle de modélisation model

. Ainsi, achats défini précédemment, nous obtenons pour les quatre étapes qui le composent les cinq règles d'autorisation du listing 5.1 : 1 allow ( * : M4_1, execute , page : / Dynamic/ M o d e l i s e u r / Modules /M4/ e t 1 / S a i s i e 4 . aspx ) 2 allow ( * : model , execute, p.3

E. Du and C. D. , S a i s i e 4 . aspx ) 3 allow ( Bob : admin dyn , execute , page : 4 /Dynamic/ m o d e l i s e u r / modules /M4/ e t 2 / S a i s i e 4 . aspx ) 5 allow ( * : G e s t i o n u t i l i s a t e u r s , execute , page : 6 /Dynamic/ m o d e l i s e u r / modules /M4/ e t 2 / S a i s i e 4 . aspx ) 7 allow ( Bob : G e s t i o n u t i l i s a t e u r s , execute, p.8

E. Du-contrôleur-d-'accès-dans-la, 6, nous avons vu que le nombre de règle potentielles d'accès calculées est égal à (p + 1) * (2r + 2), avec p la profondeur de calcul (p = 3) et r le nombre de rôles applicatifs retournés par l'adaptateur applicatif (r = 5) Nous obtenons bien ici un

T. De, . De, and J. P. Protection-bibliographie-]-anderson, Computer security threat monitoring and surveillance, 1980.

. Atluri, . Huang, V. Atluri, and W. Et-huang, An authorization model for workflows, Proceedings of the 4th European Symposium on Research in Computer Security, pp.44-64, 1996.
DOI : 10.1007/3-540-61770-1_27

. Bell, D. E. Bell, and L. J. Et-lapadula, Secure computer systems : Mathematical foundations and model. Rapport technique M74-244, The MITRE Corporation, 1973.

. Betgé-brezetz, End-to-end privacy policy enforcement in cloud infrastructure, 2013 IEEE 2nd International Conference on Cloud Networking (CloudNet), pp.25-32, 2013.
DOI : 10.1109/CloudNet.2013.6710554

J. K. Biba, Integrity considerations for secure computer systems, 1977.

W. E. Boebert-et-kain-]-boebert and R. Y. Et-kain, A practical alternative to hierarchical integrity policies, 8th National Computer Security Conference, 1985.

J. Briffaut, Formalisation et garantie de propriétés de sécurité système : application à la détection d'intrusions, Thèse de doctorat, 2007.

. Briffaut, Formalization of security properties : enforcement for mac operating systems and verification of dynamic mac policies, International journal on advances in security, vol.2, issue.4, pp.325-343, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00464773

. Cherrueau, Reference Monitors for Security and Interoperability in OAuth 2.0, SETOP 2013, 6th International Workshop on Autonomous and Spontaneous Security, pp.12-13, 2013.
DOI : 10.1007/978-3-642-54568-9_15

URL : https://hal.archives-ouvertes.fr/hal-00846810

C. , W. Clark, D. D. Et-wilson, and D. R. , A Comparison of Commercial and Military Computer Security Policies, IEEE Symposium on Security and Privacy, p.184, 1987.

D. Cvrcek, Mandatory access control in workflow systems, Proceedings of the JCKBSE Conference, pp.247-254, 2000.

. Debricon, From business processes to integration testing, Zendra, O., éditeur : IDM'09, 5èmes journées sur l'Ingéniérie Dirigée par les Modèles, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00430539

. Amico, HiPoLDS : A hierarchical security policy language for distributed systems, 2012.

F. Et-kuhn-]-ferraiolo, D. Et-kuhn, and R. , Role-based access controls, 15th National Computer Security Conference, pp.554-563, 1992.

R. T. Fielding, REST : Architectural Styles and the Design of Network-based Software Architectures, 2000.

. Gros, Contrôle d'accès mandataire pour Windows 7, SSTIC 2012, pp.266-291, 2012.

I. W. Group, The oauth 2.0 authorization, 2012.

. Harrison, Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976.
DOI : 10.1145/360303.360333

. Hu, Conformance Checking of Access Control Policies Specified in XACML, 31st Annual International Computer Software and Applications Conference, Vol. 2, (COMPSAC 2007), pp.275-280, 2007.
DOI : 10.1109/COMPSAC.2007.96

W. Huang, Incorporating Security into Workflow Management Systems, Thèse de doctorat, 1998.

Y. J. Kim, Access control service oriented architecture security, 2009.

. Kolovski, Analyzing web access control policies, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.677-686, 2007.
DOI : 10.1145/1242572.1242664

. Koshutanski, . Massacci, H. Koshutanski, and F. Et-massacci, An access control framework for business processes for web services, Proceedings of the 2003 ACM workshop on XML security , XMLSEC '03, pp.15-24, 2003.
DOI : 10.1145/968559.968562

B. W. Lampson, Dynamic protection structures, Proceedings of the November 18-20, 1969, fall joint computer conference on, AFIPS '69 (Fall), pp.27-38, 1969.
DOI : 10.1145/1478559.1478563

B. W. Lampson, Protection, Proceedings of the 5th Symposium on Informations Sciences and Systems, pp.437-443, 1971.
DOI : 10.1145/775265.775268

B. W. Lampson, A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973.
DOI : 10.1145/362375.362389

. Leitner, AW-RBAC: Access Control in Adaptive Workflow Systems, 2011 Sixth International Conference on Availability, Reliability and Security, pp.27-34, 2011.
DOI : 10.1109/ARES.2011.15

. Liu, Designing Fast and Scalable XACML Policy Evaluation Engines, IEEE Transactions on Computers, vol.60, issue.12, pp.601802-1817, 2011.
DOI : 10.1109/TC.2010.274

. Loscocco, The inevitability of failure : The flawed assumption of security in modern computing environments, Proceedings of the 21st National Information Systems Security Conference, pp.303-314, 1998.

. Masi, Formalisation and Implementation of the XACML Access Control Mechanism, Barthe, éditeurs : ESSoS, volume 7159 de Lecture Notes in Computer Science, pp.60-74, 2012.
DOI : 10.1007/978-3-642-28166-2_7

. Nair, Trishul : A policy enforcement architecture for java virtual machines, 2008.

. Noseevich, . Petukhov, G. Noseevich, and A. Et-petukhov, Detecting Insufficient Access Control in Web Applications, 2011 First SysSec Workshop, pp.11-18, 2011.
DOI : 10.1109/SysSec.2011.28

. Olivier, Specifying application-level security in workflow systems, Proceedings Ninth International Workshop on Database and Expert Systems Applications (Cat. No.98EX130), pp.346-351, 1998.
DOI : 10.1109/DEXA.1998.707423

. Saltzer, . Schroeder, J. Saltzer, and M. Schroeder, The protection of information in computer systems, Proceedings of the IEEE, 1975.
DOI : 10.1109/PROC.1975.9939

R. S. Sandhu, The schematic protection model: its definition and analysis for acyclic attenuating schemes, Journal of the ACM, vol.35, issue.2, pp.404-432, 1988.
DOI : 10.1145/42282.42286

R. S. Sandhu, Separation of duties in computerized information systems, DBSec, pp.179-190, 1990.

R. S. Sandhu, The typed access matrix model, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.122-136, 1992.
DOI : 10.1109/RISP.1992.213266

B. Spencer, The flask security architecture : System support for diverse security policies, Proceedings of the Eighth USENIX Security Symposium, pp.123-139, 1999.

B. Splengler, Detection, prevention and containment : a study of grsecurity, Libre software Meeting, 2002.

. Venelle, Mandatory access control for the java virtual machine, 16th IEEE Computer Society Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00840729

. Wainer, W-RBAC ??? A Workflow Security Model Incorporating Controlled Overriding of Constraints, International Journal of Cooperative Information Systems, vol.12, issue.04, 2001.
DOI : 10.1142/S0218843003000814

. Wright, Linux security modules: general security support for the linux kernel, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], pp.17-31, 2002.
DOI : 10.1109/FITS.2003.1264934