P. E. Ammann and R. Sandhu, Extending the creation operation in the Schematic Protection Model, [1990] Proceedings of the Sixth Annual Computer Security Applications Conference, pp.304-348, 1990.
DOI : 10.1109/CSAC.1990.143796

E. Astesiano, M. Broy, and G. Reggio, Algebraic Specification of Concurrent Systems, IFIP WG 1.3 Book on Algebraic Foundations of System Specification, 1999.
DOI : 10.1007/978-3-642-59851-7_13

T. Ball, B. Cook, S. Das, and S. K. Rajamani, Refining Approximations in Software Predicate Abstraction, TACAS, pp.388-403, 2004.
DOI : 10.1007/978-3-540-24730-2_30

T. Ball, A. Podelski, and S. K. Rajamani, Boolean and cartesian abstraction for model checking C programs, Margaria and Yi [71], pp.268-283

N. Belnap, A Useful Four-Valued Logic, Modern Uses of Multiple-Valued Logic, pp.30-56, 1977.
DOI : 10.1007/978-94-010-1161-7_2

M. Bidoit and A. Boisseau, Algebraic Abstractions, Lecture Notes in Computer Science, vol.2267, pp.21-47, 2001.
DOI : 10.1007/3-540-45645-7_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.2313

L. Bolc and P. Borowik, Many-valued Logics, 1992.
DOI : 10.1007/978-3-662-08494-6

G. Bruns and P. Godefroid, Model Checking Partial State Spaces with 3-Valued Temporal Logics, Halbwachs and Peled [52], pp.274-287
DOI : 10.1007/3-540-48683-6_25

G. Bruns and P. Godefroid, Temporal logic query checking, Proceedings 16th Annual IEEE Symposium on Logic in Computer Science, pp.409-417, 2001.
DOI : 10.1109/LICS.2001.932516

G. Bruns and P. Godefroid, Model Checking with Multi-valued Logics, Lecture Notes in Computer Science, vol.3142, pp.281-293, 2004.
DOI : 10.1007/978-3-540-27836-8_26

R. E. Bryant, Graph-Based Algorithms for Boolean Function Manipulation, IEEE Transactions on Computers, vol.35, issue.8, pp.677-691, 1986.
DOI : 10.1109/TC.1986.1676819

J. A. Brzozowski and C. J. Seger, A unified framework for race analysis of asynchronous networks, Journal of the ACM, vol.36, issue.1, pp.20-45, 1989.
DOI : 10.1145/58562.59301

J. R. Burch, E. M. Clarke, K. L. Mcmillan, D. L. Dill, and L. J. Hwang, Symbolic model checking: 10/sup 20/ states and beyond, [1990] Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science, pp.142-170, 1992.
DOI : 10.1109/LICS.1990.113767

D. R. Chase, M. N. Wegman, and F. K. Zadeck, Analysis of pointers and structures, PLDI, pp.296-310, 1990.

M. Chechik, B. Devereux, and S. M. Easterbrook, Implementing a multivalued symbolic model checker, Margaria and Yi [71], pp.404-419

M. Chechik, B. Devereux, S. Easterbrook, and A. Gurfinkel, Multi-valued symbolic model-checking, ACM Transactions on Software Engineering and Methodology, vol.12, issue.4, pp.371-408, 2003.
DOI : 10.1145/990010.990011

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.7144

M. Chechik, A. Gurfinkel, and B. Devereux, ?-check: A multi-valued model-checker, Lecture Notes in Computer Science, pp.505-509, 2002.

M. Chechik and W. Maccaull, CTL model-checking over logics with non-classical negations, 33rd International Symposium on Multiple-Valued Logic, 2003. Proceedings., p.293, 2003.
DOI : 10.1109/ISMVL.2003.1201420

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.9160

E. M. Clarke and E. A. Emerson, Design and synthesis of synchronization skeletons using branching time temporal logic, Logic of Programs, pp.52-71, 1981.
DOI : 10.1007/BFb0025774

E. M. Clarke, T. Filkorn, and S. Jha, Exploiting symmetry in temporal logic model checking, Courcoubetis [28], pp.450-462

E. M. Clarke, O. Grumberg, H. Hiraishi, S. Jha, D. E. Long et al., Verification of the Futurebus+ cache coherence protocol, CHDL, volume A-32 of IFIP Transactions, pp.15-30, 1993.
DOI : 10.1007/BF01383968

E. M. Clarke, O. Grumberg, S. Jha, Y. Lu, and H. Veith, Counterexample-guided abstraction refinement for symbolic model checking, Journal of the ACM, vol.50, issue.5, pp.752-794, 2003.
DOI : 10.1145/876638.876643

E. M. Clarke, O. Grumberg, and D. E. Long, Model checking and abstraction, ACM Transactions on Programming Languages and Systems, vol.16, issue.5, pp.1512-1542, 1994.
DOI : 10.1145/186025.186051

E. M. Clarke, O. Grumberg, and D. A. , Peled. Model Checking, 2000.

E. M. Clarke, D. E. Long, and K. L. Mcmillan, Compositional model checking, [1989] Proceedings. Fourth Annual Symposium on Logic in Computer Science, pp.353-362, 1989.
DOI : 10.1109/LICS.1989.39190

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.111.7245

M. Clavel, F. Durán, S. Eker, P. Lincoln, N. Martí-oliet et al., Maude: specification and programming in rewriting logic, Theoretical Computer Science, vol.285, issue.2, pp.187-243, 2002.
DOI : 10.1016/S0304-3975(01)00359-0

C. Courcoubetis, M. Y. Vardi, P. Wolper, and M. Yannakakis, Memory efficient algorithms for the verification of temporal properties, Clarke and Kurshan [25], pp.233-242

P. Cousot and R. Cousot, Abstract interpretation, Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '77, pp.238-252, 1977.
DOI : 10.1145/512950.512973

URL : https://hal.archives-ouvertes.fr/inria-00528590

D. Dams, Abstract Interpretation and Partial Refinement for Model Checking, 1996.

D. Dams, R. Gerth, and O. Grumberg, Abstract interpretation of reactive systems, ACM Transactions on Programming Languages and Systems, vol.19, issue.2, pp.253-291, 1997.
DOI : 10.1145/244795.244800

S. Das, D. L. Dill, and S. Park, Experience with Predicate Abstraction, Halbwachs and Peled [52], pp.160-171
DOI : 10.1007/3-540-48683-6_16

J. Dunn, A Comparative Study of Various Model-Theoretic Treatments of Negation: A History of Formal Negation, What is Negation, 1999.
DOI : 10.1007/978-94-015-9309-0_2

S. M. Easterbrook and M. Chechik, A framework for multi-valued reasoning over inconsistent viewpoints, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001, pp.411-420, 2001.
DOI : 10.1109/ICSE.2001.919114

E. A. Emerson and A. P. Sistla, Symmetry and model checking, Courcoubetis [28], pp.463-478

C. Enea, Unifying Decidability Results on Protection Systems Using Simulations, Formal Aspects in Security and Trust, pp.96-111, 2005.
DOI : 10.1007/11679219_8

C. Enea and C. Dima, Abstractions of Multi-agent Systems, CEEMAS, pp.11-21, 2007.
DOI : 10.1007/978-3-540-75254-7_2

C. Enea and F. L. Tiplea, Abstractions of dynamic data types, Acta Informatica

C. Enea and F. L. Tiplea, Multi-valued abstractions, Acta Informatica

R. Fagin, J. Y. Halpern, Y. Moses, and M. Y. Vardi, Reasoning about Knowledge, 1995.

J. C. Fernandez, C. Jard, T. Jéron, and C. Viho, Using on-the-fly verification techniques for the generation of test suites, Lecture Notes in Computer Science, vol.1102, pp.348-359, 1996.
DOI : 10.1007/3-540-61474-5_82

URL : https://hal.archives-ouvertes.fr/inria-00073711

M. Fitting, Many-valued modal logics I. Fundamenta Informaticae, pp.235-254, 1991.

M. Fitting, Many-valued modal logics II, Fundamenta Informaticae, vol.17, issue.12, pp.55-73, 1992.

B. R. Gaines, Logical foundations for database systems, International Journal of Man-Machine Studies, vol.11, issue.4, pp.481-500, 1979.
DOI : 10.1016/S0020-7373(79)80039-5

M. Ginsberg, Multivalued logics: a uniform approach to reasoning in artificial intelligence, Computational Intelligence, vol.3, issue.3, pp.265-316, 1988.
DOI : 10.1007/BF00485052

P. Godefroid and D. Pirottin, Refining dependencies improves partialorder verification methods (extended abstract), Courcoubetis [28], pp.438-449
DOI : 10.1007/3-540-56922-7_36

S. Graf and H. Sa¨?disa¨?di, Construction of abstract state graphs with PVS, Lecture Notes in Computer Science, vol.1254, pp.72-83, 1997.
DOI : 10.1007/3-540-63166-6_10

S. Graf and B. Steffen, Compositional minimization of finite state systems, pp.186-196
DOI : 10.1007/BFb0023732

O. Grumberg and D. E. Long, Model checking and modular verification, ACM Transactions on Programming Languages and Systems, vol.16, issue.3, pp.843-871, 1994.
DOI : 10.1145/177492.177725

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.6959

A. Gurfinkel and M. Chechik, Multi-valued Model Checking via Classical Model Checking, Lecture Notes in Computer Science, vol.2761, pp.263-277, 2003.
DOI : 10.1007/978-3-540-45187-7_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.704

M. A. Harrison and W. L. Ruzzo, Monotonic protection systems, Foundations of Secure Computation, 1978.

M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976.
DOI : 10.1145/360303.360333

S. Hazelhurst, Compositional Model Checking of Partially Ordered State Spaces, 1996.

T. A. Henzinger, R. Jhala, R. Majumdar, and G. Sutre, Lazy abstraction, POPL, pp.58-70, 2002.
DOI : 10.1145/565816.503279

S. Horwitz, P. Pfeiffer, and T. W. Reps, Dependence analysis for pointer variables, PLDI, pp.28-40, 1989.

C. N. Ip and D. L. Dill, Better verification through symmetry, Formal Methods in System Design, vol.9, issue.12, pp.41-75, 1996.

N. D. Jones and S. Muchnick, Flow analysis and optimization of LISPlike structures, Program Flow Analysis: Theory and Applications, pp.102-131, 1981.

N. D. Jones and S. S. Muchnick, A flexible approach to interprocedural data flow analysis and programs with recursive data structures, Proceedings of the 9th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '82, pp.66-74, 1982.
DOI : 10.1145/582153.582161

S. C. Kleene, Introduction to Metamathematics, 1952.

B. Konikowska and W. Penczek, Reducing model checking from multivalued CTL * to CTL *, Proceedings of the 13th International Conference on Concurrency Theory (CONCUR2002), volume LNCS 2421, pp.226-239, 2002.

B. Konikowska and W. Penczek, On designated values in multi-valued CTL * model checking, Fundamenta Informaticae, vol.60, issue.1-4, pp.211-224, 2004.

B. Konikowska and W. Penczek, Model checking for multivalued logic of knowledge and time, Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems , AAMAS '06, pp.169-176, 2006.
DOI : 10.1145/1160633.1160661

J. R. Larus and P. N. Hilfinger, Detecting conflicts between structure accesses, PLDI, pp.21-34, 1988.
DOI : 10.1145/960116.53993

R. J. Lipton and L. Snyder, A Linear Time Algorithm for Deciding Subject Security, Journal of the ACM, vol.24, issue.3, pp.455-464, 1977.
DOI : 10.1145/322017.322025

A. Loginov, T. Reps, and M. Sagiv, Abstraction Refinement via Inductive Learning, Proceedings of the 17th International Conference on Computer Aided Verification (CAV'05), pp.519-533, 2005.
DOI : 10.1007/11513988_50

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.7881

Z. Lotfi, Fuzzy sets, Information and Control, vol.8, pp.338-353, 1965.

Z. Manna and A. Pnueli, The Temporal Logic of Reactive and Concurrent Systems. Specification, 1992.

T. Margaria and W. Yi, Tools and Algorithms for the Construction and Analysis of Systems, 7th International Conference, TACAS 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software Proceedings , volume 2031 of Lecture Notes in Computer Science, 2001.

K. L. Mcmillan, Symbolic Model Checking, Kluwer Academic, 1993.

K. L. Mcmillan, Verification of Infinite State Systems by Compositional Model Checking, Lecture Notes in Computer Science, vol.1703, pp.219-234, 1999.
DOI : 10.1007/3-540-48153-2_17

K. L. Mcmillan and N. Amla, Automatic Abstraction without Counterexamples, Proceedings of the 9th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TA- CAS'03), pp.2-17, 2003.
DOI : 10.1007/3-540-36577-X_2

K. L. Mcmillan and J. Schwalbe, Formal verification of the Gigamax cache consistency protocol, Shared Memory Multiprocessing, 1992.

K. Meinke and J. V. Tucker, Universal algebra, Handbook of Logic in Computer Science, pp.189-411, 1993.

J. Meseguer, Membership algebra as a logical framework for equational specification, Proceedings of WADT 97, volume LNCS 1376, pp.18-61, 1998.
DOI : 10.1007/3-540-64299-4_26

J. Meseguer, M. Palomino, and N. Martí-oliet, Equational abstractions, Proceedings of CADE 03, volume LNCS 1376, pp.2-16, 2003.
DOI : 10.1007/978-3-540-45085-6_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.183.9812

F. Nielson, H. R. Nielson, and C. Hankin, Principles of Program Analysis, 1999.
DOI : 10.1007/978-3-662-03811-6

D. Peled, Combining partial order reductions with on-the-fly model-checking, Lecture Notes in Computer Science, vol.818, pp.377-390, 1994.
DOI : 10.1007/3-540-58179-0_69

J. Plevyak, A. A. Chien, and V. Karamcheti, Analysis of dynamic structures for efficient parallel execution, Lecture Notes in Computer Science, vol.768, pp.37-56, 1993.
DOI : 10.1007/3-540-57659-2_3

J. P. Queille and J. Sifakis, Specification and verification of concurrent systems in CESAR, Symposium on Programming, pp.337-351, 1982.
DOI : 10.1007/3-540-11494-7_22

H. Rasiowa, An Algebraic Approach to Non-Classical Logics. Studies in Logic and the Foundations of Mathematics, 1978.

S. Sagiv, T. W. Reps, and R. Wilhelm, Solving shape-analysis problems in languages with destructive updating, ACM Transactions on Programming Languages and Systems, vol.20, issue.1, pp.1-50, 1998.
DOI : 10.1145/271510.271517

S. Sagiv, T. W. Reps, and R. Wilhelm, Parametric shape analysis via 3-valued logic, ACM Transactions on Programming Languages and Systems, vol.24, issue.3, pp.217-298, 2002.
DOI : 10.1145/514188.514190

H. Saidi and N. Shankar, Abstract and Model Check while You Prove, Proceedings of the 11th International Conference on Computer-Aided Verification (CAV'99), pp.443-454, 1999.
DOI : 10.1007/3-540-48683-6_38

R. Sandhu, The typed access matrix model, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.122-136, 1992.
DOI : 10.1109/RISP.1992.213266

R. S. Sandhu, The schematic protection model: its definition and analysis for acyclic attenuating schemes, Journal of the ACM, vol.35, issue.2, pp.404-432, 1988.
DOI : 10.1145/42282.42286

J. Stransky, A lattice for abstract interpretation of dynamic (LISP-like) structures, Information and Computation, vol.101, issue.1, pp.70-102, 1992.
DOI : 10.1016/0890-5401(92)90076-R

F. L. Tiplea and C. Enea, Abstractions of data types, Acta Informatica, vol.101, issue.1, pp.639-671, 2006.
DOI : 10.1007/s00236-006-0010-3

A. Valmari, A stubborn attack on state explosion, pp.156-165

W. Visser, S. Park, and J. Penix, Using predicate abstraction to reduce object-oriented programs for model checking, Proceedings of the third workshop on Formal methods in software practice , FMSP '00, pp.3-182, 2000.
DOI : 10.1145/349360.351125

E. Y. Wang, Analysis of Recursive Types in an Imperative Language, 1994.