nous nous intéressons à la définition d'un méta-modèle étendant le méta-modèle B permettant de définir un filtre de contrôle d'accès, comme indiqué à l'étape B.1 On notera qu'ici les substitutions et prédicats n'ont pas été simplifiés à des fins d'illustration de l'approche, Les traductions de Renew et Return sont similaires à celle de Lend résultat réduit est indispensable pour la lisibilité de l'approche ,
An Open Extensible Tool Environment for Event-B, Lecture Notes in Computer Science, vol.4260, p.588, 2006. ,
DOI : 10.1007/11901433_32
The B-Book : Assigning Programs to Meanings, 1996. ,
DOI : 10.1017/CBO9780511624162
Modeling in Event-B, 2010. ,
DOI : 10.1017/CBO9781139195881
« La composition des protocoles de sécurité avec la méthode B événementielle, » THESE, Université Henri Poincaré -Nancy I, mai 2010 ,
A Practical Approach to Combining CSP and B, » Formal Aspects of Computing, pp.182-198, 2000. ,
Disponible à http, ORKA ? Organizational Control Architecture, 2010. ,
« Goal-directed concept acquisition in requirements elicitation, » dans Proceedings of the 6th international workshop on Software specification and design, série IWSSD '91, pp.14-21, 1991. ,
L'homme qui valait cinq milliards. Editions Générales First, 2008. ,
Goal-directed requirements acquisition, Science of Computer Programming, vol.20, issue.1-2, pp.3-50, 1993. ,
DOI : 10.1016/0167-6423(93)90021-G
URL : http://doi.org/10.1016/0167-6423(93)90021-g
Enforcing ASTD Access-Control Policies with WS-BPEL Processes in SOA Environments, International Journal of Systems and Service-Oriented Engineering, vol.2, issue.2, pp.37-59, 2011. ,
DOI : 10.4018/jssoe.2011040103
URL : https://hal.archives-ouvertes.fr/hal-01223273
« A Metamodel for the Design of Access-Control Policy Enforcement Managers : BIBLIOGRAPHIE Work in Progress, » dans Foundations & Practice Of Security, série Lecture Notes in Computer Science, pp.218-226, 2011. ,
« A four-concern-oriented secure IS development approach, » dans 8th International Joint Conference on e-Business and Telecommunications, pp.18-21, 2011. ,
Minimizing the Number of Paths in BDDs, » dans Proceedings of the 15th symposium on Integrated circuits and systems design, p.359, 2002. ,
Amel Mammar, « Proving Reachability in B using Substitution Refinement, série Electronic Notes in Theoretical Computer Science, vol.to appear, 2011. ,
PAI : an Interpreter for the EB 3 Specification Language, » dans 5th Workshop on Tools for System Design and Verification (FM-TOOLS, proceedings, 2002. ,
Larrondo-Petrie, éditeurs1007/978-3-540-76650-6-19, pp.327-344, 2007. ,
Comparison of Model Checking Tools for Information Systems, » dans Formal Methods and Software Engineering, série Lecture Notes in Computer Science, J. Dong et H. Zhu, éditeurs, pp.581-596978, 1007. ,
State-based versus event-based specifications for information systems : a comparison of B and EB 3 , » Software and Systems Modeling, pp.236-257, 2005. ,
Automatic Production of Information Systems, » dans AAAI Symposium on Logic-Based Program Synthesis, 2002. ,
Fraikin, « Algebraic State Transition Diagrams, 2008. ,
Role-Based Access Control Informal and formal requirements specification laguages : Bridging the gap, IEEE Transactions on Software Engineering, vol.17, issue.5, pp.454-465, 1991. ,
Proving Event Ordering Properties for Information Systems, » dans ZB 2003 : Formal Specification and Development in Z and B, série, Lecture Notes in Computer Science, vol.2651, pp.628-644, 2003. ,
Terminal Binary Decision Diagrams : An Efficient Data Structure for Matrix Representation, Formal Methods in System Design, pp.149-169, 1997. ,
« EB 3 : an entity-based black-box specification method for information systems, » Software and Systems Modeling, pp.134-149, 2003. ,
Combinaison de spécifications formelles pour la modélisation des systèmes d'information, Thèse de doctorat, Conservatoire national des arts et métiers, 2006. ,
Statecharts: a visual formalism for complex systems, Science of Computer Programming, vol.8, issue.3, pp.231-274, 1987. ,
DOI : 10.1016/0167-6423(87)90035-9
Introduction to automata theory, languages , and computation, 1979. ,
DOI : 10.1145/568438.568455
The Verifying Compiler : A Grand Challenge for Computing Research, Journal of the ACM, vol.50, 2003. ,
Mise en relation de spécifications B et de descriptions UML pour l'aide à la validation externe de développements formels en B, Thèse, 2006. ,
QVTlike transformation language, » dans Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications , série OOPSLA '06, pp.719-720, 2006. ,
Transforming Models with ATL, Conference, série Lecture Notes in Computer Science, vol.3844, pp.128-138, 2005. ,
DOI : 10.1007/11663430_14
URL : https://hal.archives-ouvertes.fr/hal-00448120
Extending UML for Secure Systems Development, » dans «UML» 2002 ? The Unified Modeling Language, série Lecture Notes in Computer Science, pp.1-9, 2002. ,
« Modélisation de politiques de sécurité à l'aide d'une algèbre de processus, pp.295-310, 2009. ,
« Modélisation de politiques de sécurité à l'aide d'une algèbre de processus, pp.113-136, 2010. ,
Expressing Access Control Policies with an Event-Based Approach, Lecture Notes in Business Information BIBLIOGRAPHIE Processing, vol.51, issue.3, pp.607-621, 2011. ,
DOI : 10.1007/978-3-642-00199-4_2
URL : https://hal.archives-ouvertes.fr/hal-01224638
ProB: A Model Checker for B, Lecture Notes in Computer Science, vol.2805, pp.855-874, 2003. ,
DOI : 10.1007/978-3-540-45236-2_46
SecureUML: A UML-Based Modeling Language for Model-Driven Security, 5th International Conference on The Unified Modeling Language (UML), série LNCS, pp.426-441, 2002. ,
DOI : 10.1007/3-540-45800-X_33
UML to B: Formal Verification of Object-Oriented Models, Lecture Notes in Computer Science, vol.2999, pp.187-206, 2004. ,
DOI : 10.1007/978-3-540-24756-2_11
« Taking into Account Functional Models in the Validation of IS Security Policies, » dans Advanced Information Systems Engineering Workshops , série Lecture Notes in Business Information Processing, C. Salinesi, O. Pastor, W. Aalst, J. Mylopoulos, N. M. Sadeh, M. J. Shaw, et C. Szyperski, vol.83, pp.592-606, 2011. ,
An overview of a method and its support tool for generating B specifications from UML notations, Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering, pp.269-272, 2000. ,
DOI : 10.1109/ASE.2000.873675
URL : https://hal.archives-ouvertes.fr/hal-01124519
A proof-based approach to verifying reachability properties, Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pp.1651-1657, 2011. ,
DOI : 10.1145/1982185.1982531
URL : https://hal.archives-ouvertes.fr/hal-01306183
Automatic Generation of Error Messages for the Symbolic Execution of EB 3 Process Expressions, » dans Integrated Formal Methods, série Lecture Notes in Computer Science, M. Leuschel et H. Wehrheim, éditeurs, pp.337-351, 2009. ,
« Systematic translation of EB3 and ASTD specifications in B and EventB, 2010. ,
« Systematic Translation Rules from ASTD to Event-B, » dans Integrated Formal Methods, série Lecture Notes in Computer Science, D. Méry et S. Merz, éditeurs, pp.245-259, 2010. ,
The illustrated guide to a Ph.D. » Texte librement adapté, Images sous licence Creative Commons Attribution-NonCommercial 2.5 http://matt .might.net/articles/phd-school-in-pictures ,
Communication and concurrency, 1989. ,
« Génération automatique de messages d'erreurs pour l'exécution symbolique d'expressions de processus EB 3 , » Mémoire de maîtrise, 2009. ,
ASTD and B for the Formal Specification of an Access Control Filter Special Issue of UMLFM 2011 workshop, to be published, Mammar et R. Laleau, « Implémentation JAVA d'une spécification B : Application aux bases de données, » Technique et Science Informatiques, pp.537-570, 2008. ,
Systematic Approach to Transform OMT Diagrams to a B Specification, » dans FM'99 ? Formal Methods, série Lecture Notes in Computer Science, pp.706-706, 1999. ,
An approach to engineer and enforce context constraints in an RBAC environment, » dans Proceedings of the eighth ACM symposium on Access control models and technologies, série SACMAT '03, pp.65-79, 2003. ,
Model-Based Design and Evaluation of Interactive Applications, 1999. ,
DOI : 10.1007/978-1-4471-0445-2
The temporal logic of programs, » dans Foundations of Computer Science, 18th Annual Symposium on, pp.46-57, 1977. ,
The unified modeling language, 1996. ,
« An algebra for fine-grained integration of XACML policies, » dans Proceedings of the 14th ACM sympo- BIBLIOGRAPHIE sium on Access control models and technologies, série SACMAT '09, pp.63-72, 2009. ,
U2B -A tool for translating UML-B models into B, » dans UML-B Specification for Proven Embedded Systems Design, J. Mermet, éditeur, 2004. ,
UML-B, ACM Transactions on Software Engineering and Methodology, vol.15, issue.1, pp.92-122, 2006. ,
DOI : 10.1145/1125808.1125811
Language and Tool Support for Class and State Machine Refinement in UML-B, » dans FM 2009 : Formal Methods , série Lecture Notes in Computer Science, A. Cavalcanti et D. Dams, éditeurs, pp.579-595, 2009. ,
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
« How to do discretionary access control using roles, » dans Proceedings of the third ACM workshop on Role-based access control, série RBAC '98, pp.47-54, 1998. ,
Translating Statecharts to B, Lecture Notes in Computer Science, vol.2335, pp.128-144, 2002. ,
DOI : 10.1007/3-540-47884-1_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.2394
Bordbar, « Ensuring spatio-temporal access control for real-world applications, dans Proceedings of the 14th ACM symposium on Access control models and technologies , série SACMAT '09, pp.13-22, 2009. ,