S. Dans-ce-chapitre, . De-gestion-d-'une, and . Bibliothèques, nous nous intéressons à la définition d'un méta-modèle étendant le méta-modèle B permettant de définir un filtre de contrôle d'accès, comme indiqué à l'étape B.1 On notera qu'ici les substitutions et prédicats n'ont pas été simplifiés à des fins d'illustration de l'approche, Les traductions de Renew et Return sont similaires à celle de Lend résultat réduit est indispensable pour la lisibilité de l'approche

J. Abrial, M. Butler, and S. Hallerstede, An Open Extensible Tool Environment for Event-B, Lecture Notes in Computer Science, vol.4260, p.588, 2006.
DOI : 10.1007/11901433_32

J. Abrial, The B-Book : Assigning Programs to Meanings, 1996.
DOI : 10.1017/CBO9780511624162

J. Abrial, Modeling in Event-B, 2010.
DOI : 10.1017/CBO9781139195881

N. Benaissa, « La composition des protocoles de sécurité avec la méthode B événementielle, » THESE, Université Henri Poincaré -Nancy I, mai 2010

M. Butler, A Practical Approach to Combining CSP and B, » Formal Aspects of Computing, pp.182-198, 2000.

T. O. Consortium, Disponible à http, ORKA ? Organizational Control Architecture, 2010.

A. Dardenne, S. Fickas, and E. A. Van-lamsweerde, « Goal-directed concept acquisition in requirements elicitation, » dans Proceedings of the 6th international workshop on Software specification and design, série IWSSD '91, pp.14-21, 1991.

M. Delattre and E. Levy, L'homme qui valait cinq milliards. Editions Générales First, 2008.

A. Dardenne, A. Van-lamsweerde, and E. S. Fickas, Goal-directed requirements acquisition, Science of Computer Programming, vol.20, issue.1-2, pp.3-50, 1993.
DOI : 10.1016/0167-6423(93)90021-G

URL : http://doi.org/10.1016/0167-6423(93)90021-g

M. E. Jiague, M. Frappier, F. Gervais, and R. Laleau, Enforcing ASTD Access-Control Policies with WS-BPEL Processes in SOA Environments, International Journal of Systems and Service-Oriented Engineering, vol.2, issue.2, pp.37-59, 2011.
DOI : 10.4018/jssoe.2011040103

URL : https://hal.archives-ouvertes.fr/hal-01223273

M. E. Jiague, M. Frappier, F. Gervais, R. Laleau, and R. St-denis, « A Metamodel for the Design of Access-Control Policy Enforcement Managers : BIBLIOGRAPHIE Work in Progress, » dans Foundations & Practice Of Security, série Lecture Notes in Computer Science, pp.218-226, 2011.

M. E. Jiague, M. Frappier, F. Gervais, P. Konopacki, R. Laleau et al., « A four-concern-oriented secure IS development approach, » dans 8th International Joint Conference on e-Business and Telecommunications, pp.18-21, 2011.

G. Fey and R. Drechsler, Minimizing the Number of Paths in BDDs, » dans Proceedings of the 15th symposium on Integrated circuits and systems design, p.359, 2002.

M. Frappier and F. Diagne, Amel Mammar, « Proving Reachability in B using Substitution Refinement, série Electronic Notes in Theoretical Computer Science, vol.to appear, 2011.

B. Fraikin, M. Frappier, «. Eb, D. Haneberg, and G. Schellhorn, PAI : an Interpreter for the EB 3 Specification Language, » dans 5th Workshop on Tools for System Design and Verification (FM-TOOLS, proceedings, 2002.

M. Hinchey, Larrondo-Petrie, éditeurs1007/978-3-540-76650-6-19, pp.327-344, 2007.

M. Frappier, B. Fraikin, R. Chossart, R. Chane-yack-fa, and E. M. Ouenzar, Comparison of Model Checking Tools for Information Systems, » dans Formal Methods and Software Engineering, série Lecture Notes in Computer Science, J. Dong et H. Zhu, éditeurs, pp.581-596978, 1007.

B. Fraikin, M. Frappier, and E. R. Laleau, State-based versus event-based specifications for information systems : a comparison of B and EB 3 , » Software and Systems Modeling, pp.236-257, 2005.

M. Frappier, B. Fraikin, R. Laleau, and E. M. Richard, Automatic Production of Information Systems, » dans AAAI Symposium on Logic-Based Program Synthesis, 2002.

M. Frappier, F. Gervais, and R. Laleau, Fraikin, « Algebraic State Transition Diagrams, 2008.

D. F. Ferraiolo, D. R. Kuhn, R. Chandramouli, M. D. Fraser, K. Kumar et al., Role-Based Access Control Informal and formal requirements specification laguages : Bridging the gap, IEEE Transactions on Software Engineering, vol.17, issue.5, pp.454-465, 1991.

M. Frappier, R. Laleau, D. Bert, J. Bowen, and S. King, Proving Event Ordering Properties for Information Systems, » dans ZB 2003 : Formal Specification and Development in Z and B, série, Lecture Notes in Computer Science, vol.2651, pp.628-644, 2003.

M. Fujita, P. Mcgeer, J. Yang, and . Multi, Terminal Binary Decision Diagrams : An Efficient Data Structure for Matrix Representation, Formal Methods in System Design, pp.149-169, 1997.

M. Frappier and R. St-denis, « EB 3 : an entity-based black-box specification method for information systems, » Software and Systems Modeling, pp.134-149, 2003.

F. Gervais, Combinaison de spécifications formelles pour la modélisation des systèmes d'information, Thèse de doctorat, Conservatoire national des arts et métiers, 2006.

D. Harel and . Statecharts, Statecharts: a visual formalism for complex systems, Science of Computer Programming, vol.8, issue.3, pp.231-274, 1987.
DOI : 10.1016/0167-6423(87)90035-9

J. Hopcroft, R. Motwani, and E. J. Ullman, Introduction to automata theory, languages , and computation, 1979.
DOI : 10.1145/568438.568455

T. Hoare, The Verifying Compiler : A Grand Challenge for Computing Research, Journal of the ACM, vol.50, 2003.

A. Idani and «. Uml, Mise en relation de spécifications B et de descriptions UML pour l'aide à la validation externe de développements formels en B, Thèse, 2006.

F. Jouault, F. Allilaire, J. Bézivin, I. Kurtev, E. P. Valduriez et al., QVTlike transformation language, » dans Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications , série OOPSLA '06, pp.719-720, 2006.

F. Jouault and I. Kurtev, Transforming Models with ATL, Conference, série Lecture Notes in Computer Science, vol.3844, pp.128-138, 2005.
DOI : 10.1007/11663430_14

URL : https://hal.archives-ouvertes.fr/hal-00448120

J. Jürjens and . Umlsec, Extending UML for Secure Systems Development, » dans «UML» 2002 ? The Unified Modeling Language, série Lecture Notes in Computer Science, pp.1-9, 2002.

P. Konopacki, M. Frappier, and E. R. Laleau, « Modélisation de politiques de sécurité à l'aide d'une algèbre de processus, pp.295-310, 2009.

P. Konopacki, M. Frappier, and E. R. Laleau, « Modélisation de politiques de sécurité à l'aide d'une algèbre de processus, pp.113-136, 2010.

P. Konopacki, M. Frappier, R. Laleau, W. Aalst, J. Mylopoulos et al., Expressing Access Control Policies with an Event-Based Approach, Lecture Notes in Business Information BIBLIOGRAPHIE Processing, vol.51, issue.3, pp.607-621, 2011.
DOI : 10.1007/978-3-642-00199-4_2

URL : https://hal.archives-ouvertes.fr/hal-01224638

M. Leuschel, M. Butler, K. Prob, S. Araki, E. D. Gnesi et al., ProB: A Model Checker for B, Lecture Notes in Computer Science, vol.2805, pp.855-874, 2003.
DOI : 10.1007/978-3-540-45236-2_46

T. Lodderstedt, D. A. Basin, E. J. Doser, and . Secureuml, SecureUML: A UML-Based Modeling Language for Model-Driven Security, 5th International Conference on The Unified Modeling Language (UML), série LNCS, pp.426-441, 2002.
DOI : 10.1007/3-540-45800-X_33

K. Lano, D. Clark, E. K. Androutsopoulos, and «. Uml, UML to B: Formal Verification of Object-Oriented Models, Lecture Notes in Computer Science, vol.2999, pp.187-206, 2004.
DOI : 10.1007/978-3-540-24756-2_11

Y. Ledru, A. Idani, J. Milhau, N. Qamar, R. Laleau et al., « Taking into Account Functional Models in the Validation of IS Security Policies, » dans Advanced Information Systems Engineering Workshops , série Lecture Notes in Business Information Processing, C. Salinesi, O. Pastor, W. Aalst, J. Mylopoulos, N. M. Sadeh, M. J. Shaw, et C. Szyperski, vol.83, pp.592-606, 2011.

R. Laleau and A. Mammar, An overview of a method and its support tool for generating B specifications from UML notations, Proceedings ASE 2000. Fifteenth IEEE International Conference on Automated Software Engineering, pp.269-272, 2000.
DOI : 10.1109/ASE.2000.873675

URL : https://hal.archives-ouvertes.fr/hal-01124519

A. Mammar, M. Frappier, and E. F. Diagne, A proof-based approach to verifying reachability properties, Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pp.1651-1657, 2011.
DOI : 10.1145/1982185.1982531

URL : https://hal.archives-ouvertes.fr/hal-01306183

J. Milhau, B. Fraikin, and E. M. Frappier, Automatic Generation of Error Messages for the Symbolic Execution of EB 3 Process Expressions, » dans Integrated Formal Methods, série Lecture Notes in Computer Science, M. Leuschel et H. Wehrheim, éditeurs, pp.337-351, 2009.

J. Milhau, M. Frappier, F. Gervais, and E. R. Laleau, « Systematic translation of EB3 and ASTD specifications in B and EventB, 2010.

J. Milhau, M. Frappier, F. Gervais, and E. R. Laleau, « Systematic Translation Rules from ASTD to Event-B, » dans Integrated Formal Methods, série Lecture Notes in Computer Science, D. Méry et S. Merz, éditeurs, pp.245-259, 2010.

M. Might, The illustrated guide to a Ph.D. » Texte librement adapté, Images sous licence Creative Commons Attribution-NonCommercial 2.5 http://matt .might.net/articles/phd-school-in-pictures

R. Milner, Communication and concurrency, 1989.

J. Milhau, « Génération automatique de messages d'erreurs pour l'exécution symbolique d'expressions de processus EB 3 , » Mémoire de maîtrise, 2009.

J. Milhau, A. Idani, R. Laleau, M. A. Labiadh, Y. Ledru et al., ASTD and B for the Formal Specification of an Access Control Filter Special Issue of UMLFM 2011 workshop, to be published, Mammar et R. Laleau, « Implémentation JAVA d'une spécification B : Application aux bases de données, » Technique et Science Informatiques, pp.537-570, 2008.

E. Meyer, J. Souquières, «. J. Wing, J. Woodcock, and E. J. Davies, Systematic Approach to Transform OMT Diagrams to a B Specification, » dans FM'99 ? Formal Methods, série Lecture Notes in Computer Science, pp.706-706, 1999.

G. Neumann and M. Strembeck, An approach to engineer and enforce context constraints in an RBAC environment, » dans Proceedings of the eighth ACM symposium on Access control models and technologies, série SACMAT '03, pp.65-79, 2003.

F. Paterno, Model-Based Design and Evaluation of Interactive Applications, 1999.
DOI : 10.1007/978-1-4471-0445-2

A. Pnueli, The temporal logic of programs, » dans Foundations of Computer Science, 18th Annual Symposium on, pp.46-57, 1977.

J. Rumbaugh, I. Jacobson, and E. G. Booch, The unified modeling language, 1996.

P. Rao, D. Lin, E. Bertino, N. Li, and E. J. Lobo, « An algebra for fine-grained integration of XACML policies, » dans Proceedings of the 14th ACM sympo- BIBLIOGRAPHIE sium on Access control models and technologies, série SACMAT '09, pp.63-72, 2009.

C. Snook and M. Butler, U2B -A tool for translating UML-B models into B, » dans UML-B Specification for Proven Embedded Systems Design, J. Mermet, éditeur, 2004.

C. Snook, M. Butler, and «. Uml-b, UML-B, ACM Transactions on Software Engineering and Methodology, vol.15, issue.1, pp.92-122, 2006.
DOI : 10.1145/1125808.1125811

M. Said, M. Butler, and C. Snook, Language and Tool Support for Class and State Machine Refinement in UML-B, » dans FM 2009 : Formal Methods , série Lecture Notes in Computer Science, A. Cavalcanti et D. Dams, éditeurs, pp.579-595, 2009.

R. Sandhu, E. Coyne, and H. Feinstein, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

R. Sandhu and Q. Munawer, « How to do discretionary access control using roles, » dans Proceedings of the third ACM workshop on Role-based access control, série RBAC '98, pp.47-54, 1998.

E. Sekerinski and R. Zurob, Translating Statecharts to B, Lecture Notes in Computer Science, vol.2335, pp.128-144, 2002.
DOI : 10.1007/3-540-47884-1_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.2394

M. Toahchoodee, I. Ray, K. Anastasakis, and G. Georg, Bordbar, « Ensuring spatio-temporal access control for real-world applications, dans Proceedings of the 14th ACM symposium on Access control models and technologies , série SACMAT '09, pp.13-22, 2009.