J. Abrial, The B-book -assigning programs to meanings, 2005.

C. R. Dans, J. Ramakrishnan, and . Rehof, Tools and Algorithms for the Construction and Analysis of Systems Held as Part of the Joint European Conferences on Theory and Practice of Software, 14th International Conference Proceedings, volume 4963 de Lecture Notes in Computer Science, pp.337-340, 2008.

R. Dans-armin-biere and . Bloem, Held as Part of the Vienna Summer of Logic, 26th International Conference, CAV 2014 Proceedings, volume 8559 de Lecture Notes in Computer Science, pp.737-744, 2014.

«. Rbac and S. Rationale, A Critique of the ANSI Standard on Role-Based Access Control" ». Security Privacy, IEEE, vol.5, issue.6, pp.51-53, 2007.

N. L. Virginia, . Franqueira, and . Wieringa, « Role-Based Access Control in Retrospect, IEEE Computer, vol.45, issue.6, pp.81-88, 2012.

D. Hansen, D. Schneider, and M. Leuschel, Using B and ProB for Data Validation Projects, Proceedings ABZ 2016, pp.167-182, 2016.
DOI : 10.1007/978-3-319-33600-8_10

H. Hu and G. Ahn, Enabling verification and conformance testing for access control model, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.195-204, 2008.
DOI : 10.1145/1377836.1377867

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.682.5555

D. Jackson, Alloy: a lightweight object modelling notation, ACM Transactions on Software Engineering and Methodology, vol.11, issue.2
DOI : 10.1145/505145.505149

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.4127

D. Jackson, Software Abstractions, Logic, Language, and Analysis, 2012.

D. «. Kozen, A completeness theorem for Kleene algebras and the algebra of regular events, [1991] Proceedings Sixth Annual IEEE Symposium on Logic in Computer Science, pp.366-390, 1994.
DOI : 10.1109/LICS.1991.151646

M. Leuschel and M. J. Butler, ProB: an automated analysis toolset for the B method, International Journal on Software Tools for Technology Transfer, vol.49, issue.3, pp.185-203, 2008.
DOI : 10.1007/s10009-007-0063-9

M. Leuschel, J. Falampin, F. Fritz, and D. Plagge, Automated Property Verification for Large Scale B Models with ProB ». Formal Aspects of Computing, 31] Ninghui Li, Ji-Won Byun et Elisa Bertino. « A critique of the ANSI Standard on Role-Based Access Control, pp.683-709, 2005.
DOI : 10.1007/s00165-010-0172-1

N. Li, J. Byun, and E. Bertino, A Critique of the ANSI Standard on Role-Based Access Control, IEEE Security & Privacy Magazine, vol.5, issue.6, pp.41-49, 2007.
DOI : 10.1109/MSP.2007.158

M. Mankai and L. Logrippo, « Access control policies : Modeling and validation

N. Dans-5th and . Conference, Nouvelles Technologies de la Répartition), pp.85-91, 2005.

«. Nationell-patientöversikt, National Patient Overview) ». http://www.inera.se

C. O. Alan, R. J. Connor, and . Loomis, « Economic Analysis of Role-Based Access Control, 2010.

K. Pohl, G. Böckle, and . Frank-van-der-linden, Software Product Line Engineering, 2005.
DOI : 10.1007/3-540-28901-1

D. J. Power, M. Slaymaker, and A. C. Simpson, On Formalizing and Normalizing Role-Based Access Control Systems, The Computer Journal, vol.52, issue.3, pp.305-325, 2009.
DOI : 10.1093/comjnl/bxn016

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.617.4201

N. Qamar, Y. Ledru, and A. Idani, Validation of Security-Design Models Using Z, Proceedings of the 13th international conference on Formal methods and software engineering, pp.259-274, 2011.
DOI : 10.1007/11937807_16

URL : https://hal.archives-ouvertes.fr/hal-00860804

E. Rissanen, eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS, 2010.

G. Russello, C. Dong, and N. Dulay, Authorisation and Conflict Resolution for Hierarchical Domains, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), pp.201-210, 2007.
DOI : 10.1109/POLICY.2007.8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.7171

R. S. Sandhu, D. F. Ferraiolo, and D. R. Kuhn, The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.47-63, 2000.
DOI : 10.1145/344287.344301

G. Schmidt and T. Ströhlein, Relations and Graphs : Discrete Mathematics for Computer Scientists, EATCS Monographs on Theoretical Computer Science, 1993.
DOI : 10.1007/978-3-642-77968-8

S. Junaid-haroon and S. Khurshid, « Symbolic Execution of Alloy Models