The B-book -assigning programs to meanings, 2005. ,
Tools and Algorithms for the Construction and Analysis of Systems Held as Part of the Joint European Conferences on Theory and Practice of Software, 14th International Conference Proceedings, volume 4963 de Lecture Notes in Computer Science, pp.337-340, 2008. ,
Held as Part of the Vienna Summer of Logic, 26th International Conference, CAV 2014 Proceedings, volume 8559 de Lecture Notes in Computer Science, pp.737-744, 2014. ,
A Critique of the ANSI Standard on Role-Based Access Control" ». Security Privacy, IEEE, vol.5, issue.6, pp.51-53, 2007. ,
« Role-Based Access Control in Retrospect, IEEE Computer, vol.45, issue.6, pp.81-88, 2012. ,
Using B and ProB for Data Validation Projects, Proceedings ABZ 2016, pp.167-182, 2016. ,
DOI : 10.1007/978-3-319-33600-8_10
Enabling verification and conformance testing for access control model, Proceedings of the 13th ACM symposium on Access control models and technologies , SACMAT '08, pp.195-204, 2008. ,
DOI : 10.1145/1377836.1377867
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.682.5555
Alloy: a lightweight object modelling notation, ACM Transactions on Software Engineering and Methodology, vol.11, issue.2 ,
DOI : 10.1145/505145.505149
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.4127
Software Abstractions, Logic, Language, and Analysis, 2012. ,
A completeness theorem for Kleene algebras and the algebra of regular events, [1991] Proceedings Sixth Annual IEEE Symposium on Logic in Computer Science, pp.366-390, 1994. ,
DOI : 10.1109/LICS.1991.151646
ProB: an automated analysis toolset for the B method, International Journal on Software Tools for Technology Transfer, vol.49, issue.3, pp.185-203, 2008. ,
DOI : 10.1007/s10009-007-0063-9
Automated Property Verification for Large Scale B Models with ProB ». Formal Aspects of Computing, 31] Ninghui Li, Ji-Won Byun et Elisa Bertino. « A critique of the ANSI Standard on Role-Based Access Control, pp.683-709, 2005. ,
DOI : 10.1007/s00165-010-0172-1
A Critique of the ANSI Standard on Role-Based Access Control, IEEE Security & Privacy Magazine, vol.5, issue.6, pp.41-49, 2007. ,
DOI : 10.1109/MSP.2007.158
« Access control policies : Modeling and validation ,
Nouvelles Technologies de la Répartition), pp.85-91, 2005. ,
National Patient Overview) ». http://www.inera.se ,
« Economic Analysis of Role-Based Access Control, 2010. ,
Software Product Line Engineering, 2005. ,
DOI : 10.1007/3-540-28901-1
On Formalizing and Normalizing Role-Based Access Control Systems, The Computer Journal, vol.52, issue.3, pp.305-325, 2009. ,
DOI : 10.1093/comjnl/bxn016
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.617.4201
Validation of Security-Design Models Using Z, Proceedings of the 13th international conference on Formal methods and software engineering, pp.259-274, 2011. ,
DOI : 10.1007/11937807_16
URL : https://hal.archives-ouvertes.fr/hal-00860804
eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS, 2010. ,
Authorisation and Conflict Resolution for Hierarchical Domains, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), pp.201-210, 2007. ,
DOI : 10.1109/POLICY.2007.8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.7171
The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.47-63, 2000. ,
DOI : 10.1145/344287.344301
Relations and Graphs : Discrete Mathematics for Computer Scientists, EATCS Monographs on Theoretical Computer Science, 1993. ,
DOI : 10.1007/978-3-642-77968-8
« Symbolic Execution of Alloy Models ,