, 28-STD. Trusted Computer System Evaluation Criteria. Department of Defense, 1985.

J. Ross and . Anderson, British Medical Association, et al. Security in clinical information systems, British Medical Association London, 1996.

C. Alexander, S. Ishikawa, and M. Silverstein, Joaquim Romaguera i Ramió, Max Jacobson, and Ingrid Fiksdahl-King. A pattern language, 1977.

R. Anderson and J. Lee, Jikzi: A new framework for secure publishing, Security Protocols, pp.21-36, 2000.

C. Alexander, The timeless way of building, vol.1, 1979.

G. Edward and . Amoroso, Fundamentals of computer security technology

. Ehab-s-al-shaer, H. Hazem, and . Hamed, Firewall policy advisor for anomaly discovery and rule editing, Integrated Network Management, 2003. IFIP/IEEE Eighth International Symposium on, pp.17-30, 2003.

R. Anderson, F. Stajano, and J. Lee, Security policies. Advances in Computers, vol.55, pp.185-235, 2002.

K. Beck and W. Cunningham, Using pattern languages for objectoriented programs, 1987.

J. Kenneth and . Biba, Integrity considerations for secure computer systems, DTIC Document, 1977.

E. Bell and L. J. Lapadula, Secure computer systems: Mathematical foundations, DTIC Document, 1973.

K. Arosha, E. C. Bandara, A. Lupu, and . Russo, Using event calculus to formalise policy specification and analysis, Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on, pp.26-39, 2003.

F. C. David, . Brewer, J. Michael, and . Nash, The chinese wall security policy, Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on, pp.206-214, 1989.

A. Stuart and . Boyer, SCADA: supervisory control and data acquisition. International Society of Automation, 2009.

M. Bunke and K. Sohr, An architecture-centric approach to detecting security patterns in software, Engineering Secure Software and Systems, pp.156-166, 2011.

, Context ontology for secure interoperability, 3rd International Conference on Availability, Reliability and Security (ARES'08), 2008.

S. Chaki, E. Clarke, O. Grumberg, N. Sharygina, T. Touili et al., An expressive verification framework for state/event systems, Proceedings of the 5th international conference on integrated formal methods (IFM), 2004.

S. Chaki, E. M. Clarke, J. Ouaknine, N. Sharygina, and N. Sinha, Concurrent software verification with states, events, and deadlocks, Proceedings of the 5th international conference on integrated formal methods (IFM), vol.17, pp.461-483, 2005.

S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner et al., Using model-based intrusion detection for scada networks, Proceedings of the SCADA security scientific symposium, vol.46, pp.1-12, 2007.

, Interoperabilité et cohérence de politiques de sécurité pour les systèmes auto-organisants, Thèse de doctorat, 2009.

H. Bedi, C. Simmons, S. Shiva, and D. Dasgupta, Avoidit: A cyber attack taxonomy. 9th Annual Symosium on Information Assurance (ASIA'14), p.135, 2004.

P. Luka-le-roux-ciprian-teodorov and . Dhaussy, Environment-driven reachability for timed systems : Safety verification of an aircraft landing gear system, Int. Software Tools for Technology Transfer (STTT), 2016.

Z. Drey-ciprian-teodorov, L. , L. Roux, and P. Dhaussy, Pastfree[ze] reachability analysis: reaching further with dag-directed exhaustive state-space analysis. Software Testing, Verification and Reliability (STVR), 2016.

D. David, . Clark, and . David-r-wilson, A comparison of commercial and military computer security policies, Security and Privacy, 1987 IEEE Symposium on, pp.184-184, 1987.

P. Dhaussy, F. Boniol, J. Roger, and L. Leroux, Improving model checking with context modelling, Advances in Software Engineering, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00738735

N. Delessy-gassant, E. B. Fernandez, S. Rajput, and M. M. Larrondo-petrie, Patterns for application firewalls, Proceedings of the Pattern Languages of Programs (PLoP) Conference, 2004.

N. Dunlop, J. Indulska, and K. Raymond, Dynamic conflict detection in policy-based management systems, Enterprise Distributed Object Computing Conference, 2002. EDOC'02. Proceedings. Sixth International, pp.15-26, 2002.

J. Dreier, M. Puys, M. Potet, P. Lafourcade, and J. Roch, Formally verifying flow properties in industrial systems, SECRYPT 2017, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01527913

P. Dhaussy, J. Roger, and F. Boniol, Reducing state explosion with context modeling for model-checking, High-Assurance Systems Engineering (HASE), pp.130-137, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00636878

P. Dhaussy and C. Teodorov, Context-aware verification of a landing gear system, Conference ABZ'14, Case Study Track, pp.2-6, 2014.

E. Fernandez-buglioni, Security patterns in practice: designing secure architectures using software patterns, 2013.

, Nora Cuppens-Boulahia Frédéric Cuppens. Modeling contextual security policies, International Journal of Information Security, vol.7, issue.4, 2008.

, High level conflict management strategies in advanced access control models, Electronic Notes in Theoretical Computer Science (ENTCS), vol.186, pp.1571-0661, 2007.

A. Igor-nai-fovino, M. Coletta, and . Masera, Taxonomy of security solutions for the scada sector, Project ESCORTS Deliverable, vol.2, 2010.

B. Eduardo and . Fernandez, Metadata and authorization patterns, 2000.

B. Eduardo and M. Fernandez, Designing secure scada systems using security patterns, System Sciences (HICSS), 2010 43rd Hawaii International Conference on, pp.1-8, 2010.

B. Eduardo, M. M. Fernandez, N. Larrondo-petrie, and . Seliya, Nelly Delessy-Gassant, and Markus Schumacher. A pattern language for firewalls. M. Schumacher, et al, 2003.

B. Eduardo, R. Fernandez, and . Pan, A pattern language for security models, proceedings of PLOP, vol.1, 2001.

E. Gamma, Design patterns: elements of reusable object-oriented software, 1995.

M. Hafiz, P. Adamczyk, and R. E. Johnson, Growing a pattern language (for security), Proceedings of the ACM international symposium on New ideas, new paradigms, and reflections on programming and software, pp.139-158, 2012.

S. A. Vinay-m-igure, R. Laughter, and . Williams, Security issues in scada networks, Computers & Security, vol.25, issue.7, pp.498-506, 2006.

K. Juszczyszyn, Verifying enterprise's mandatory access control policies with coloured petri nets, Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003. WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on, pp.184-189, 2003.

L. Ronald and . Krutz, Securing SCADA systems, 2005.

R. Kowalski and M. Sergot, A logic-based calculus of events, Foundations of knowledge base management, pp.23-55, 1989.

E. Kindler and T. Vesper, Estl: A temporal logic for events and states, Proceedings of the 19th International Conference on the Application and Theory of Petri Nets (ICATPN), vol.1420, pp.365-383, 1998.

C. Emil, M. Lupu, and . Sloman, Conflicts in policy-based distributed systems management. Software Engineering, IEEE Transactions on, vol.25, issue.6, pp.852-869, 1999.

M. Pascal-lafourcade-maxime-puys and . Potet, Formal analysis of security properties on the opc-ua scada protocol, SAFE-COMP'16, 2016.

J. Ma, G. Xu, Y. Yang, and Y. Ji, Information system security function validating using model checking, Computer Engineering and Technology (ICCET), 2010 2nd International Conference on, vol.1, pp.1-517, 2010.

M. Puys, M. Potet, and A. Khaled, Generation of applicative attacks scenarios against industrial systems, Foundations and Practice of Security -10th International Symposium, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01615534

M. Puys, Sécurité des systèmes industriels: filtrage applicatif et recherche de scénarios d'attaques, 2018.

J. Rouzaud-cornabas, Formalisation de propriétés de sécurité pour la protection des systèmes d'exploitation, 2010.

D. , R. Sandhu, and R. Kuhn, Role-based access control. American national standard for information technology : ANSI INCITS 359-2004, 2004.

F. Stajano and R. Anderson, The resurrecting duckling: Security issues in ad-hoc wireless networks, Security Protocols, 7th International Workshop Proceedings, 1999.

. Sfbh-+-13]-markus, E. Schumacher, D. Fernandez-buglioni, F. Hybertson, P. Buschmann et al., Security Patterns: Integrating security and systems engineering, 2013.

E. Stipidis, Vetronics system integration, pp.401-415, 2006.

L. Leroux, C. Teodorov, and P. Dhaussy, Context-aware verification of a cruise-control system, 4th International Conference on Model and Data Engineering (MEDI), 2014.
URL : https://hal.archives-ouvertes.fr/hal-01203701

C. Chee-wooi-ten, G. Liu, and . Manimaran, Vulnerability assessment of cybersecurity for scada systems, IEEE Transactions on Power Systems, vol.23, issue.4, pp.1836-1846, 2008.

R. Wassermann, H. C. Betty, and . Cheng, Security patterns, Michigan State University, PLoP Conf. Citeseer, 2003.

M. Weiss and H. Mouratidis, Selecting security patterns that fulfill security requirements, International Requirements Engineering, pp.169-172, 2008.

J. Yoder and J. Barcalow, Architectural patterns for enabling application security, vol.51, p.61801, 1997.

J. Yoder and J. Barcalow, Architectural patterns for enabling application security, vol.51, p.61801, 1998.

N. Yoshioka, H. Washizaki, and K. Maruyama, A survey on security patterns, Progress in informatics, vol.5, issue.5, pp.35-47, 2008.

B. Zhu, A. Joseph, and S. Sastry, A taxonomy of cyber attacks on scada systems, Internet of things (iThings/CPSCom), 2011 international conference on and 4th international conference on cyber, physical and social computing, pp.380-388, 2011.

B. Zhu and S. Sastry, Scada-specific intrusion detection/prevention systems: a survey and taxonomy, Proceedings of the 1st Workshop on Secure Control Systems (SCS), 2010. Annexe : Publications Les publications rédigées durant ce travail sont listées ci-dessous

F. Obeid and P. Dhaussy, Validation formelle d'implantation de patrons de sécurité: Application aux SCADA, Conf. Approches Formelles dans l'Assistance au Développement de Logiciels (AFADL'16), 2016.

F. Obeid and P. Dhaussy, Model Checking of Security Patterns Combinations: Application to SCADA, Conf. RESSI'17, 2017.

F. Obeid and P. Dhaussy, RITA Secure Communication Protocol: Application to SCADA, 8th International Conference on Network and Communications Security (NCS 2016), 2016.

F. Obeid and P. Dhaussy, A Secured Data Communication Protocol, Conf. A Connected Ocean (ACO 2016), 2016.

P. ?-fadi-obeid and . Dhaussy, Validation formelle d'architecture logicielle basée sur des patrons de sécurité : Application aux SCADA. Conférence AFADL'18, Grenoble, pp.13-15, 2018.

P. ?-fadi-obeid and . Dhaussy, Model-checking for Secured Component Implementation, 17th International Conference on Security and Management (SAM'18), 2018.

P. ?-fadi-obeid and . Dhaussy, Secure Communication Protocol: Application to Large Number of Distributed Sensors, 17th International Conference on Security and Management (SAM'18), 2018.

F. Obeid and P. Dhaussy, Formal Verification of Security Pattern Composition : Application to SCADA, Soumise à la revue : Computing and Informatics

U. Dépôt-d'une-enveloppe and . Soleau, , 2016.