ConSpec ??? A formal language for policy specification, Science of Computer Programming, vol.74, issue.1-2, pp.2-12, 2008. ,
DOI : 10.1016/j.scico.2008.09.004
Interface automata, ACM Proceedings of the 8th European software engineering conference, 2001. ,
Usage automata In Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, LNCS, vol.5511, pp.52-69, 2009. ,
Fine Grained Access Control with Trust and Reputation Management for Globus, OTM Conferences, pp.1505-1515, 2007. ,
DOI : 10.1007/978-3-540-76843-2_26
Security-by-Contract-with-Trust for mobile devices, JOWUA, vol.1, issue.4, pp.75-91, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00549662
Extending Security-by-Contract with Quantitative Trust on Mobile Devices, 2010 International Conference on Complex, Intelligent and Software Intensive Systems, pp.872-877, 2010. ,
DOI : 10.1109/CISIS.2010.33
URL : https://hal.archives-ouvertes.fr/inria-00536705
Runtime monitoring for next generation Java ME platform. Computers & Security, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00458909
Trust-Driven Policy Enforcement through Gate Automata, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing ,
DOI : 10.1109/IMIS.2011.88
URL : https://hal.archives-ouvertes.fr/hal-00661572
The S3MS.NET Run Time Monitor, Electronic Notes in Theoretical Computer Science, vol.253, issue.5, pp.153-159, 2009. ,
DOI : 10.1016/j.entcs.2009.11.021
Security-by-Contract (SxC) for software and services of mobile systems. In At your service -Service-Oriented Computing from an EU Perspective, 2008. ,
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization, International Journal of Information Security, vol.6, issue.1, pp.291-314, 2009. ,
DOI : 10.1007/s10207-009-0083-4
A Fine-Grained and X.509-Based Access Control System for Globus, OTM Conferences, pp.1336-1350, 2006. ,
DOI : 10.1007/11914952_21
Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, 2005. ,
DOI : 10.1007/s10207-004-0046-8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.114.6074
Through Modeling to Synthesis of Security Automata, Electronic Notes in Theoretical Computer Science, vol.179, pp.31-46, 2007. ,
DOI : 10.1016/j.entcs.2006.08.029
On usage control for GRID systems, Future Generation Computer Systems, vol.26, issue.7, pp.1032-1042, 2010. ,
DOI : 10.1016/j.future.2009.12.005
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1853