An Aging World, Int. Population Reports, 2008. ,
Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003. ,
DOI : 10.1109/POLICY.2003.1206966
URL : https://hal.archives-ouvertes.fr/hal-01483818
The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.206-214, 1989. ,
DOI : 10.1109/SECPRI.1989.36295
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Modeling contextual security policies, International Journal of Information Security, vol.2, issue.3/4, 2008. ,
DOI : 10.1007/s10207-007-0051-9
URL : https://hal.archives-ouvertes.fr/hal-01207773
Formal definition and comparison of access control models, Journal of Information Assurance and Security, vol.4, issue.4, pp.372-381, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-01195856
Representation and Reasoning on ORBAC: Description Logic with Defaults and Exceptions Approach, 2008 Third International Conference on Availability, Reliability and Security, 2008. ,
DOI : 10.1109/ARES.2008.144
Proof-based design patterns, final report of the RIMEL project (ANR-06-SETI-015, 2008. ,
Definition d'un environnement formel d'expression de politiques de securite . Modele Or-BAC et extensions' PhD Dissertation in IT Security, 2005. ,
URL : https://hal.archives-ouvertes.fr/pastel-00001376
Software Abstractions Logic, Language, and Analysis, 2006. ,
Managing conflicts in goal-driven requirements engineering, IEEE Transactions on Software Engineering, vol.24, issue.11, pp.908-926, 1998. ,
DOI : 10.1109/32.730542