All About Maude -A High-Performance Logical Framework, How to Specify, Program and Verify Systems in Rewriting Logic, LNCS, vol.4350, 2007. ,
Context-Aware Analysis of Data Sharing Agreements, 2010 Third International Conference on Advances in Human-Oriented and Personalized Mechanisms, Technologies and Services, pp.1-2, 2007. ,
DOI : 10.1109/CENTRIC.2010.17
PVeStA: A Parallel Statistical Model Checking and Quantitative Analysis Tool, Proceedings of CALCO11: The 4th International Conference on Algebra and Coalgebra in Computer Science, 2011. ,
DOI : 10.1007/978-3-642-22944-2_28
Best practices for sharing sensitive environmental geospatial data, www.geoconnections.org, 2010. ,
Critical infrastructure protection ? information sharing and analysis center, 2012. ,
Logic in access control, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., p.228, 2003. ,
DOI : 10.1109/LICS.2003.1210062
Towards Modelling Obligations in Event-B, In: ABZ, pp.181-194, 2008. ,
DOI : 10.1007/978-3-540-87603-8_15
URL : https://researchportal.port.ac.uk/portal/files/99917/ABZ08-v10.pdf
An Event-B Approach to Data Sharing Agreements, In: Integrated Formal Methods, vol.12, issue.2, pp.28-42, 2010. ,
DOI : 10.1007/11961635_2
URL : https://hal.archives-ouvertes.fr/inria-00525098
Privacy-aware Role-based Access Control, ACM Transactions on Information and System Security, vol.13, 2010. ,
DOI : 10.1109/msp.2009.102
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.566
Programming Access Control: The Klaim Experience, In: CONCUR, pp.48-65, 2000. ,
DOI : 10.1007/3-540-44618-4_5
Static Validation of Licence Conformance Policies, 2008 Third International Conference on Availability, Reliability and Security, pp.1104-1111, 2008. ,
DOI : 10.1109/ARES.2008.162
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.408.226
PAES: Policy-Based Authority Evaluation Scheme, In: DBSec, vol.15, issue.3, pp.268-282, 2009. ,
DOI : 10.1145/1128817.1128820
An opportunistic authority evaluation scheme for data security in crisis management scenarios, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010. ,
DOI : 10.1145/1755688.1755709
Expressive policy analysis with enhanced system dynamicity, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, 2009. ,
DOI : 10.1145/1533057.1533091
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1026.8278