M. Clavel, All About Maude -A High-Performance Logical Framework, How to Specify, Program and Verify Systems in Rewriting Logic, LNCS, vol.4350, 2007.

M. Colombo, F. Martinelli, I. Matteucci, M. P. Petrocchi, and J. Meseguer, Context-Aware Analysis of Data Sharing Agreements, 2010 Third International Conference on Advances in Human-Oriented and Personalized Mechanisms, Technologies and Services, pp.1-2, 2007.
DOI : 10.1109/CENTRIC.2010.17

M. Alturki and J. Meseguer, PVeStA: A Parallel Statistical Model Checking and Quantitative Analysis Tool, Proceedings of CALCO11: The 4th International Conference on Algebra and Coalgebra in Computer Science, 2011.
DOI : 10.1007/978-3-642-22944-2_28

C. Natural-resources, Best practices for sharing sensitive environmental geospatial data, www.geoconnections.org, 2010.

. Us-fire-administration, Critical infrastructure protection ? information sharing and analysis center, 2012.

M. Abadi, Logic in access control, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings., p.228, 2003.
DOI : 10.1109/LICS.2003.1210062

J. Bicarregui, Towards Modelling Obligations in Event-B, In: ABZ, pp.181-194, 2008.
DOI : 10.1007/978-3-540-87603-8_15

URL : https://researchportal.port.ac.uk/portal/files/99917/ABZ08-v10.pdf

A. Arenas, An Event-B Approach to Data Sharing Agreements, In: Integrated Formal Methods, vol.12, issue.2, pp.28-42, 2010.
DOI : 10.1007/11961635_2

URL : https://hal.archives-ouvertes.fr/inria-00525098

Q. Ni, Privacy-aware Role-based Access Control, ACM Transactions on Information and System Security, vol.13, 2010.
DOI : 10.1109/msp.2009.102

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.92.566

D. Nicola, R. Ferrari, G. L. Pugliese, and R. , Programming Access Control: The Klaim Experience, In: CONCUR, pp.48-65, 2000.
DOI : 10.1007/3-540-44618-4_5

R. R. Hansen, F. Nielson, H. R. Nielson, and C. W. Probst, Static Validation of Licence Conformance Policies, 2008 Third International Conference on Availability, Reliability and Security, pp.1104-1111, 2008.
DOI : 10.1109/ARES.2008.162

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.408.226

E. Scalavino, V. Gowadia, and E. C. Lupu, PAES: Policy-Based Authority Evaluation Scheme, In: DBSec, vol.15, issue.3, pp.268-282, 2009.
DOI : 10.1145/1128817.1128820

E. Scalavino, G. Russello, R. Ball, V. Gowadia, and E. C. Lupu, An opportunistic authority evaluation scheme for data security in crisis management scenarios, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010.
DOI : 10.1145/1755688.1755709

R. Craven, Expressive policy analysis with enhanced system dynamicity, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, 2009.
DOI : 10.1145/1533057.1533091

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1026.8278