A High-Level Language for Modeling Algorithms and Their Properties, 13th Brazilian Symp. on Formal Methods, 2010. ,
DOI : 10.1007/3-540-48153-2_6
URL : https://hal.archives-ouvertes.fr/inria-00537779
Persona: an online social network with user-defined privacy, SIGCOMM, 2009. ,
Trust-Based Formal Delegation Framework for Enterprise Social Networks, 2015 IEEE Trustcom/BigDataSE/ISPA, 2015. ,
DOI : 10.1109/Trustcom.2015.366
URL : https://hal.archives-ouvertes.fr/hal-01240387
Orna Grumberg, and Doron Peled. Model Checking, 1999. ,
An attributes-based access control architecture within largescale device collaboration systems using xacml, Green Communications and Networks, 2012. ,
DOI : 10.1007/978-94-007-2169-2_124
A distributed collaborative product design environment based on semantic norm model and role-based access control, Journal of Network and Computer Applications, vol.36, issue.6, 2013. ,
DOI : 10.1016/j.jnca.2013.02.018
Towards a flexible framework to support a generalized extension of xacml for spatio-temporal rbac model with reasoning ability, ICCSA, p.2013 ,
Flexible team-based access control using contexts, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, 2001. ,
DOI : 10.1145/373256.373259
URL : http://infolab.gen.auth.gr/Phd/mavridis/SACMAT2001.pdf
The oauth 2.0 authorization framework, 2012. ,
DOI : 10.17487/rfc6749
Guide to attribute based access control (abac) definition and considerations, NIST Special Publication, vol.800, p.162, 2014. ,
Analyzing web access control policies, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.677-686, 2007. ,
DOI : 10.1145/1242572.1242664
Specifying Systems, The TLA+ Language and Tools for Hardware and Software Engineers, 2002. ,
The PlusCal Algorithm Language, 6th Intl. Coll. Theoretical Aspects of Computing, 2009. ,
DOI : 10.1145/359576.359585
lightweight decentralized authorization model for inter-domain collaborations, SWS, 2007. ,
Role-based access control on the web, ACM Trans. Inf. Syst. Secur, vol.4, issue.1, pp.37-71, 2001. ,
Dynamic delegation framework for role based access control in distributed data management systems, Distributed and Parallel Databases, vol.2, issue.1, 2014. ,
DOI : 10.1145/300830.300839
Enterprise Social Networks: Status Quo of Current Research and Future Research Directions, 2016. ,
DOI : 10.1002/bltj.21648
Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management, DBSec, 1997. ,
DOI : 10.1007/978-0-387-35285-5_10
Team-based access control (tmac): a primitive for applying role-based access controls in collaborative environments, ACM Workshop on Role-Based Access Control, pp.13-19, 1997. ,
Lockr, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09, 2009. ,
DOI : 10.1145/1658939.1658959
Decentralized Composite Access Control, 2014. ,
DOI : 10.1007/978-3-642-54792-8_14
URL : http://people.inf.ethz.ch/basin/pubs/post14.pdf
Model Checking TLA+ Specifications, Correct Hardware Design and Verification Methods (CHARME'99), 1999. ,
DOI : 10.1007/3-540-48153-2_6
URL : http://www.cc.gatech.edu/fac/Pete.Manolios/pub/charme-proceedings.ps.gz
A Formal Approach for the Verification of AWS IAM Access Control Policies, 6th European Conference on Service-Oriented and Cloud Computing, pp.59-74, 2017. ,
DOI : 10.1109/ICWS.2011.97
URL : https://hal.archives-ouvertes.fr/hal-01677620
CATT: A Cloud Based Authorization Framework with Trust and Temporal Aspects, Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing ,
DOI : 10.4108/icst.collaboratecom.2014.257312
URL : https://hal.archives-ouvertes.fr/hal-01103043