V. Zacharias, Development and Verification of Rule Based Systems ??? A Survey of Developers, Lecture Notes in Computer Science, vol.23, issue.3, pp.6-16, 2008.
DOI : 10.1007/978-3-540-77442-6_7

F. Coenen, B. Eaglestone, and M. J. Ridley, Verification, validation, and integrity issues in expert and database systems: Two perspectives, International Journal of Intelligent Systems, vol.4, issue.3, pp.425-447, 2001.
DOI : 10.1007/978-1-4471-3225-7_16

URL : http://www.csc.liv.ac.uk/~frans/CurrentResearch/VandV/../../PostScriptFiles/intSysJo.ps

A. Paschke, Verification, validation and integrity of distributed and interchanged rule based policies and contracts in the semantic web, Semantic Web, 2nd International Semantic Web Policy Workshop (SWPW'06), CEUR-WS.org, 2006.

W. Han and C. Lei, A survey on policy languages in network and security management, Computer Networks, vol.56, issue.1, pp.477-489, 2012.
DOI : 10.1016/j.comnet.2011.09.014

A. Hanamsagar, N. Jane, B. Borate, A. Wasvand, and S. Darade, Firewall anomaly management: A survey, International Journal of Computer Applications, vol.105, issue.18, pp.1-5, 2014.

M. Aqib and R. A. Shaikh, Analysis and Comparison of Access Control Policies Validation Mechanisms, International Journal of Computer Network and Information Security, vol.7, issue.1, pp.54-69, 2015.
DOI : 10.5815/ijcnis.2015.01.08

D. Lin, P. Rao, E. Bertino, N. Li, and J. Lobo, EXAM: a comprehensive environment for the analysis of access control policies, International Journal of Information Security, vol.9, issue.3, pp.253-273, 2010.
DOI : 10.1007/s10207-010-0106-1

J. Hwang, T. Xie, and V. C. Hu, Detection of Multiple-Duty-Related Security Leakage in Access Control Policies, 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement, pp.65-74, 2009.
DOI : 10.1109/SSIRI.2009.63

URL : http://csrc.nist.gov/groups/SNS/acpt/documents/jhwang4_ssiri09_final.pdf

C. Montangero, S. Reiff-marganiec, and L. Semini, Logic-based conflict detection for distributed policies, Fundamantae Informatica, vol.89, issue.4, pp.511-538, 2008.

J. Y. Halpern and V. Weissman, Using First-Order Logic to Reason about Policies, ACM Transactions on Information and System Security, vol.11, issue.4, pp.1-41, 2008.
DOI : 10.1145/1380564.1380569

URL : http://arxiv.org/pdf/cs/0601034

R. Craven, J. Lobo, J. Ma, A. Russo, E. C. Lupu et al., Expressive policy analysis with enhanced system dynamicity, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.239-250, 2009.
DOI : 10.1145/1533057.1533091

URL : http://spiral.imperial.ac.uk/bitstream/10044/1/10259/2/asiaccs.pdf

F. Turkmen, J. Den-hartog, S. Ranise, and N. Zannone, Analysis of XACML Policies with SMT, Principles of Security and Trust, pp.115-134, 2015.
DOI : 10.1007/978-3-662-46666-7_7

URL : https://pure.tue.nl/ws/files/4041091/585148886171705.pdf

Q. Ni, E. Bertino, J. Lobo, C. Brodie, C. M. Karat et al., Privacy-aware role-based access control, ACM Transactions on Information and System Security, vol.13, issue.3, pp.1-2431, 2010.
DOI : 10.1145/1805974.1805980

M. A. Neri, M. Guarnieri, E. Magri, S. Mutti, and S. Paraboschi, Conflict detection in security policies using Semantic Web technology, 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL), pp.1-6, 2012.
DOI : 10.1109/ESTEL.2012.6400092

A. Armando and S. Ranise, Automated and Efficient Analysis of Role-Based Access Control with Attributes, Data and Applications Security and Privacy XXVI, pp.25-40, 2012.
DOI : 10.1109/ICWS.2005.25

URL : https://hal.archives-ouvertes.fr/hal-01534765

H. Hu, G. J. Ahn, and K. Kulkarni, Discovery and Resolution of Anomalies in Web Access Control Policies, IEEE Transactions on Dependable and Secure Computing, vol.10, issue.6, pp.341-354, 2013.
DOI : 10.1109/TDSC.2013.18

URL : http://sefcom.asu.edu/publications/discovery-resolution-anomalies-tdsc2013.pdf

R. A. Shaikh, K. Adi, and L. Logrippo, A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets, International Journal of Information Security, vol.69, issue.2, pp.91-113, 2017.
DOI : 10.1016/0165-0114(94)00229-Z

F. Deng and L. Y. Zhang, Elimination of policy conflict to improve the PDP evaluation performance, Journal of Network and Computer Applications, vol.80, pp.45-57, 2017.
DOI : 10.1016/j.jnca.2016.12.001

X. Xia, A Conflict Detection Approach for XACML Policies on Hierarchical Resources, 2012 IEEE International Conference on Green Computing and Communications, pp.755-760, 2012.
DOI : 10.1109/GreenCom.2012.124

J. C. Royer and A. Santana-de-oliveira, AAL and Static Conflict Detection in Policy, 15th International Conference on Cryptology and Network Security, 2016.
DOI : 10.1109/GreenCom.2012.124

URL : https://hal.archives-ouvertes.fr/hal-01396376

M. H. Liffiton and A. Malik, Enumerating Infeasibility: Finding Multiple MUSes Quickly, Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, pp.160-175, 2013.
DOI : 10.1007/978-3-642-38171-3_11

A. Previti and J. Marques-silva, Partial MUS Enumeration, 27th AAAI Conference on Artificial Intelligence, pp.818-825, 2013.

H. Wu, Finding Achievable Features and Constraint Conflicts for Inconsistent Metamodels, 13th European Conference on Modelling Foundations and Applications, pp.179-196, 2017.
DOI : 10.1007/978-3-642-33666-9_27

K. Adi, Y. Bouzida, I. Hattak, L. Logrippo, and S. Mankovski, Typing for conflict detection in access control policies E-Technologies: Innovation in an Open World, of Lecture Notes in Business Information Processing, pp.212-226, 2009.
DOI : 10.1007/978-3-642-01187-0_17

URL : http://www.csi.uottawa.ca/~luigi/papers/09_adi_bouzida_hattak.pdf

N. Dunlop, J. Indulska, and K. Raymond, Methods for conflict resolution in policybased management systems, Enterprise Distributed Object Computing Conference, pp.98-111, 2003.

L. De-moura and N. Bjørner, Z3: An efficient SMT solver. In: Tools and Algorithms for the Construction and Analysis (TACAS), LNCS, vol.4963, pp.337-340, 2008.

K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz, Verification and change-impact analysis of access-control policies, International Conference on Software Engineering, 2005.
DOI : 10.1145/1062455.1062502