. Formelle-d-'une-politique-de, Notre objectif final est de fournir une approche globale enmatì ere de sécurité basée politique, Nous espérons que cette approche permettra de couvrir l'ensemble des moyens apparaissant parmi les méthodes officielles de certification de la sécurité comme les Critères Communs [Critères-communs, 2005.

B. Abramsky, S. Abrial, and J. , Observation equivalence as a testing equivalence The B-Book, Journal of Theoretical Computer Science, vol.53, 1987.

A. A. Kalam, R. E. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Organization Based Access Control Policy Management : An Architecture and Approach Towards Integrated Policy-Based Management. Rapport technique, HP Laboratories. [Neumair, 1996] Neumair B. et Wies R., Case study : applying management policies to manage distributed queuing systems Role-Based Access Control Models, IEEE POLICY. IEEE International Workshop on System Management. Distributed Systems Engineering. IEEE Computer, vol.29, issue.2, pp.38-47, 1993.

D. Senn, D. Basin, and G. Et-caronni, Firewall Conformance Testing. TestCom. [Sloman, 1994] Sloman M., Policy Driven Management for Distributed Systems, Journal of Network and Systems Management, pp.333-360, 2005.
DOI : 10.1007/11430230_16

G. Vigna, T. Characterization, and . Security, Rapport technique Using a classification of Management Policies for Policy Specification and Policy Transformation, IFIP/IEEE International Symposium on Integrated Network Management, 1996.