The existence of refinement mappings, Theoretical Computer Science, vol.81, issue.2, pp.253-284, 1991. ,
The B-Book: Assigning Programs to Meanings, 1996. ,
DOI : 10.1017/CBO9780511624162
B#: Toward a Synthesis between Z and B, Formal Specification and Development in Z and B (ZB 2003), volume 2651 of Lecture Notes in Computer Science, pp.168-177, 2003. ,
DOI : 10.1007/3-540-44880-2_12
Refinement and Reachability in Event_B, Formal Specification and Development in Z and B (ZB 2005), pp.222-241, 2005. ,
DOI : 10.1007/11415787_14
URL : https://hal.archives-ouvertes.fr/inria-00001245
Introducing dynamic constraints in B, Advances in the Development and the Use of the B Method, pp.83-128, 1998. ,
DOI : 10.1007/BFb0053357
Games for synthesis of controllers with partial observation, Theoretical Computer Science, vol.303, issue.1, pp.7-34, 2003. ,
DOI : 10.1016/S0304-3975(02)00442-5
Refinement calculus?A systematic introduction, 1998. ,
Refinement of fair action systems, Acta Informatica, vol.35, issue.2, pp.131-165, 1998. ,
DOI : 10.1007/s002360050116
A stratification-based approach for handling conflicts in access control, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, 2003. ,
DOI : 10.1145/775412.775437
A logical framework for reasoning about access control models, ACM Transactions on Information and System Security, vol.6, issue.1, pp.71-127, 2003. ,
DOI : 10.1145/605434.605437
Misconfiguration management of network security components, IASTED International Conference on Communication, Network, and Information Security, 2005. ,
Inheritance hierarchies in the or-bac model and application in a network environment, Proc. Foundations of Computer Security (FCS04), pp.41-60, 2004. ,
Model-checking access control policies, Proc. 7th Intl. Conf. Information Security, pp.219-230, 2004. ,
Secrecy-Preserving Refinement, Intl. Symp. Formal Methods Europe, pp.135-152, 2001. ,
DOI : 10.1007/3-540-45251-6_8
Secure Systems Development with UML, 2004. ,
Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003. ,
DOI : 10.1109/POLICY.2003.1206966
URL : https://hal.archives-ouvertes.fr/hal-01483818
Graph-based specification of access control policies, Journal of Computer and System Sciences, vol.71, issue.1, pp.1-33, 2005. ,
DOI : 10.1016/j.jcss.2004.11.002
The temporal logic of actions, ACM Transactions on Programming Languages and Systems, vol.16, issue.3, pp.872-923, 1994. ,
DOI : 10.1145/177492.177726
A logic for concurrent programming: Safety and progress, Journal of Computer and Software Engineering, vol.3, issue.2, pp.239-300, 1995. ,
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Evaluating Access Control Policies Through Model Checking, Proc. 8th Intl. Conf. Information Security, pp.446-460, 2005. ,
DOI : 10.1007/11556992_32