M. Abadi and L. Lamport, The existence of refinement mappings, Theoretical Computer Science, vol.81, issue.2, pp.253-284, 1991.

J. Abrial, The B-Book: Assigning Programs to Meanings, 1996.
DOI : 10.1017/CBO9780511624162

J. B. Abrial, B#: Toward a Synthesis between Z and B, Formal Specification and Development in Z and B (ZB 2003), volume 2651 of Lecture Notes in Computer Science, pp.168-177, 2003.
DOI : 10.1007/3-540-44880-2_12

J. Abrial, D. Cansell, and D. Méry, Refinement and Reachability in Event_B, Formal Specification and Development in Z and B (ZB 2005), pp.222-241, 2005.
DOI : 10.1007/11415787_14

URL : https://hal.archives-ouvertes.fr/inria-00001245

J. Abrial and L. Mussat, Introducing dynamic constraints in B, Advances in the Development and the Use of the B Method, pp.83-128, 1998.
DOI : 10.1007/BFb0053357

A. Arnold, A. Vincent, and I. Walukiewicz, Games for synthesis of controllers with partial observation, Theoretical Computer Science, vol.303, issue.1, pp.7-34, 2003.
DOI : 10.1016/S0304-3975(02)00442-5

R. Back and J. Wright, Refinement calculus?A systematic introduction, 1998.

R. Back and Q. Xu, Refinement of fair action systems, Acta Informatica, vol.35, issue.2, pp.131-165, 1998.
DOI : 10.1007/s002360050116

S. Benferhat, R. Baida, and F. Cuppens, A stratification-based approach for handling conflicts in access control, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, 2003.
DOI : 10.1145/775412.775437

E. Bertino, B. Catania, E. Ferrari, and P. Perlasca, A logical framework for reasoning about access control models, ACM Transactions on Information and System Security, vol.6, issue.1, pp.71-127, 2003.
DOI : 10.1145/605434.605437

F. Cuppens, N. Cuppens-boulahia, and J. Garcia, Misconfiguration management of network security components, IASTED International Conference on Communication, Network, and Information Security, 2005.

F. Cuppens, N. Cuppens-boulahia, and A. Mì-ege, Inheritance hierarchies in the or-bac model and application in a network environment, Proc. Foundations of Computer Security (FCS04), pp.41-60, 2004.

P. Dimitar, M. Guelev, P. Ryan, and . Schobbens, Model-checking access control policies, Proc. 7th Intl. Conf. Information Security, pp.219-230, 2004.

J. Jürjens, Secrecy-Preserving Refinement, Intl. Symp. Formal Methods Europe, pp.135-152, 2001.
DOI : 10.1007/3-540-45251-6_8

J. Jürjens, Secure Systems Development with UML, 2004.

A. Kalam, R. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003.
DOI : 10.1109/POLICY.2003.1206966

URL : https://hal.archives-ouvertes.fr/hal-01483818

M. Koch, L. V. Mancini, and F. Parisi-presicce, Graph-based specification of access control policies, Journal of Computer and System Sciences, vol.71, issue.1, pp.1-33, 2005.
DOI : 10.1016/j.jcss.2004.11.002

L. Lamport, The temporal logic of actions, ACM Transactions on Programming Languages and Systems, vol.16, issue.3, pp.872-923, 1994.
DOI : 10.1145/177492.177726

J. Misra, A logic for concurrent programming: Safety and progress, Journal of Computer and Software Engineering, vol.3, issue.2, pp.239-300, 1995.

R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

N. Zhang, M. Ryan, and D. P. Guelev, Evaluating Access Control Policies Through Model Checking, Proc. 8th Intl. Conf. Information Security, pp.446-460, 2005.
DOI : 10.1007/11556992_32