Term Rewriting and All That, 1998. ,
Term Rewriting for Access Control, Proceedings of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'2006), 2006. ,
DOI : 10.1145/984334.984339
Composing security policies with polymer, PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, pp.305-314, 2005. ,
.secure computer systems: Mathematical foundations, Mitre Corporation, 1974. ,
Introduction to Computer Security, 2004. ,
Specifying Authentication Protocols Using Rewriting and Strategies, PADL, pp.138-152, 1990. ,
DOI : 10.1007/3-540-45241-9_10
URL : https://hal.archives-ouvertes.fr/inria-00100509
Maude: specification and programming in rewriting logic, Theoretical Computer Science, vol.285, issue.2, pp.187-243, 2002. ,
DOI : 10.1016/S0304-3975(01)00359-0
Policies, Models, and Languages for Access Control, Lecture Notes in Computer Science, vol.3433, pp.225-237, 2005. ,
DOI : 10.1007/978-3-540-31970-2_18
Security policy in a declarative style, Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming , PPDP '05, pp.153-163, 2005. ,
DOI : 10.1145/1069774.1069789
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
DOI : 10.1109/SP.1982.10014
On termination and confluence properties of disjoint and constructor-sharing conditional rewrite systems, Theoretical Computer Science, vol.165, issue.1, pp.97-131, 1996. ,
DOI : 10.1016/0304-3975(96)00042-4
Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001. ,
DOI : 10.1145/383891.383894
A sufficient condition for the termination of the direct sum of term rewriting systems, [1989] Proceedings. Fourth Annual Symposium on Logic in Computer Science, pp.396-401, 1989. ,
DOI : 10.1109/LICS.1989.39194
Completeness of combinations of constructor systems, Lecture Notes in Computer Science, vol.488, pp.188-199, 1991. ,
DOI : 10.1007/3-540-53904-2_96
Extensible access control markup language (xacml) version 2.0, OASIS, 2005. ,
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming, MoDELS, pp.537-552, 2005. ,
DOI : 10.1007/11557432_41
On termination of the direct sum of term-rewriting systems, Information Processing Letters, vol.26, issue.2, pp.65-70, 1987. ,
DOI : 10.1016/0020-0190(87)90039-1
URL : https://hal.archives-ouvertes.fr/inria-00075874
Mechanical Verification of an Ideal Incremental ABR Conformance Algorithm, J. Autom. Reasoning, vol.30, pp.53-177, 2003. ,
DOI : 10.1007/10722167_27
URL : https://hal.archives-ouvertes.fr/inria-00099167
Enforceable security policies, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], pp.30-50, 2000. ,
DOI : 10.1109/FITS.2003.1264930
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1853
Counterexamples to termination for the direct sum of term rewriting systems, Information Processing Letters, vol.25, issue.3, pp.141-143, 1986. ,
DOI : 10.1016/0020-0190(87)90122-0
On the Church-Rosser property for the direct sum of term rewriting systems, Journal of the ACM, vol.34, issue.1, pp.128-143, 1987. ,
DOI : 10.1145/7531.7534