P. Behm, P. Benoit, A. Faivre, and J. Meynadier, M??t??or: A Successful Application of B in a Large Project, FM'99 : World Congress on Formal Methods, pp.369-387, 1999.
DOI : 10.1007/3-540-48119-2_22

M. Butler, A System-Based Approach to the Formal Development of Embedded Controllers for a Railway, Design Automation for Embedded Systems, vol.6, issue.4, 2002.

F. Cuppens, N. Cuppens-boulahia, T. Sans, and A. Mige, A Formal Approach to Specify and Deploy a Network Security Policy, Formal Aspects in Security and Trust (FAST, 2004.
DOI : 10.1007/0-387-24098-5_15

V. Darmaillacq, J. Fernandez, R. Groz, L. Mounier, and J. Richier, Eléments de modélisation pour le test de politiques de sécurité, Colloque sur les RIsques et la Sécurité d'Internet et des Systèmes, 2005.

D. Denning and P. Denning, Data Security, ACM Computing Surveys, vol.11, issue.3, pp.227-249, 1979.
DOI : 10.1145/356778.356782

S. Jajodia, P. Samarati, and V. S. Subrahmanian, A logical language for expressing authorizations, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), 1997.
DOI : 10.1109/SECPRI.1997.601312

C. Jard and T. Jeron, TGV: theory, principles and algorithms, International Journal on Software Tools for Technology Transfer, vol.17, issue.4, pp.297-315, 2005.
DOI : 10.1007/s10009-004-0153-x

A. Kalam, R. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003.
DOI : 10.1109/POLICY.2003.1206966

URL : https://hal.archives-ouvertes.fr/hal-01483818

L. Lamport, The temporal logic of actions, ACM Transactions on Programming Languages and Systems, vol.16, issue.3, pp.872-923, 1994.
DOI : 10.1145/177492.177726

T. Lunt, Access control policies for database systems Database Security II: Status and Prospects, pp.41-52, 1989.

M. Masullo, Policy Management: An Architecture and Approach, IEEE First International Workshop on Systems Management, pp.13-26, 1993.

M. C. Mont, A. Baldwin, and C. Goh, POWER Prototype: Towards Integrated Policy-Based Management, 1999.

P. Samarati, S. De-capitani, and D. Vimercati, Access Control: Policies, Models, and Mechanisms, Foundations of Security Analysis and Design, pp.137-196, 2000.
DOI : 10.1007/3-540-45608-2_3

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

D. Senn, D. Basin, and G. Caronni, Firewall Conformance Testing, LNCS, vol.15, issue.1, 2005.
DOI : 10.1016/0169-7552(88)90064-5

M. Sloman, Policy driven management for distributed systems, Journal of Network and Systems Management, vol.III, issue.No. 8, pp.333-360, 1994.
DOI : 10.1007/BF02283186

G. Vigna, A Topological Characterization of TCP/IP Security, LNCS, vol.2805, 2003.
DOI : 10.1007/978-3-540-45236-2_49

T. Y. Woo and S. S. Lam, Authorization in distributed systems: a formal approach, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992.
DOI : 10.1109/RISP.1992.213272