Providing Security and Interoperation of Heterogeneous Systems, Distributed and Parallel Databases, vol.8, pp.119-145, 2000. ,
DOI : 10.1007/978-1-4615-4461-6_5
Computational issues in secure interoperation, IEEE Transactions on Software Engineering, vol.22, issue.1, 1996. ,
DOI : 10.1109/32.481533
Secure interoperation in a multidomain environment employing RBAC policies, IEEE Transactions on Knowledge and Data Engineering, vol.17, issue.11, 2005. ,
DOI : 10.1109/TKDE.2005.185
Determining conflicts in interdomain mappings for access control, Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'06, 2006. ,
Analyzing Security Interoperability during Component Integration, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06), 2006. ,
DOI : 10.1109/ICIS-COMSAR.2006.22
Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains, Lecture Notes in Computer Science, vol.4991, pp.248-262, 2008. ,
DOI : 10.1007/978-3-540-79104-1_18
Security Violation Detection for RBAC Based Interoperation in Distributed Environment, IEICE Transactions on Information and Systems, vol.91, issue.5, pp.1447-1456, 2008. ,
DOI : 10.1093/ietisy/e91-d.5.1447
An algebra for composing access control policies, ACM Transactions on Information and System Security, vol.5, issue.1, 2002. ,
DOI : 10.1145/504909.504910
Conflicts in policy-based distributed systems management, IEEE Transactions on Software Engineering, vol.25, issue.6, pp.852-869, 1999. ,
DOI : 10.1109/32.824414
Temporal hierarchies and inheritance semantics for GTRBAC, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.74-83, 2002. ,
DOI : 10.1145/507711.507724
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.6080
Formal specification for role based access control user/role and role/role relationship management, Proceedings of the third ACM workshop on Role-based access control , RBAC '98, 1998. ,
DOI : 10.1145/286884.286902
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.3385
Enhancing the Property-Preserving Petri Net Process Algebra for Component-based System Design (with Application to Designing Multi-agent Systems and Manufacturing Systems), 2004. ,
Verifying Property Preservation for Component-based Software Systems (A Petri-net Based Methodology), 2001. ,
A Role-Based Access Control Policy Verification Framework for Real-Time Systems, 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, 2005. ,
DOI : 10.1109/WORDS.2005.11
Automatic Code Generation Method Based on Coloured Petri Net Models Applied on an Access Control System, Lecture Notes in Computer Science, vol.1825, pp.367-386, 2000. ,
DOI : 10.1007/3-540-44988-4_21
Dynamic access control through Petri net workflows, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), pp.159-167, 2000. ,
DOI : 10.1109/ACSAC.2000.898869
Modeling Chinese Wall Policy Using Colored Petri Nets, The Sixth IEEE International Conference on Computer and Information Technology (CIT'06), 2006. ,
DOI : 10.1109/CIT.2006.123
Verification of Strict Integrity Policy via Petri Nets, 2006 International Conference on Systems and Networks Communications (ICSNC'06), 2006. ,
DOI : 10.1109/ICSNC.2006.76
Verifying enterprise's mandatory access control policies with coloured Petri nets, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003., 2003. ,
DOI : 10.1109/ENABL.2003.1231405
An approach for modeling and analysis of security system architectures, IEEE Transactions on Knowledge and Data Engineering, vol.15, issue.5, pp.1099-1119, 2003. ,
DOI : 10.1109/TKDE.2003.1232267
Petri nets: Properties, analysis and applications, Proceedings of IEEE, pp.541-580, 1985. ,
DOI : 10.1109/5.24143
Coloured petri nets: Basic concepts, analysis methods and practical use, 1997. ,
Coloured Petri Nets: A High Level Language for System Design and Analysis, DAIMI Report Series, vol.19, issue.338, pp.342-416, 1991. ,
DOI : 10.7146/dpb.v19i338.6569
Network flows: Theory, algorithms, and applications, Network Flows: Theory, Algorithms , and Applications, 1993. ,
Handling inheritance violation for secure interoperation of heterogeneous systems, International Journal of Security and Networks, vol.4, issue.4, 2009. ,
DOI : 10.1504/IJSN.2009.028669
URL : https://hal.archives-ouvertes.fr/inria-00433391
Maximal flow through a network, Journal canadien de math??matiques, vol.8, issue.0, pp.399-404, 1956. ,
DOI : 10.4153/CJM-1956-045-5
A new approach to the maximum-flow problem, Journal of the ACM, vol.35, issue.4, pp.921-940, 1988. ,
DOI : 10.1145/48014.61051
Matchings in bipartite graph, Introductory Combinatorics, 2004. ,
Elementary Siphons of Petri Nets and Their Application to Deadlock Prevention in Flexible Manufacturing Systems, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol.34, issue.1, pp.34-38, 2004. ,
DOI : 10.1109/TSMCA.2003.820576
Deadlock control of flexible manufacturing systems via invariant???controlled elementary siphons of petri nets, The International Journal of Advanced Manufacturing Technology, vol.7, issue.1-2, pp.24-35, 2007. ,
DOI : 10.1007/s00170-006-0452-3
Deadlock-free design of jsp with multiresource sharing, Proceedings of the International Conference on Computer and Electrical Engineering, 2008. ,
A research on Petri net properties using transitive matrix, IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028), pp.888-893, 1999. ,
DOI : 10.1109/ICSMC.1999.814209
PROPERTY-PRESERVING COMPOSITION BY PLACE MERGING, Journal of Circuits, Systems and Computers, vol.14, issue.04, pp.793-812, 2005. ,
DOI : 10.1142/S021812660500260X