S. Dawson, S. Qian, and P. Samarati, Providing Security and Interoperation of Heterogeneous Systems, Distributed and Parallel Databases, vol.8, pp.119-145, 2000.
DOI : 10.1007/978-1-4615-4461-6_5

L. Gong and X. Qian, Computational issues in secure interoperation, IEEE Transactions on Software Engineering, vol.22, issue.1, 1996.
DOI : 10.1109/32.481533

B. Shafiq, J. B. Joshi, E. Bertino, and A. Ghafoor, Secure interoperation in a multidomain environment employing RBAC policies, IEEE Transactions on Knowledge and Data Engineering, vol.17, issue.11, 2005.
DOI : 10.1109/TKDE.2005.185

A. Walvekar, M. Kelkar, M. Smith, and R. Gamble, Determining conflicts in interdomain mappings for access control, Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'06, 2006.

E. A. Oladimeji and L. Chung, Analyzing Security Interoperability during Component Integration, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06), 2006.
DOI : 10.1109/ICIS-COMSAR.2006.22

X. Wang, D. Feng, Z. Xu, and H. Hu, Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains, Lecture Notes in Computer Science, vol.4991, pp.248-262, 2008.
DOI : 10.1007/978-3-540-79104-1_18

X. Wang, J. Sun, X. Yang, C. Huang, and D. Wu, Security Violation Detection for RBAC Based Interoperation in Distributed Environment, IEICE Transactions on Information and Systems, vol.91, issue.5, pp.1447-1456, 2008.
DOI : 10.1093/ietisy/e91-d.5.1447

P. Bonatti, S. D. Vimercati, and P. Samarati, An algebra for composing access control policies, ACM Transactions on Information and System Security, vol.5, issue.1, 2002.
DOI : 10.1145/504909.504910

E. Lupu and M. Sloman, Conflicts in policy-based distributed systems management, IEEE Transactions on Software Engineering, vol.25, issue.6, pp.852-869, 1999.
DOI : 10.1109/32.824414

J. Joshi, E. Bertino, and A. Ghafoor, Temporal hierarchies and inheritance semantics for GTRBAC, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.74-83, 2002.
DOI : 10.1145/507711.507724

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.6080

S. I. Gavrila and J. F. Barkley, Formal specification for role based access control user/role and role/role relationship management, Proceedings of the third ACM workshop on Role-based access control , RBAC '98, 1998.
DOI : 10.1145/286884.286902

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.3385

H. Huang, Enhancing the Property-Preserving Petri Net Process Algebra for Component-based System Design (with Application to Designing Multi-agent Systems and Manufacturing Systems), 2004.

W. M. Mak, Verifying Property Preservation for Component-based Software Systems (A Petri-net Based Methodology), 2001.

B. Shafiq, A. Masood, J. Joshi, and A. Ghafoor, A Role-Based Access Control Policy Verification Framework for Real-Time Systems, 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, 2005.
DOI : 10.1109/WORDS.2005.11

K. H. Mortensen, Automatic Code Generation Method Based on Coloured Petri Net Models Applied on an Access Control System, Lecture Notes in Computer Science, vol.1825, pp.367-386, 2000.
DOI : 10.1007/3-540-44988-4_21

K. Knorr, Dynamic access control through Petri net workflows, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), pp.159-167, 2000.
DOI : 10.1109/ACSAC.2000.898869

Z. L. Zhang, F. Hong, and J. G. Liao, Modeling Chinese Wall Policy Using Colored Petri Nets, The Sixth IEEE International Conference on Computer and Information Technology (CIT'06), 2006.
DOI : 10.1109/CIT.2006.123

Z. L. Zhang, F. Hong, and H. J. Xiao, Verification of Strict Integrity Policy via Petri Nets, 2006 International Conference on Systems and Networks Communications (ICSNC'06), 2006.
DOI : 10.1109/ICSNC.2006.76

K. Juszczyszyn, Verifying enterprise's mandatory access control policies with coloured Petri nets, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003., 2003.
DOI : 10.1109/ENABL.2003.1231405

Y. Deng, J. C. Wang, J. Tsai, and K. Beznosov, An approach for modeling and analysis of security system architectures, IEEE Transactions on Knowledge and Data Engineering, vol.15, issue.5, pp.1099-1119, 2003.
DOI : 10.1109/TKDE.2003.1232267

T. Murata, Petri nets: Properties, analysis and applications, Proceedings of IEEE, pp.541-580, 1985.
DOI : 10.1109/5.24143

K. Jensen, Coloured petri nets: Basic concepts, analysis methods and practical use, 1997.

K. Jensen, Coloured Petri Nets: A High Level Language for System Design and Analysis, DAIMI Report Series, vol.19, issue.338, pp.342-416, 1991.
DOI : 10.7146/dpb.v19i338.6569

R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network flows: Theory, algorithms, and applications, Network Flows: Theory, Algorithms , and Applications, 1993.

H. Huang, H. Kirchner, S. Liu, and W. Wu, Handling inheritance violation for secure interoperation of heterogeneous systems, International Journal of Security and Networks, vol.4, issue.4, 2009.
DOI : 10.1504/IJSN.2009.028669

URL : https://hal.archives-ouvertes.fr/inria-00433391

L. R. Ford and D. R. Fulkerson, Maximal flow through a network, Journal canadien de math??matiques, vol.8, issue.0, pp.399-404, 1956.
DOI : 10.4153/CJM-1956-045-5

A. Goldberg and R. Tarjan, A new approach to the maximum-flow problem, Journal of the ACM, vol.35, issue.4, pp.921-940, 1988.
DOI : 10.1145/48014.61051

R. A. Brualdi, Matchings in bipartite graph, Introductory Combinatorics, 2004.

Z. Li and M. Zhou, Elementary Siphons of Petri Nets and Their Application to Deadlock Prevention in Flexible Manufacturing Systems, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol.34, issue.1, pp.34-38, 2004.
DOI : 10.1109/TSMCA.2003.820576

Z. Li and N. Wei, Deadlock control of flexible manufacturing systems via invariant???controlled elementary siphons of petri nets, The International Journal of Advanced Manufacturing Technology, vol.7, issue.1-2, pp.24-35, 2007.
DOI : 10.1007/s00170-006-0452-3

H. Huang, J. Li, and W. Zhou, Deadlock-free design of jsp with multiresource sharing, Proceedings of the International Conference on Computer and Electrical Engineering, 2008.

J. Liu, Y. Itoh, I. Miyazawa, and T. Sekiguchi, A research on Petri net properties using transitive matrix, IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028), pp.888-893, 1999.
DOI : 10.1109/ICSMC.1999.814209

L. Jiao, H. Huang, and T. Y. Chueng, PROPERTY-PRESERVING COMPOSITION BY PLACE MERGING, Journal of Circuits, Systems and Computers, vol.14, issue.04, pp.793-812, 2005.
DOI : 10.1142/S021812660500260X