An access control model supporting periodicity constraints and temporal reasoning, ACM Transactions on Database Systems, vol.23, issue.3, pp.231-285, 1998. ,
DOI : 10.1145/293910.293151
An algebraic-functional framework for distributed access control, 2008 Third International Conference on Risks and Security of Internet and Systems, 2008. ,
DOI : 10.1109/CRISIS.2008.4757458
Integrity considerations for secure computer systems Secure Computer Systems: a Mathematical Model Secure Computer Systems: a Mathematical Model Secure computer systems: A mathematical model, volume ii The chinese wall security policy Driving and monitoring provisional trust negotiation with metapolicies, Proceedings of PPDP'08 II), MITRE Corp. Proc. IEEE Symposium on Security and Privacy Proceedings IEEE International Workshop on Policies for Distributed Systems and NetworksBS02] P.A. Bonatti and P. Samarati. A uniform framework for regulating service access and information release on the web, pp.239-263229, 1973. ,
Analyzing consistency of security policies A security model with non-atomic actions and deadlines Rewrite based specification of access control policies, IEEE Symposium on Security and Privacy CSFWCMO08] Horatiu Cirstea 3rd International Workshop on Security and Rewriting Techniques - SecRet'08, pp.103-112, 1997. ,
Specifying and Reasoning About Dynamic Access-Control Policies, Lecture Notes in Computer Science, vol.4130, pp.632-646, 2006. ,
DOI : 10.1007/11814771_51
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.8098
Modular Access Control Via Strategic Rewriting, Proceedings of 12th European Symposium On Research In Computer Security (ESORICS'07), 2007. ,
DOI : 10.1007/978-3-540-74835-9_38
URL : https://hal.archives-ouvertes.fr/inria-00185697
Weaving rewrite-based access control policies Fundamentals of Algebraic Specification I A mathematical introduction to logic A formal comparison of the bell & lapadula and rbac models, Proceedings of the 2007 ACM workshop on Formal methods in security engineering Fourth International Symposium on Information Assurance and Security (IAS'08), pp.71-80, 1972. ,
Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976. ,
DOI : 10.1145/360303.360333
Using first-order logic to reason about policies, CSFW, pp.187-201, 2003. ,
Trust in LORA: Towards a Formal Definition of Trust in BDI Agents, Proceedings of the Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis FCS-ARSPA'06JSSS01] Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies, pp.458-463, 2001. ,
DOI : 10.1007/11893004_59
Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003. ,
DOI : 10.1109/POLICY.2003.1206966
URL : https://hal.archives-ouvertes.fr/hal-01483818
Deduction with symbolic constraints, pp.9-52, 1990. ,
URL : https://hal.archives-ouvertes.fr/inria-00077103
Analysis of Rewrite-Based Access Control Policies, Security and Rewriting Techniques, 3rd International Workshop Secret'08, volume informal proceedings, pp.37-51, 2008. ,
DOI : 10.1016/j.entcs.2009.02.072
URL : https://hal.archives-ouvertes.fr/inria-00433409
Datalog with constraints: A foundation for trust management languages A model-based approach to integrating security policies for embedded devices Role-based access control models, PADL ACM EMSOFT, pp.58-7338, 1996. ,