C. [. Bertino, E. Bettini, P. Ferrari, and . Samarati, An access control model supporting periodicity constraints and temporal reasoning, ACM Transactions on Database Systems, vol.23, issue.3, pp.231-285, 1998.
DOI : 10.1145/293910.293151

C. Bertolissi and M. Fernández, An algebraic-functional framework for distributed access control, 2008 Third International Conference on Risks and Security of Internet and Systems, 2008.
DOI : 10.1109/CRISIS.2008.4757458

C. Bertolissi, M. Fernández-[-bl73-]-d, L. Bell, ]. D. Lapadulabl96a, L. Bell et al., Integrity considerations for secure computer systems Secure Computer Systems: a Mathematical Model Secure Computer Systems: a Mathematical Model Secure computer systems: A mathematical model, volume ii The chinese wall security policy Driving and monitoring provisional trust negotiation with metapolicies, Proceedings of PPDP'08 II), MITRE Corp. Proc. IEEE Symposium on Security and Privacy Proceedings IEEE International Workshop on Policies for Distributed Systems and NetworksBS02] P.A. Bonatti and P. Samarati. A uniform framework for regulating service access and information release on the web, pp.239-263229, 1973.

L. Cholvy, F. Cuppens, N. Cuppens-boulahia, and T. Sans, Analyzing consistency of security policies A security model with non-atomic actions and deadlines Rewrite based specification of access control policies, IEEE Symposium on Security and Privacy CSFWCMO08] Horatiu Cirstea 3rd International Workshop on Security and Rewriting Techniques - SecRet'08, pp.103-112, 1997.

D. J. Dougherty, K. Fisler, and S. Krishnamurthi, Specifying and Reasoning About Dynamic Access-Control Policies, Lecture Notes in Computer Science, vol.4130, pp.632-646, 2006.
DOI : 10.1007/11814771_51

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.8098

D. J. Dougherty, C. Kirchner, H. Kirchner, A. Santana, and . Oliveira, Modular Access Control Via Strategic Rewriting, Proceedings of 12th European Symposium On Research In Computer Security (ESORICS'07), 2007.
DOI : 10.1007/978-3-540-74835-9_38

URL : https://hal.archives-ouvertes.fr/inria-00185697

A. Santana-de-oliveira, E. K. Wang, C. Kirchner, H. Kirchnerend72, ]. H. Endertonhjm08 et al., Weaving rewrite-based access control policies Fundamentals of Algebraic Specification I A mathematical introduction to logic A formal comparison of the bell & lapadula and rbac models, Proceedings of the 2007 ACM workshop on Formal methods in security engineering Fourth International Symposium on Information Assurance and Security (IAS'08), pp.71-80, 1972.

M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976.
DOI : 10.1145/360303.360333

Y. Joseph, V. Halpern, and . Weissman, Using first-order logic to reason about policies, CSFW, pp.187-201, 2003.

B. Jarvis, L. Jain, [. Jaume, and C. Morisset, Trust in LORA: Towards a Formal Definition of Trust in BDI Agents, Proceedings of the Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis FCS-ARSPA'06JSSS01] Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies, pp.458-463, 2001.
DOI : 10.1007/11893004_59

A. Kalam, R. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003.
DOI : 10.1109/POLICY.2003.1206966

URL : https://hal.archives-ouvertes.fr/hal-01483818

C. Kirchner, H. Kirchner, and M. Rusinowitch, Deduction with symbolic constraints, pp.9-52, 1990.
URL : https://hal.archives-ouvertes.fr/inria-00077103

C. Kirchner, H. Kirchner, A. Santana, and . Oliveira, Analysis of Rewrite-Based Access Control Policies, Security and Rewriting Techniques, 3rd International Workshop Secret'08, volume informal proceedings, pp.37-51, 2008.
DOI : 10.1016/j.entcs.2009.02.072

URL : https://hal.archives-ouvertes.fr/inria-00433409

N. Li, J. C. , M. Mcdougall, R. Alur, C. A. Gunter et al., Datalog with constraints: A foundation for trust management languages A model-based approach to integrating security policies for embedded devices Role-based access control models, PADL ACM EMSOFT, pp.58-7338, 1996.