D. F. Ferraiolo, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001.
DOI : 10.1145/501978.501980

S. I. Gavrila and J. F. Barkley, Formal specification for role based access control user/role and role/role relationship management, Proceedings of the third ACM workshop on Role-based access control , RBAC '98, 1996.
DOI : 10.1145/286884.286902

R. Sandhu, E. J. , H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

A. Kalam, Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003.
DOI : 10.1109/POLICY.2003.1206966

URL : https://hal.archives-ouvertes.fr/hal-01483818

F. Cuppens, N. Cuppens-boulahia, M. B. Ghorbel, D. , J. Doser et al., High-level conflict management strategies in advanced access control models. in Workshop on Information and Computer Security (ICS'06) Model driven security: From UML models to access control infrastructures, ACM Transactions on Software Engineering and Methodology (TOSEM), 2006.

T. Mouelhi, Y. Le-traon, and B. Baudry, Mutation analysis for security tests qualification , in Mutation'07 workshop, 2007.

T. Mouelhi, Y. Le-traon, and B. Baudry, Testing security policies: going beyond functional testing, International Symposium on Software Reliability Engineering, 2007.

L. Briand and Y. Labiche, A UML-based approach to System Testing. Software and Systems Modeling, pp.10-42, 2002.

E. Martin and T. Xie, Inferring Access-Control Policy Properties via Machine Learning, Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06), 2006.
DOI : 10.1109/POLICY.2006.19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.143.6815

P. T. Devanbu and S. Stubblebine, Software engineering for security, Proceedings of the conference on The future of Software engineering , ICSE '00, 2000.
DOI : 10.1145/336512.336559

A. Pretschner, T. Mouelhi, and Y. Le-traon, Model-Based Tests for Access Control Policies, 2008 International Conference on Software Testing, Verification, and Validation, 2008.
DOI : 10.1109/ICST.2008.44

URL : https://hal.archives-ouvertes.fr/inria-00456952

. Jézéquel, Automatic Test Cases Optimization using a Bacteriological Adaptation Model: Application to .NET Components. in ASE'02 (Automated Software Engineering), 2002.

B. Baudry, F. Fleurey, Y. L. Traon, and J. Jézéquel, From Genetic to Bacteriological Algorithms for Mutation-Based Testing. Software Testing, Verification and Reliability, pp.73-96, 2005.