LUPS ? A language for updating logic programs. Logic Programming and Nonmonotonic Reasoning pp, pp.162-176, 1999. ,
Term Rewriting and All That, 1998. ,
Access Control for Deductive Databases by Logic Programming, 18th International Conference of Logic Programming, pp.54-69, 2002. ,
DOI : 10.1007/3-540-45619-8_5
Flexible access control policy specification with constraint logic programming, ACM Transactions on Information and System Security, vol.6, issue.4, pp.501-546, 2003. ,
DOI : 10.1145/950191.950194
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.71.5636
A logic for state-modifying authorization policies, ESORICS 2007, pp.203-218, 2007. ,
Secure Computer Systems: a Mathematical Model, MITRE Corp, 1973. ,
A logical framework for reasoning about access control models, ACM Transactions on Information and System Security, vol.6, issue.1, pp.71-127, 2003. ,
DOI : 10.1145/605434.605437
Constrained rewriting in recognizable theories, Tech. rep., INRIA, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00456848
A state-transition model of trust management and access control, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.27-43, 2001. ,
DOI : 10.1109/CSFW.2001.930134
All About Maude -A High-Performance Logical Framework, How to Specify, Program and Verify Systems in Reriting Logic, 2007. ,
A survey of policy specification approaches. Tech. rep., Department of Computing, Imperial College of Science Technology and Medicine, 2002. ,
Specifying and Reasoning About Dynamic Access-Control Policies, 3rd International Joint Conference on Automated Reasoning (IJ- CAR). LNCS, pp.632-646, 2006. ,
DOI : 10.1007/11814771_51
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.8098
Action languages, Electron. Trans. Artif. Intell, vol.2, pp.193-210, 1998. ,
Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy, Recent Advances in Intrusion Detection, 12th International Symposium, RAID. Proceedings. Lecture Notes in Computer Science, pp.355-356, 2009. ,
DOI : 10.1007/978-3-642-04342-0_22
URL : https://hal.archives-ouvertes.fr/hal-00420117
Formal definition and comparison of access control models, Journal of Information Assurance and Security, vol.4, issue.4, pp.372-381, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-01195856
Fundamentals of mathematical logic, 2005. ,
A unified framework for enforcing multiple access control policies, ACM SIGMOD international conference on Management of data, pp.474-485, 1997. ,
Security Rules versus Security Properties, Information Systems Security -6th International Conference, pp.231-245, 2010. ,
DOI : 10.1007/978-3-642-17714-9_17
URL : https://hal.archives-ouvertes.fr/hal-00593937
Contrôle d'accès versus contrôle de flots, Approches Formelles dans l'Assistance au Développement de Logiciels, pp.27-41, 2010. ,
Analysis of Rewrite-Based Access Control Policies, Proceedings of the Third International Workshop on Security and Rewriting Techniques, pp.55-75, 2008. ,
DOI : 10.1016/j.entcs.2009.02.072
URL : https://hal.archives-ouvertes.fr/inria-00433409
Security analysis in role-based access control, ACM Transactions on Information and System Security, vol.9, issue.4, pp.391-420, 2006. ,
DOI : 10.1145/1187441.1187442
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
A theory for comparing the expressive power of access control models1, Journal of Computer Security, vol.15, issue.2, pp.231-272, 2007. ,
DOI : 10.3233/JCS-2007-15202
Database and Knowledge -Base Systems, 1988. ,