The B-Book: Assigning Programs to Meanings, 1996. ,
DOI : 10.1017/CBO9780511624162
Using abduction and induction for operational requirements elaboration, special issue: Abduction and Induction in Artificial Intelligence, pp.275-288, 2009. ,
DOI : 10.1016/j.jal.2008.10.002
A Logic for State-Modifying Authorization Policies, European Symposium On Research In Computer Security, pp.203-218, 2007. ,
DOI : 10.1007/978-3-540-74835-9_14
The Role of Abduction in Declarative??Authorization??Policies, Lecture Notes in Computer Science, vol.4902, pp.84-99, 2008. ,
DOI : 10.1007/978-3-540-77442-6_7
Zenon: An Extensible Automated Theorem Prover Producing Checkable Proofs, Logic for Programming Artificial Intelligence and Reasoning, pp.151-165 ,
DOI : 10.1007/978-3-540-75560-9_13
URL : https://hal.archives-ouvertes.fr/inria-00315920
Formal Specification and Validation of Security Policies, submitted to the Brazilian Symposium on Formal Methods, 2010. ,
DOI : 10.1007/978-3-642-27901-0_12
URL : https://hal.archives-ouvertes.fr/inria-00507300
A complete, nonredundant algorithm for reversed skolemization, Conference on Automated Deduction, pp.374-385, 1980. ,
DOI : 10.1007/3-540-10009-1_28
A survey of policy specification approaches, Tech. rep., Imperial College of Science Technology and Medicine, 2002. ,
Specifying and Reasoning About Dynamic Access-Control Policies, International Joint Conference on Automated Reasoning, pp.632-646, 2006. ,
DOI : 10.1007/11814771_51
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.8098
Role-based access control Computer security series, 2003. ,
Untersuchungen ???ber das logische Schlie???en. I, Mathematische Zeitschrift, vol.39, issue.1, pp.176-210, 1934. ,
DOI : 10.1007/BF01201353
Abductive Logic Programming, Journal of Logic and Computation, vol.2, issue.6, pp.719-770, 1992. ,
DOI : 10.1093/logcom/2.6.719
The role of abduction in logic programming, Handbook of Logic in Artificial Intelligence and Logic Programming, vol.5, pp.235-324, 1998. ,
The temporal logic of actions, ACM Transactions on Programming Languages and Systems, vol.16, issue.3, pp.872-923, 1994. ,
DOI : 10.1145/177492.177726
Role-based access control: A corrected and simplified specification, Department of Defense Sponsored Information Security Research: New Methods for Protecting Against Cyber Threats, 2007. ,
First order abduction via tableau and sequent calculi, Logic Journal of IGPL, vol.1, issue.1, pp.99-117, 1993. ,
DOI : 10.1093/jigpal/1.1.99
The specification language TLA+. Logics of Specification Languages pp, pp.401-451, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00338330
Isabelle/HOL ? A Proof Assistant for Higher-Order Logic, Lecture Notes in Computer Science, vol.2283, 2002. ,
A generic tableau prover and its integration with Isabelle, Journal of Universal Computer Science, vol.5, issue.3, pp.73-87, 1999. ,
An Abductive Approach for Analysing Event-Based Requirements Specifications, International Conference on Logic Programming, pp.22-37, 2002. ,
DOI : 10.1007/3-540-45619-8_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.4878
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3867
-tableaux and ??-resolution, Journal of Applied Non-Classical Logics, vol.12, issue.2, pp.211-225, 2009. ,
DOI : 10.3166/jancl.19.211-225
URL : https://hal.archives-ouvertes.fr/halshs-00792287