Term Rewriting for Access Control, DBSec, pp.179-193, 2006. ,
DOI : 10.1145/984334.984339
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.1483
Flexible access control policy specification with constraint logic programming, ACM Transactions on Information and System Security, vol.6, issue.4, pp.501-546, 2003. ,
DOI : 10.1145/950191.950194
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.71.5636
A flexible authorization mechanism for relational data management systems, ACM Transactions on Information Systems, vol.17, issue.2, pp.101-140, 1999. ,
DOI : 10.1145/306686.306687
Dynamic Event-Based Access Control as Term Rewriting, DBSec, pp.195-210, 2007. ,
DOI : 10.1109/2.485845
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.552
Architectural reflection : Bridging the gap between a running system and its architectural specification, REF'98: 6th Reengineering Forum, pp.8-11, 1998. ,
MAC and UML for secure software design, Proceedings of the 2004 ACM workshop on Formal methods in security engineering , FMSE '04, pp.75-85, 2004. ,
DOI : 10.1145/1029133.1029144
URL : http://ce.sharif.edu/~rezaeeyan/pdf/Ifip2004Draft- RBACMAC Security Analysis and Design for UML.some of references for the paper/SAM2004Draft-MAC and UML for Secure Software Design.pdf
Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001. ,
DOI : 10.1145/501978.501980
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.4562
Modeling and Validating Dynamic Adaptation, 3rd International Workshop on Models@Runtime, at MODELS'08, 2008. ,
DOI : 10.1007/11557432_19
URL : https://hal.archives-ouvertes.fr/inria-00456535
Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001. ,
DOI : 10.1145/383891.383894
UMLsec: Extending UML for Secure Systems Development, UML'02: 5th International Conference on The UML, pp.412-425, 2002. ,
DOI : 10.1007/3-540-45800-X_32
An Overview of AspectJ, ECOOP'01: 15th European Conference on Object-Oriented Programming, pp.327-353, 2001. ,
DOI : 10.1007/3-540-45337-7_18
Modeling Role-Based Access Control Using??Parameterized??UML??Models, FASE, pp.180-193, 2004. ,
DOI : 10.1007/978-3-540-24721-0_13
SecureUML: A UML-Based Modeling Language for Model-Driven Security, UML'02: 5th International Conference on The UML, pp.426-441, 2002. ,
DOI : 10.1007/3-540-45800-X_33
Taming Dynamically Adaptive Systems using models and aspects, 2009 IEEE 31st International Conference on Software Engineering, 2009. ,
DOI : 10.1109/ICSE.2009.5070514
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.780
An Aspect-Oriented and Model-Driven Approach for Managing DynamicVariability, MoDELS'08: ACM/IEEE 11th International Conference on Model Driven Engineering Languages and Systems, 2008. ,
DOI : 10.1007/978-3-540-87875-9_54
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.4481
Franck Fleurey, and Arnor Solberg. Models@ run.time to support dynamic adaptation, Computer, issue.10, pp.4244-51, 2009. ,
A Model-Based Framework for Security Policy Specification, Deployment and Testing, MoDELS'08: ACM/IEEE 11th International Conference on Model Driven Engineering Languages and Systems, 2008. ,
DOI : 10.1007/978-3-540-87875-9_38
Weaving Executability into Object-Oriented Meta-languages, MoDELS'05: 8th Int. Conf. on Model Driven Engineering Languages and Systems, 2005. ,
DOI : 10.1007/11557432_19
URL : https://hal.archives-ouvertes.fr/hal-00795095
Using MDE to Build a Schizofrenic Middleware for Home/Building Automation, ServiceWave'08: Networked European Software & Services Initiative Conference, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00456506
OSGi Service Platform Core Specification, 2007. ,