References

  1. Ramadan Abdunabi, Mustafa Al-Lail, Indrakshi Ray & Robert B. France (2013): Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model. IEEE Systems Journal 7(3), pp. 501–515, doi:10.1109/JSYST.2013.2242751.
  2. Jean-Raymond Abrial (2010): Modeling in Event-B - System and Software Engineering. Cambridge University Press, doi:10.1017/CBO9781139195881. Available at http://www.cambridge.org/uk/catalogue/catalogue.asp?isbn=9780521895569.
  3. Fatimah Y. Akeel, Asieh Salehi Fathabadi, Federica Paci, Andrew M. Gravell & Gary Wills (2016): Formal Modelling of Data Integration Systems Security Policies. Data Science and Engineering 1(3), pp. 139–148, doi:10.1007/s41019-016-0016-y.
  4. Nazim Benaïssa, Dominique Cansell & Dominique Méry (2007): Integration of Security Policy into System Modeling. In: B 2007: Formal Specification and Development in B, 7th International Conference of B Users, Proceedings, Lecture Notes in Computer Science 4355. Springer, pp. 232–247, doi:10.1007/11955757_19.
  5. E. Cunha, Marcelo Custódio, Herbert Rocha & Raimundo S. Barreto (2011): Formal Verification of UML Sequence Diagrams in the Embedded Systems Context. In: Brazilian Symposium on Computing System Engineering, SBESC 2011. IEEE Computer Society, pp. 39–45, doi:10.1109/SBESC.2011.18.
  6. David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn & Ramaswamy Chandramouli (2001): Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), pp. 224–274, doi:10.1145/501978.501980.
  7. Ludwig Fuchs, Günther Pernul & Ravi S. Sandhu (2011): Roles in information security - A survey and classification of the research area. Computers & Security 30(8), pp. 748–769, doi:10.1016/j.cose.2011.08.002.
  8. Thai Son Hoang, David Basin & Jean-Raymond Abrial (2009): Specifying Access Control in Event-B. Technical report 624, doi:10.3929/ethz-a-006733720.
  9. Oliver Hofrichter, Martin Gogolla & Karsten Sohr (2013): UML/OCL based Design and Analysis of Role-Based Access Control Policies. In: (GEMOC 2013) and (AMINO 2013) Co-located with (MODELS 2013), CEUR Workshop Proceedings 1102. CEUR-WS.org, pp. 33–42. Available at http://ceur-ws.org/Vol-1102/amino2013_submission_2.pdf.
  10. Trent Jaeger & Jonathon Tidswell (2001): Practical safety in flexible access control models. ACM Trans. Inf. Syst. Secur. 4(2), pp. 158–190, doi:10.1145/501963.501966.
  11. Soon-Kyeong Kim & David A. Carrington (2000): An integrated framework with UML and Object-Z for developing a precise and understandable specification: the light control case study. In: 7th Asia-Pacific Software Engineering Conference (APSEC 2000). IEEE Computer Society, pp. 240–248, doi:10.1109/APSEC.2000.896705.
  12. Linas Laibinis, Inna Pereverzeva & Elena Troubitsyna (2017): Formal reasoning about resilient goal-oriented multi-agent systems. Science of Computer Programming 148, pp. 66–87, doi:10.1016/j.scico.2017.05.008.
  13. Hung Ledang & Jeanine Souquières (2002): Integration of UML and B Specification Techniques: Systematic Transformation from OCL Expressions into B. In: 9th Asia-Pacific Software Engineering Conference (APSEC 2002). IEEE Computer Society, pp. 495, doi:10.1109/APSEC.2002.1183053.
  14. Inna Pereverzeva, Michael J. Butler, Asieh Salehi Fathabadi, Linas Laibinis & Elena Troubitsyna (2014): Formal Derivation of Distributed MapReduce. In: Abstract State Machines, Alloy, B, TLA, VDM, and Z - 4th International Conference, ABZ 2014. Proceedings, Lecture Notes in Computer Science 8477. Springer, pp. 238–254, doi:10.1007/978-3-662-43652-3_21.
  15. Inna Pereverzeva, Linas Laibinis, Elena Troubitsyna, Markus Holmberg & Mikko Pöri (2013): Formal Modelling of Resilient Data Storage in Cloud. In: Formal Methods and Software Engineering - 15th International Conference on Formal Engineering Methods, ICFEM 2013, Lecture Notes in Computer Science 8144. Springer, pp. 363–379, doi:10.1007/978-3-642-41202-8_24.
  16. Inna Pereverzeva, Elena Troubitsyna & Linas Laibinis (2012): Formal Development of Critical Multi-agent Systems: A Refinement Approach. In: 2012 Ninth European Dependable Computing Conference, 2012. IEEE Computer Society, pp. 156–161, doi:10.1109/EDCC.2012.24.
  17. Inna Pereverzeva, Elena Troubitsyna & Linas Laibinis (2013): A refinement-based approach to developing critical multi-agent systems. IJCCBS 4(1), pp. 69–91, doi:10.1504/IJCCBS.2013.053743.
  18. Yuliya Prokhorova, Linas Laibinis & Elena Troubitsyna (2015): Facilitating construction of safety cases from formal models in Event-B. Information & Software Technology 60, pp. 51–76, doi:10.1016/j.infsof.2015.01.001.
  19. Yuliya Prokhorova & Elena Troubitsyna (2012): Linking Modelling in Event-B with Safety Cases. In: Software Engineering for Resilient Systems - 4th International Workshop, SERENE 2012. Proceedings, Lecture Notes in Computer Science 7527. Springer, pp. 47–62, doi:10.1007/978-3-642-33176-3_4.
  20. Indrakshi Ray, Mahendra Kumar & Lijun Yu (2006): LRBAC: A Location-Aware Role-Based Access Control Model. In: Information Systems Security, Second International Conference, ICISS 2006, Proceedings, Lecture Notes in Computer Science 4332. Springer, pp. 147–161, doi:10.1007/11961635_10.
  21. Indrakshi Ray, Na Li, Robert B. France & Dae-Kyoo Kim (2004): Using uml to visualize role-based access control constraints. In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT. ACM, pp. 115–124, doi:10.1145/990036.990054.
  22. Rodin: Event-B platform. Available at http://www.event-b.org/.
  23. Kaisa Sere & Elena Troubitsyna (1999): Hazard Analysis in Formal Specification. Lecture Notes in Computer Science 1698. Springer, pp. 350–360, doi:10.1007/3-540-48249-0_30.
  24. Kaisa Sere & Elena Troubitsyna (1999): Safety Analysis in Formal Specification. In: FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Proceedings, Volume II, Lecture Notes in Computer Science 1709. Springer, pp. 1564–1583, doi:10.1007/3-540-48118-4_33.
  25. Basit Shafiq, Ammar Masood, James Joshi & Arif Ghafoor (2005): A Role-Based Access Control Policy Verification Framework for Real-Time Systems. In: 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005). IEEE Computer Society, pp. 13–20, doi:10.1109/WORDS.2005.11.
  26. Colin F. Snook & Michael J. Butler (2006): UML-B: Formal modeling and design aided by UML. ACM Trans. Softw. Eng. Methodol. 15(1), pp. 92–122, doi:10.1145/1125808.1125811.
  27. Colin F. Snook & Michael J. Butler (2008): UML-B: A Plug-in for the Event-B Tool Set. In: Abstract State Machines, B and Z, First International Conference, ABZ 2008. Proceedings, pp. 344, doi:10.1007/978-3-540-87603-8_32.
  28. Wuliang Sun, Robert B. France & Indrakshi Ray (2011): Rigorous Analysis of UML Access Control Policy Models. In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks. IEEE Computer Society, pp. 9–16, doi:10.1109/POLICY.2011.30.
  29. Elena Troubitsyna (2003): Integrating Safety Analysis into Formal Specification of Dependable Systems. In: 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), CD-ROM/Abstracts Proceedings. IEEE Computer Society, pp. 215, doi:10.1109/IPDPS.2003.1213394.
  30. Elena Troubitsyna (2008): Elicitation and Specification of Safety Requirements. In: The Third International Conference on Systems, ICONS 2008. IEEE Computer Society, pp. 202–207, doi:10.1109/ICONS.2008.56.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org