Ramadan Abdunabi, Mustafa Al-Lail, Indrakshi Ray & Robert B. France (2013):
Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model.
IEEE Systems Journal 7(3),
pp. 501–515,
doi:10.1109/JSYST.2013.2242751.
Fatimah Y. Akeel, Asieh Salehi Fathabadi, Federica Paci, Andrew M. Gravell & Gary Wills (2016):
Formal Modelling of Data Integration Systems Security Policies.
Data Science and Engineering 1(3),
pp. 139–148,
doi:10.1007/s41019-016-0016-y.
Nazim Benaïssa, Dominique Cansell & Dominique Méry (2007):
Integration of Security Policy into System Modeling.
In: B 2007: Formal Specification and Development in B, 7th International Conference of B Users, Proceedings,
Lecture Notes in Computer Science 4355.
Springer,
pp. 232–247,
doi:10.1007/11955757_19.
E. Cunha, Marcelo Custódio, Herbert Rocha & Raimundo S. Barreto (2011):
Formal Verification of UML Sequence Diagrams in the Embedded Systems Context.
In: Brazilian Symposium on Computing System Engineering, SBESC 2011.
IEEE Computer Society,
pp. 39–45,
doi:10.1109/SBESC.2011.18.
David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn & Ramaswamy Chandramouli (2001):
Proposed NIST standard for role-based access control.
ACM Trans. Inf. Syst. Secur. 4(3),
pp. 224–274,
doi:10.1145/501978.501980.
Ludwig Fuchs, Günther Pernul & Ravi S. Sandhu (2011):
Roles in information security - A survey and classification of the research area.
Computers & Security 30(8),
pp. 748–769,
doi:10.1016/j.cose.2011.08.002.
Thai Son Hoang, David Basin & Jean-Raymond Abrial (2009):
Specifying Access Control in Event-B.
Technical report 624,
doi:10.3929/ethz-a-006733720.
Oliver Hofrichter, Martin Gogolla & Karsten Sohr (2013):
UML/OCL based Design and Analysis of Role-Based Access Control Policies.
In: (GEMOC 2013) and (AMINO 2013) Co-located with (MODELS 2013),
CEUR Workshop Proceedings 1102.
CEUR-WS.org,
pp. 33–42.
Available at http://ceur-ws.org/Vol-1102/amino2013_submission_2.pdf.
Trent Jaeger & Jonathon Tidswell (2001):
Practical safety in flexible access control models.
ACM Trans. Inf. Syst. Secur. 4(2),
pp. 158–190,
doi:10.1145/501963.501966.
Soon-Kyeong Kim & David A. Carrington (2000):
An integrated framework with UML and Object-Z for developing a precise and understandable specification: the light control case study.
In: 7th Asia-Pacific Software Engineering Conference (APSEC 2000).
IEEE Computer Society,
pp. 240–248,
doi:10.1109/APSEC.2000.896705.
Linas Laibinis, Inna Pereverzeva & Elena Troubitsyna (2017):
Formal reasoning about resilient goal-oriented multi-agent systems.
Science of Computer Programming 148,
pp. 66–87,
doi:10.1016/j.scico.2017.05.008.
Hung Ledang & Jeanine Souquières (2002):
Integration of UML and B Specification Techniques: Systematic Transformation from OCL Expressions into B.
In: 9th Asia-Pacific Software Engineering Conference (APSEC 2002).
IEEE Computer Society,
pp. 495,
doi:10.1109/APSEC.2002.1183053.
Inna Pereverzeva, Michael J. Butler, Asieh Salehi Fathabadi, Linas Laibinis & Elena Troubitsyna (2014):
Formal Derivation of Distributed MapReduce.
In: Abstract State Machines, Alloy, B, TLA, VDM, and Z - 4th International Conference, ABZ 2014. Proceedings,
Lecture Notes in Computer Science 8477.
Springer,
pp. 238–254,
doi:10.1007/978-3-662-43652-3_21.
Inna Pereverzeva, Linas Laibinis, Elena Troubitsyna, Markus Holmberg & Mikko Pöri (2013):
Formal Modelling of Resilient Data Storage in Cloud.
In: Formal Methods and Software Engineering - 15th International Conference on Formal Engineering Methods, ICFEM 2013,
Lecture Notes in Computer Science 8144.
Springer,
pp. 363–379,
doi:10.1007/978-3-642-41202-8_24.
Inna Pereverzeva, Elena Troubitsyna & Linas Laibinis (2012):
Formal Development of Critical Multi-agent Systems: A Refinement Approach.
In: 2012 Ninth European Dependable Computing Conference, 2012.
IEEE Computer Society,
pp. 156–161,
doi:10.1109/EDCC.2012.24.
Inna Pereverzeva, Elena Troubitsyna & Linas Laibinis (2013):
A refinement-based approach to developing critical multi-agent systems.
IJCCBS 4(1),
pp. 69–91,
doi:10.1504/IJCCBS.2013.053743.
Yuliya Prokhorova, Linas Laibinis & Elena Troubitsyna (2015):
Facilitating construction of safety cases from formal models in Event-B.
Information & Software Technology 60,
pp. 51–76,
doi:10.1016/j.infsof.2015.01.001.
Yuliya Prokhorova & Elena Troubitsyna (2012):
Linking Modelling in Event-B with Safety Cases.
In: Software Engineering for Resilient Systems - 4th International Workshop, SERENE 2012. Proceedings,
Lecture Notes in Computer Science 7527.
Springer,
pp. 47–62,
doi:10.1007/978-3-642-33176-3_4.
Indrakshi Ray, Mahendra Kumar & Lijun Yu (2006):
LRBAC: A Location-Aware Role-Based Access Control Model.
In: Information Systems Security, Second International Conference, ICISS 2006, Proceedings,
Lecture Notes in Computer Science 4332.
Springer,
pp. 147–161,
doi:10.1007/11961635_10.
Indrakshi Ray, Na Li, Robert B. France & Dae-Kyoo Kim (2004):
Using uml to visualize role-based access control constraints.
In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT.
ACM,
pp. 115–124,
doi:10.1145/990036.990054.
Kaisa Sere & Elena Troubitsyna (1999):
Hazard Analysis in Formal Specification.
Lecture Notes in Computer Science 1698.
Springer,
pp. 350–360,
doi:10.1007/3-540-48249-0_30.
Kaisa Sere & Elena Troubitsyna (1999):
Safety Analysis in Formal Specification.
In: FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Proceedings, Volume II,
Lecture Notes in Computer Science 1709.
Springer,
pp. 1564–1583,
doi:10.1007/3-540-48118-4_33.
Basit Shafiq, Ammar Masood, James Joshi & Arif Ghafoor (2005):
A Role-Based Access Control Policy Verification Framework for Real-Time Systems.
In: 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005).
IEEE Computer Society,
pp. 13–20,
doi:10.1109/WORDS.2005.11.
Colin F. Snook & Michael J. Butler (2006):
UML-B: Formal modeling and design aided by UML.
ACM Trans. Softw. Eng. Methodol. 15(1),
pp. 92–122,
doi:10.1145/1125808.1125811.
Colin F. Snook & Michael J. Butler (2008):
UML-B: A Plug-in for the Event-B Tool Set.
In: Abstract State Machines, B and Z, First International Conference, ABZ 2008. Proceedings,
pp. 344,
doi:10.1007/978-3-540-87603-8_32.
Wuliang Sun, Robert B. France & Indrakshi Ray (2011):
Rigorous Analysis of UML Access Control Policy Models.
In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks.
IEEE Computer Society,
pp. 9–16,
doi:10.1109/POLICY.2011.30.
Elena Troubitsyna (2003):
Integrating Safety Analysis into Formal Specification of Dependable Systems.
In: 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), CD-ROM/Abstracts Proceedings.
IEEE Computer Society,
pp. 215,
doi:10.1109/IPDPS.2003.1213394.
Elena Troubitsyna (2008):
Elicitation and Specification of Safety Requirements.
In: The Third International Conference on Systems, ICONS 2008.
IEEE Computer Society,
pp. 202–207,
doi:10.1109/ICONS.2008.56.