auteurs cités : [BLP 73] : D.E. Bell et L.J. LaPadula. Secure Computer Systems: A Mathematical Model. [CC] : Common Criteria. Version 2.1. CCIMB-99-031, CCIMB-99-032, CCIMB-99-033, 1999. [Chomicki 01] : Monitors for History-Based Policies. Proc. International Workshop on Policies for Distributed Systems and Networks, January 2001, Bristol, UK, Springer-Verlag, LNCS 1995, pp. 57-72 (with J. Lobo). [Cuppens 00] : F. Cuppens. Modélisation formelle de la sécurité des systèmes d'informations. Habilitation à Diriger les Recherches, Université Paul Sabatier, Toulouse, 2000. [Cuppens 03] : A. Abou El Kalam, R. El Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miège, C. Saurel, and G. Trouessin. Organization Based Access Control. In Policy'2003, Como, Italie, June 2003. [Cuppens 03] : A Stratification-Based Approach for Handling Conflicts in Access Control. 8th ACM Symposium on Access Control Models and Technologies (SACMAT’03), Como, Italy, June 2-3, 2003. [Cuppens 04] : A formal approach to specify and deploy a network security policy .Second Workshop on Formal Aspects in Security and Trust (FAST). Toulouse, France. August, 2004. [Damianou 01] : N. Damianou, N. Dulay, E. Lupu, M. Sloman. The Ponder Policy Specification Language. Proceedings of the International Workshop on Policies for Distributed Systems and Networks. Pages: 18-38. ISBN:3-540-41610-2, 2001. [Ferraiolo 92] : D. Ferraiolo and R. Kuhn. Role-based access controls. In Proc. of the 15th NISTNCSC Naional Computer Security Conference, pages 554–563, Baltimore, MD, October 1992. [Harrison 76] : Harrison, M.H., Ruzzo, W.L. and Ullman, J.D. Protection in Operating Systems. Communications of ACM 19(8):461-471. [Lobo 99] : J. Lobo, R. Bhatia, and S. Naqvi. A Policy Description Language. In Proc. of National Conference of the American Association for Artificial Intelligence, Orlando, FL, USA, 1999. [Masullo 93] : M. Masullo, S. Calo, Policy Management: An Architecture and Approach. In Proceedings of the IEEE First International Workshop On Systems Management, Los Angeles, IEEE, Avril 1993. [GM 82] : J. Goguen and J. Meseguer. Security policies and security models. [Virmani 00] : Virmani A., J. Lobo, M. Kohli. Netmon: Network Management for the SARAS Softswitch, IEEE/IFIP Network Operations and Management Symposium, (NOMS2000), ed. J. Hong, R., Weihmayer, Hawaii, May 2000 [Wies 94] : R. Wies. Policies in Network and Systems Management – Formal Definition and Architecture –. Journal of Network and Systems Management, Plenum Publishing Corp., Volume 2, Number 1, Pages 63 - 83, Mars 1994. [Wies 95] : R.Wies. Using a Classification of Management Policies for Policy Specification and Policy Transformation. Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, Santa Barbara, California, USA, 1 - 5 Mai 1995.