{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T18:29:15Z","timestamp":1773080955148,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540687603","type":"print"},{"value":"9783540687610","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11955757_18","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T09:34:20Z","timestamp":1165829660000},"page":"216-231","source":"Crossref","is-referenced-by-count":11,"title":["Security Policy Enforcement Through Refinement Process"],"prefix":"10.1007","author":[{"given":"Nicolas","family":"Stouls","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marie-Laure","family":"Potet","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Abrial, J.R.: Extending B without Changing it. In: Habrias, N.H. (ed.) First Conference on the B method, pp. 169\u2013190 (1996) ISBN 2-906082-25-2"},{"key":"18_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511624162","volume-title":"The B-Book","author":"J.R. Abrial","year":"1996","unstructured":"Abrial, J.R.: The B-Book. Cambridge University Press, Cambridge (1996)"},{"key":"18_CR3","unstructured":"Abrial, J.R.: Event driven sequential program construction. Technical report, ClearSy (2001)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Bartal, Y., Mayer, A., Nissim, K., Wool, A.: Firmato: A novel firewall management toolkit. ACM Transactions on Computer Systems\u00a022(4) (1999)","DOI":"10.1145\/1035582.1035583"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-48119-2_22","volume-title":"FM\u201999 - Formal Methods","author":"P. Behm","year":"1999","unstructured":"Behm, P., Benoit, P., Faivre, A., Meynadier, J.-M.: M\u00e9t\u00e9or: A Successful Application of B in a Large Project. In: Wing, J.M., Woodcock, J.C.P., Davies, J. (eds.) FM 1999. LNCS, vol.\u00a01708, pp. 369\u2013387. Springer, Heidelberg (1999)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Butler, M.: A System-Based Approach to the Formal Development of Embedded Controllers for a Railway. Design Automation for Embedded Systems\u00a06(4) (2002)","DOI":"10.1023\/A:1016503426126"},{"key":"18_CR7","unstructured":"Common Criteria. Common Criteria for Information Technology Security Evaluation, Norme ISO 15408 - version 3.0 Rev. 2 (2005)"},{"key":"18_CR8","volume-title":"Formal Aspects in Security and Trust (FAST)","author":"F. Cuppens","year":"2004","unstructured":"Cuppens, F., Cuppens-Boulahia, N., Sans, T., Mi\u00e9ge, A.: A formal approach to specify and deploy a network security policy. In: Dimitrakos, T., Martinelli, F. (eds.) Formal Aspects in Security and Trust (FAST), Springer, Heidelberg (2004)"},{"key":"18_CR9","unstructured":"Darmaillacq, V., Fernandez, J.-C., Groz, R., Mounier, L., Richier, J.-L.: El\u00e9ments de mod\u00e9lisation pour le test de politiques de s\u00e9curit\u00e9. In: Colloque sur les RIsques et la S\u00e9curit\u00e9 d\u2019Internet et des Syst\u00e8mes, CRiSIS, Bourges, France (2005)"},{"issue":"3","key":"18_CR10","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/356778.356782","volume":"11","author":"D. Denning","year":"1979","unstructured":"Denning, D., Denning, P.: Data Security. ACM Computing Survey\u00a011(3), 227\u2013249 (1979)","journal-title":"ACM Computing Survey"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V.S.: A logical language for expressing authorizations. In: IEEE Symp. on Research in Security and Privacy (1997)","DOI":"10.1109\/SECPRI.1997.601312"},{"issue":"4","key":"18_CR12","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s10009-004-0153-x","volume":"7","author":"C. Jard","year":"2005","unstructured":"Jard, C., Jeron, T.: TGV: theory, principles and algorithms. International Journal on Software Tools for Technology Transfer (STTT)\u00a07(4), 297\u2013315 (2005)","journal-title":"International Journal on Software Tools for Technology Transfer (STTT)"},{"key":"18_CR13","unstructured":"JTC1. Information technology \u2013 Open Systems Interconnection (OSI model). Technical report, Standard ISO 7498 (1997)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Abou El Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Mi\u00e9ge, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), pp. 120\u2013131 (2003)","DOI":"10.1109\/POLICY.2003.1206966"},{"issue":"3","key":"18_CR15","doi-asserted-by":"publisher","first-page":"872","DOI":"10.1145\/177492.177726","volume":"16","author":"L. Lamport","year":"1994","unstructured":"Lamport, L.: The Temporal Logic of Actions. ACM Transactions on Programming Languages and Systems\u00a016(3), 872\u2013923 (1994)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"18_CR16","first-page":"41","volume-title":"Database Security II: Status and Prospects","author":"T.E. Lunt","year":"1989","unstructured":"Lunt, T.E.: Access control policies for database systems. In: Database Security II: Status and Prospects, pp. 41\u201352. North\u2013Holland, Amsterdam (1989)"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Masullo, M.: Policy Management: An Architecture and Approach. In: IEEE First International Workshop on Systems Management, pp. 13\u201326 (1993)","DOI":"10.1109\/IWSM.1993.315293"},{"key":"18_CR18","unstructured":"Casassa Mont, M., Baldwin, A., Goh, C.: POWER Prototype: Towards Integrated Policy-Based Management. Technical report, HP Laboratories (1999)"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-45608-2_3","volume-title":"Foundations of Security Analysis and Design","author":"P. Samarati","year":"2001","unstructured":"Samarati, P., de Capitani di Vimercati, S.: Access Control: Policies, Models, and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 137\u2013196. Springer, Heidelberg (2001)"},{"issue":"2","key":"18_CR20","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11430230_16","volume-title":"Testing of Communicating Systems","author":"D. Senn","year":"2005","unstructured":"Senn, D., Basin, D., Caronni, G.: Firewall Conformance Testing. In: Khendek, F., Dssouli, R. (eds.) TestCom 2005. LNCS, vol.\u00a03502, Springer, Heidelberg (2005)"},{"issue":"4","key":"18_CR22","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/BF02283186","volume":"2","author":"M. Sloman","year":"1994","unstructured":"Sloman, M.: Policy Driven Management for Distributed Systems. Journal of Network and Systems Management\u00a02(4), 333\u2013360 (1994)","journal-title":"Journal of Network and Systems Management"},{"key":"18_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/b13476","volume-title":"FME 2003: Formal Methods","author":"G. Vigna","year":"2003","unstructured":"Vigna, G.: A Topological Characterization of TCP\/IP Security. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003. LNCS, vol.\u00a02805, Springer, Heidelberg (2003)"},{"key":"18_CR24","volume-title":"Symposium on Security and Privacy","author":"T.Y.C. Woo","year":"1992","unstructured":"Woo, T.Y.C., Lam, S.S.: Authorization in Distributed Systems: A Formal Approach. In: Symposium on Security and Privacy, IEEE Computer Society, Los Alamitos (1992)"}],"container-title":["Lecture Notes in Computer Science","B 2007: Formal Specification and Development in B"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11955757_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T08:50:22Z","timestamp":1736671822000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11955757_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687603","9783540687610"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11955757_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}