@ARTICLE{Ray04anaspect-based,
    author = {Indrakshi Ray and Robert France and Na Li and Geri Georg},
    title = {An aspect-based approach to modeling access control concerns},
    journal = {Information and Software Technology},
    year = {2004},
    volume = {46},
    pages = {575--587}
}

@inproceedings{DBLP:conf/issre/TraonMB07,
  author    = {Yves Le Traon and
               Tejeddine Mouelhi and
               Benoit Baudry},
  title     = {Testing Security Policies: Going Beyond Functional Testing},
  booktitle = {ISSRE},
  year      = {2007},
  pages     = {93-102},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/ISSRE.2007.27},
  crossref  = {DBLP:conf/issre/2007},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{DBLP:conf/policy/KalamBMBCSBDT03,
  author    = {Anas Abou El Kalam and
               Salem Benferhat and
               Alexandre Mi{\`e}ge and
               Rania El Baida and
               Fr{\'e}d{\'e}ric Cuppens and
               Claire Saurel and
               Philippe Balbiani and
               Yves Deswarte and
               Gilles Trouessin},
  title     = {Organization based access control},
  booktitle = {POLICY},
  year      = {2003},
  pages     = {120-},
  ee        = {http://csdl.computer.org/comp/proceedings/policy/2003/1839/00/18390120abs.htm},
  crossref  = {DBLP:conf/policy/2003},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{DBLP:journals/entcs/CuppensCG07,
  author    = {Fr{\'e}d{\'e}ric Cuppens and
               Nora Cuppens-Boulahia and
               Meriam Ben Ghorbel},
  title     = {High Level Conflict Management Strategies in Advanced Access
               Control Models},
  journal   = {Electr. Notes Theor. Comput. Sci.},
  volume    = {186},
  year      = {2007},
  pages     = {3-26},
  ee        = {http://dx.doi.org/10.1016/j.entcs.2007.01.064},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@TECHREPORT{lucio:10,
  author = {Levi L\'ucio and Nicolas Guelfi},
  title = {A Precise Definition of Operational Resilience},
  year = {2010},
  institution = {Laboratory for Advanced Software Systems, University of Luxembourg},
  number = {TR-LASSY-11-02},
  note = "\url{http://hera.uni.lu/~levi.lucio/operational_resilience/precise_def_op_resilience.pdf}",
}

@TECHREPORT{Padberg97refinementversus,
    author = {J. Padberg and M. Gajewsky and C. Ermel},
    title = {Refinement versus Verification: Compatibility of Net Invariants and Stepwise Development of High-Level Petri Nets},
    institution = {Technische Universitat Berlin},
    year = {1997}
}

@TECHREPORT{lucio_reach:11,
  author = {Levi L\'ucio},
  title = {Reachability Preservation in Algebraic Petri Nets},
  year = {2011},
  institution = {Laboratory for Advanced Software Systems, University of Luxembourg},
  number = {TR-LASSY-11-XX},
  note = "\url{http://hera.uni.lu/~levi.lucio/operational_resilience/some_name.pdf}",
}

@article{Rei91,
 author = {Wolfgang Reisig},
 title = {Petri nets and algebraic specifications},
 journal = {Theoretical Computer Science},
 pages = {1-34},
 year = {1991},
 publisher = {Elsevier},
 volume = {80},
 }
 
@article{BarLuc:09,
AUTHOR = "Bruno Barroca and Levi Lucio and Vasco Amaral and Luis Pedro and Didier Buchs", 
TITLE = "DSL Composition for Model-Based Test Generation", 
JOURNAL = "Electronic Communications of the EASST", 
VOLUME ={21}, 
YEAR={2009}
}

@inproceedings{LucQinSouTej:11,
 author = {Levi L\'ucio and Qin Zhang and Vasco Sousa and Tejeddine Mouelhi},
 title = {Verifying Access Control in Statecharts},
 booktitle = {Proceedings of the MPM (Multi-Paradigm Modeling) 2011 Workshop},
 year = {2011},
 note = {To appear},
}

@article{citeulike:1362491,
   author = {Sandhu, Ravi S. and Coyne, Edward J. and Feinstein, Hal L. and Youman, Charles E.},
   journal = {IEEE Computer},
   number = {2},
   pages = {38--47},
   title = {{Role-Based Access Control Models}},
   volume = {29},
   year = {1996}
}
