@inproceedings{dac,
    author = {B. Lampson},
    title = {Protection},
    booktitle = {Proceedings of the 5th Princeton Conference on Information Sciences and Systems}, 
    year = {1971},
}

@inproceedings{mac, 
  author = {Bell, E. D. and La Padula, J. L.},
  title = {Secure computer system: Unified exposition and Multics interpretation},
  publisher = {Mitre Corporation},
  year = {1976}, 
}
@INPROCEEDINGS{policyinferring,
    author = {Evan Martin and Tao Xie},
    title = {Inferring Access-Control Policy Properties via Machine Learning},
    booktitle = {Proc. 7th IEEE Workshop on Policies for Distributed Systems and Networks (POLICY 2006)}, 
    year = {2006},
    pages = {235--238},
  }

@inproceedings{mac1,
  author =       {Biba, K. J.},
  title =        {Integrity Considerations for Secure Computer Systems},
  edition = {ESD-TR-76-372},
  organisation = {MITRE Corp},
  year =         {1977},
}

@INPROCEEDINGS{legacy,
  author = {Traon, Yves Le and Mouelhi, Tejeddine and Pretschner, Alexander and
	Baudry, Benoit},
  title = {Test-Driven Assessment of Access Control in Legacy Applications},
  booktitle = {Proc. the 2008 International Conference on Software Testing, Verification,
	and Validation},
  year = {2008},
  pages = {238--247},
}
@inproceedings{rbac,
    author = {David F. Ferraiolo and Ravi Sandhu and Serban Gavrila and D. Richard Kuhn and Ramaswamy Chandramouli},
    title = {Proposed NIST Standard for Role-Based Access Control},
    year = {2001},
}

@inproceedings{rbac1,
    author = {Ravi Sandhu and Edward Coyne and Hal Feinstein and Charles Youman},
     title = {Role-Based Access Control Models},
    journal = {{IEEE} Computer},
    volume = {29},
    number = {2},   
    year = {1996},
    pages = {38--4},
}


@inproceedings{orbac,
  author    = {Anas Abou El Kalam and
               Salem Benferhat and
               Alexandre Mi{\`e}ge and
               Rania El Baida and
               Fr{\'e}d{\'e}ric Cuppens and
               Claire Saurel and
               Philippe Balbiani and
               Yves Deswarte and
               Gilles Trouessin},
  title     = {Organization based access contro},
  booktitle = {POLICY},
  year      = {2003},
}


@INPROCEEDINGS{aspectJ,
    author = {Gregor Kiczales and Erik Hilsdale and Jim Hugunin and Mik Kersten and Jeffrey Palm and William G. Griswold},
    title = {An Overview of AspectJ},
    booktitle = {},
    year = {2001},
    pages = {327--353},
   
}

@inproceedings{aspectJ,
 author = {Kiczales, Gregor and Hilsdale, Erik and Hugunin, Jim and Kersten, Mik and Palm, Jeffrey and Griswold, William G.},
 title = {An Overview of AspectJ},
 booktitle = {Proceedings of the 15th European Conference on Object-Oriented Programming},
 series = {ECOOP '01},
 year = {2001},
 pages = {327--353},
} 


@article{AOP,
  author    = {Mehmet Aksit},
  title     = {Principles of aspect-oriented programming languages, design
               dimensions and the composition filters approach},
  journal   = {L'OBJET},
  year      = {2004},
  pages     = {15},
}




@INPROCEEDINGS{Kolovski1,
 author = {Kolovski, Vladimir and Hendler, James and Parsia, Bijan},
 title = {Analyzing web access control policies},
 booktitle = {Proceedings of the 16th international conference on World Wide Web},
 year = {2007},
 pages = {677--686},

} 

@inproceedings{mutation1,
  author    = {Tejeddine Mouelhi and
               Yves Le Traon and
               Benoit Baudry},
  title     = {Transforming and Selecting Functional Test Cases for Security
               Policy Testing},
  booktitle = {ICST},
  year      = {2009},
  pages     = {171-180},

}

@inproceedings{mutation,
  author    = {Mouelhi, Tejeddine and Le Traon, Yves and Baudry, Benoit},
  title     = {Mutation analysis for security tests qualification},
  booktitle = {Mutation'07 : third workshop on mutation analysis in conjuction with TAIC-Part, September 10-11},
  year      = {2007},
  pages     = {171-180},

}



@article{DeMillo,
 author = {DeMillo, R. A. and Lipton, R. J. and Sayward, F. G.},
 title = {Hints on Test Data Selection: Help for the Practicing Programmer},
 journal = {Computer},
 year = {1978},
 pages = {34--41},
 } 



@inproceedings{roadmap,
 author = {Devanbu, Premkumar T. and Stubblebine, Stuart},
 title = {Software engineering for security: a roadmap},
 booktitle = {Proceedings of the Conference on The Future of Software Engineering},
 series = {ICSE '00},
 year = {2000},
 pages = {227--239},

} 

@article{accesscontrolaspect,
  author    = {Indrakshi Ray and
               Robert B. France and
               Na Li and
               Geri Georg},
  title     = {An aspect-based approach to modeling access control concerns},
  journal   = {Information {\&} Software Technology},
  year      = {2004},
  pages     = {575-587},

}


BibTeX | EndNote | ACM Ref

@book{software testing,
 author = {Myers, Glenford J. and Sandler, Corey},
 title = {The Art of Software Testing (2. ed.)},
 year = {2004}, 
 publisher = {John Wiley \& Sons},
} 


@inproceedings{mutax,
 title= {http://sites.google.com/site/servalteam/tools/metamutax},
}

@book{logics,
  author={Raymond M. Smullyan},
  title={First-Order Logic},
  publisher={Dover},
  year={1995},
}

