, 28-STD. Trusted Computer System Evaluation Criteria. Department of Defense, 1985.
British Medical Association, et al. Security in clinical information systems, British Medical Association London, 1996. ,
Joaquim Romaguera i Ramió, Max Jacobson, and Ingrid Fiksdahl-King. A pattern language, 1977. ,
Jikzi: A new framework for secure publishing, Security Protocols, pp.21-36, 2000. ,
The timeless way of building, vol.1, 1979. ,
Fundamentals of computer security technology ,
Firewall policy advisor for anomaly discovery and rule editing, Integrated Network Management, 2003. IFIP/IEEE Eighth International Symposium on, pp.17-30, 2003. ,
, Security policies. Advances in Computers, vol.55, pp.185-235, 2002.
Using pattern languages for objectoriented programs, 1987. ,
Integrity considerations for secure computer systems, DTIC Document, 1977. ,
Secure computer systems: Mathematical foundations, DTIC Document, 1973. ,
Using event calculus to formalise policy specification and analysis, Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on, pp.26-39, 2003. ,
The chinese wall security policy, Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on, pp.206-214, 1989. ,
SCADA: supervisory control and data acquisition. International Society of Automation, 2009. ,
An architecture-centric approach to detecting security patterns in software, Engineering Secure Software and Systems, pp.156-166, 2011. ,
, Context ontology for secure interoperability, 3rd International Conference on Availability, Reliability and Security (ARES'08), 2008.
An expressive verification framework for state/event systems, Proceedings of the 5th international conference on integrated formal methods (IFM), 2004. ,
Concurrent software verification with states, events, and deadlocks, Proceedings of the 5th international conference on integrated formal methods (IFM), vol.17, pp.461-483, 2005. ,
Using model-based intrusion detection for scada networks, Proceedings of the SCADA security scientific symposium, vol.46, pp.1-12, 2007. ,
, Interoperabilité et cohérence de politiques de sécurité pour les systèmes auto-organisants, Thèse de doctorat, 2009.
, Avoidit: A cyber attack taxonomy. 9th Annual Symosium on Information Assurance (ASIA'14), p.135, 2004.
Environment-driven reachability for timed systems : Safety verification of an aircraft landing gear system, Int. Software Tools for Technology Transfer (STTT), 2016. ,
Pastfree[ze] reachability analysis: reaching further with dag-directed exhaustive state-space analysis. Software Testing, Verification and Reliability (STVR), 2016. ,
A comparison of commercial and military computer security policies, Security and Privacy, 1987 IEEE Symposium on, pp.184-184, 1987. ,
Improving model checking with context modelling, Advances in Software Engineering, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00738735
Patterns for application firewalls, Proceedings of the Pattern Languages of Programs (PLoP) Conference, 2004. ,
Dynamic conflict detection in policy-based management systems, Enterprise Distributed Object Computing Conference, 2002. EDOC'02. Proceedings. Sixth International, pp.15-26, 2002. ,
Formally verifying flow properties in industrial systems, SECRYPT 2017, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01527913
Reducing state explosion with context modeling for model-checking, High-Assurance Systems Engineering (HASE), pp.130-137, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00636878
Context-aware verification of a landing gear system, Conference ABZ'14, Case Study Track, pp.2-6, 2014. ,
Security patterns in practice: designing secure architectures using software patterns, 2013. ,
, Nora Cuppens-Boulahia Frédéric Cuppens. Modeling contextual security policies, International Journal of Information Security, vol.7, issue.4, 2008.
, High level conflict management strategies in advanced access control models, Electronic Notes in Theoretical Computer Science (ENTCS), vol.186, pp.1571-0661, 2007.
Taxonomy of security solutions for the scada sector, Project ESCORTS Deliverable, vol.2, 2010. ,
Metadata and authorization patterns, 2000. ,
Designing secure scada systems using security patterns, System Sciences (HICSS), 2010 43rd Hawaii International Conference on, pp.1-8, 2010. ,
, Nelly Delessy-Gassant, and Markus Schumacher. A pattern language for firewalls. M. Schumacher, et al, 2003.
A pattern language for security models, proceedings of PLOP, vol.1, 2001. ,
Design patterns: elements of reusable object-oriented software, 1995. ,
Growing a pattern language (for security), Proceedings of the ACM international symposium on New ideas, new paradigms, and reflections on programming and software, pp.139-158, 2012. ,
Security issues in scada networks, Computers & Security, vol.25, issue.7, pp.498-506, 2006. ,
Verifying enterprise's mandatory access control policies with coloured petri nets, Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003. WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on, pp.184-189, 2003. ,
Securing SCADA systems, 2005. ,
A logic-based calculus of events, Foundations of knowledge base management, pp.23-55, 1989. ,
Estl: A temporal logic for events and states, Proceedings of the 19th International Conference on the Application and Theory of Petri Nets (ICATPN), vol.1420, pp.365-383, 1998. ,
Conflicts in policy-based distributed systems management. Software Engineering, IEEE Transactions on, vol.25, issue.6, pp.852-869, 1999. ,
Formal analysis of security properties on the opc-ua scada protocol, SAFE-COMP'16, 2016. ,
Information system security function validating using model checking, Computer Engineering and Technology (ICCET), 2010 2nd International Conference on, vol.1, pp.1-517, 2010. ,
Generation of applicative attacks scenarios against industrial systems, Foundations and Practice of Security -10th International Symposium, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01615534
Sécurité des systèmes industriels: filtrage applicatif et recherche de scénarios d'attaques, 2018. ,
Formalisation de propriétés de sécurité pour la protection des systèmes d'exploitation, 2010. ,
Role-based access control. American national standard for information technology : ANSI INCITS 359-2004, 2004. ,
The resurrecting duckling: Security issues in ad-hoc wireless networks, Security Protocols, 7th International Workshop Proceedings, 1999. ,
Security Patterns: Integrating security and systems engineering, 2013. ,
Vetronics system integration, pp.401-415, 2006. ,
Context-aware verification of a cruise-control system, 4th International Conference on Model and Data Engineering (MEDI), 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01203701
Vulnerability assessment of cybersecurity for scada systems, IEEE Transactions on Power Systems, vol.23, issue.4, pp.1836-1846, 2008. ,
Security patterns, Michigan State University, PLoP Conf. Citeseer, 2003. ,
Selecting security patterns that fulfill security requirements, International Requirements Engineering, pp.169-172, 2008. ,
Architectural patterns for enabling application security, vol.51, p.61801, 1997. ,
Architectural patterns for enabling application security, vol.51, p.61801, 1998. ,
A survey on security patterns, Progress in informatics, vol.5, issue.5, pp.35-47, 2008. ,
A taxonomy of cyber attacks on scada systems, Internet of things (iThings/CPSCom), 2011 international conference on and 4th international conference on cyber, physical and social computing, pp.380-388, 2011. ,
Scada-specific intrusion detection/prevention systems: a survey and taxonomy, Proceedings of the 1st Workshop on Secure Control Systems (SCS), 2010. Annexe : Publications Les publications rédigées durant ce travail sont listées ci-dessous ,
Validation formelle d'implantation de patrons de sécurité: Application aux SCADA, Conf. Approches Formelles dans l'Assistance au Développement de Logiciels (AFADL'16), 2016. ,
Model Checking of Security Patterns Combinations: Application to SCADA, Conf. RESSI'17, 2017. ,
RITA Secure Communication Protocol: Application to SCADA, 8th International Conference on Network and Communications Security (NCS 2016), 2016. ,
A Secured Data Communication Protocol, Conf. A Connected Ocean (ACO 2016), 2016. ,
Validation formelle d'architecture logicielle basée sur des patrons de sécurité : Application aux SCADA. Conférence AFADL'18, Grenoble, pp.13-15, 2018. ,
Model-checking for Secured Component Implementation, 17th International Conference on Security and Management (SAM'18), 2018. ,
Secure Communication Protocol: Application to Large Number of Distributed Sensors, 17th International Conference on Security and Management (SAM'18), 2018. ,
Formal Verification of Security Pattern Composition : Application to SCADA, Soumise à la revue : Computing and Informatics ,
, , 2016.