Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Integration of security policy into system modeling

Identifieur interne : 000351 ( PascalFrancis/Corpus ); précédent : 000350; suivant : 000352

Integration of security policy into system modeling

Auteurs : Nazim Benaïsa ; Dominique Cansell ; Dominique Mery

Source :

RBID : Pascal:08-0029213

Descripteurs français

English descriptors

Abstract

We address the proof-based development of (system) models satisfying a security policy. The security policy is expressed in a model called OrBAC, which allows one to state permissions and prohibitions on actions and activities and belongs to the family of role-based access control formalisms. The main question is to validate the link between the security policy expressed in OrBAC and the resulting system; a first B model is derived from the OrBAC specification of the security policy and then the model is refined to introduce properties that can be expressed in OrBAC. The refinement guarantees that the resulting B (system) model satisfies the security policy. We present a generic development of a system with respect to a security policy and it can be instantiated later for a given security policy.

Notice en format standard (ISO 2709)

Pour connaître la documentation sur le format Inist Standard.

pA  
A01 01  1    @0 0302-9743
A05       @2 4355
A08 01  1  ENG  @1 Integration of security policy into system modeling
A09 01  1  ENG  @1 B 2007 : formal specification and development in B : 7th international conference of B users, Besançon, France, January 17-19, 2007 : proceedings
A11 01  1    @1 BENAÏSA (Nazim)
A11 02  1    @1 CANSELL (Dominique)
A11 03  1    @1 MERY (Dominique)
A12 01  1    @1 JULLIAND (Jacques) @9 ed.
A12 02  1    @1 KOUCHNARENKO (Olga) @9 ed.
A14 01      @1 Université Henri Poincaré Nancy @3 FRA @Z 1 aut. @Z 3 aut.
A14 02      @1 LORIA BP 239 @2 54506 Vandoevre-lès-Nancy @3 FRA @Z 1 aut. @Z 2 aut. @Z 3 aut.
A14 03      @1 Université de Metz @3 FRA @Z 2 aut.
A20       @1 232-247
A21       @1 2006
A23 01      @0 ENG
A26 01      @0 978-3-540-68760-3
A43 01      @1 INIST @2 16343 @5 354000153639230160
A44       @0 0000 @1 © 2008 INIST-CNRS. All rights reserved.
A45       @0 15 ref.
A47 01  1    @0 08-0029213
A60       @1 P @2 C
A61       @0 A
A64 01  1    @0 Lecture notes in computer science
A66 01      @0 DEU
C01 01    ENG  @0 We address the proof-based development of (system) models satisfying a security policy. The security policy is expressed in a model called OrBAC, which allows one to state permissions and prohibitions on actions and activities and belongs to the family of role-based access control formalisms. The main question is to validate the link between the security policy expressed in OrBAC and the resulting system; a first B model is derived from the OrBAC specification of the security policy and then the model is refined to introduce properties that can be expressed in OrBAC. The refinement guarantees that the resulting B (system) model satisfies the security policy. We present a generic development of a system with respect to a security policy and it can be instantiated later for a given security policy.
C02 01  X    @0 001D02B07C
C02 02  X    @0 001D02B04
C02 03  X    @0 001D02B09
C03 01  X  FRE  @0 Développement logiciel @5 01
C03 01  X  ENG  @0 Software development @5 01
C03 01  X  SPA  @0 Desarrollo logicial @5 01
C03 02  X  FRE  @0 Spécification formelle @5 02
C03 02  X  ENG  @0 Formal specification @5 02
C03 02  X  SPA  @0 Especificación formal @5 02
C03 03  X  FRE  @0 Sécurité informatique @5 06
C03 03  X  ENG  @0 Computer security @5 06
C03 03  X  SPA  @0 Seguridad informatica @5 06
C03 04  X  FRE  @0 Théorie preuve @5 07
C03 04  X  ENG  @0 Proof theory @5 07
C03 04  X  SPA  @0 Teoría demonstración @5 07
C03 05  X  FRE  @0 Vérification programme @5 08
C03 05  X  ENG  @0 Program verification @5 08
C03 05  X  SPA  @0 Verificación programa @5 08
C03 06  X  FRE  @0 Système information @5 09
C03 06  X  ENG  @0 Information system @5 09
C03 06  X  SPA  @0 Sistema información @5 09
C03 07  3  FRE  @0 Contrôle accès @5 18
C03 07  3  ENG  @0 Access control @5 18
C03 08  X  FRE  @0 Modélisation @5 23
C03 08  X  ENG  @0 Modeling @5 23
C03 08  X  SPA  @0 Modelización @5 23
C03 09  X  FRE  @0 Architecture basée modèle @5 24
C03 09  X  ENG  @0 Model driven architecture @5 24
C03 09  X  SPA  @0 Arquitectura basada modelo @5 24
C03 10  X  FRE  @0 Méthode raffinement @5 25
C03 10  X  ENG  @0 Refinement method @5 25
C03 10  X  SPA  @0 Método afinamiento @5 25
N21       @1 052
N44 01      @1 OTO
N82       @1 OTO
pR  
A30 01  1  ENG  @1 International Conference of B Users @2 7 @3 Besançon FRA @4 2007

Format Inist (serveur)

NO : PASCAL 08-0029213 INIST
ET : Integration of security policy into system modeling
AU : BENAÏSA (Nazim); CANSELL (Dominique); MERY (Dominique); JULLIAND (Jacques); KOUCHNARENKO (Olga)
AF : Université Henri Poincaré Nancy/France (1 aut., 3 aut.); LORIA BP 239/54506 Vandoevre-lès-Nancy/France (1 aut., 2 aut., 3 aut.); Université de Metz/France (2 aut.)
DT : Publication en série; Congrès; Niveau analytique
SO : Lecture notes in computer science; ISSN 0302-9743; Allemagne; Da. 2006; Vol. 4355; Pp. 232-247; Bibl. 15 ref.
LA : Anglais
EA : We address the proof-based development of (system) models satisfying a security policy. The security policy is expressed in a model called OrBAC, which allows one to state permissions and prohibitions on actions and activities and belongs to the family of role-based access control formalisms. The main question is to validate the link between the security policy expressed in OrBAC and the resulting system; a first B model is derived from the OrBAC specification of the security policy and then the model is refined to introduce properties that can be expressed in OrBAC. The refinement guarantees that the resulting B (system) model satisfies the security policy. We present a generic development of a system with respect to a security policy and it can be instantiated later for a given security policy.
CC : 001D02B07C; 001D02B04; 001D02B09
FD : Développement logiciel; Spécification formelle; Sécurité informatique; Théorie preuve; Vérification programme; Système information; Contrôle accès; Modélisation; Architecture basée modèle; Méthode raffinement
ED : Software development; Formal specification; Computer security; Proof theory; Program verification; Information system; Access control; Modeling; Model driven architecture; Refinement method
SD : Desarrollo logicial; Especificación formal; Seguridad informatica; Teoría demonstración; Verificación programa; Sistema información; Modelización; Arquitectura basada modelo; Método afinamiento
LO : INIST-16343.354000153639230160
ID : 08-0029213

Links to Exploration step

Pascal:08-0029213

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en" level="a">Integration of security policy into system modeling</title>
<author>
<name sortKey="Benaisa, Nazim" sort="Benaisa, Nazim" uniqKey="Benaisa N" first="Nazim" last="Benaïsa">Nazim Benaïsa</name>
<affiliation>
<inist:fA14 i1="01">
<s1>Université Henri Poincaré Nancy</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="02">
<s1>LORIA BP 239</s1>
<s2>54506 Vandoevre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Cansell, Dominique" sort="Cansell, Dominique" uniqKey="Cansell D" first="Dominique" last="Cansell">Dominique Cansell</name>
<affiliation>
<inist:fA14 i1="02">
<s1>LORIA BP 239</s1>
<s2>54506 Vandoevre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="03">
<s1>Université de Metz</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Mery, Dominique" sort="Mery, Dominique" uniqKey="Mery D" first="Dominique" last="Mery">Dominique Mery</name>
<affiliation>
<inist:fA14 i1="01">
<s1>Université Henri Poincaré Nancy</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="02">
<s1>LORIA BP 239</s1>
<s2>54506 Vandoevre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">INIST</idno>
<idno type="inist">08-0029213</idno>
<date when="2006">2006</date>
<idno type="stanalyst">PASCAL 08-0029213 INIST</idno>
<idno type="RBID">Pascal:08-0029213</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000351</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a">Integration of security policy into system modeling</title>
<author>
<name sortKey="Benaisa, Nazim" sort="Benaisa, Nazim" uniqKey="Benaisa N" first="Nazim" last="Benaïsa">Nazim Benaïsa</name>
<affiliation>
<inist:fA14 i1="01">
<s1>Université Henri Poincaré Nancy</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="02">
<s1>LORIA BP 239</s1>
<s2>54506 Vandoevre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Cansell, Dominique" sort="Cansell, Dominique" uniqKey="Cansell D" first="Dominique" last="Cansell">Dominique Cansell</name>
<affiliation>
<inist:fA14 i1="02">
<s1>LORIA BP 239</s1>
<s2>54506 Vandoevre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="03">
<s1>Université de Metz</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author>
<name sortKey="Mery, Dominique" sort="Mery, Dominique" uniqKey="Mery D" first="Dominique" last="Mery">Dominique Mery</name>
<affiliation>
<inist:fA14 i1="01">
<s1>Université Henri Poincaré Nancy</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation>
<inist:fA14 i1="02">
<s1>LORIA BP 239</s1>
<s2>54506 Vandoevre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</analytic>
<series>
<title level="j" type="main">Lecture notes in computer science</title>
<idno type="ISSN">0302-9743</idno>
<imprint>
<date when="2006">2006</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<title level="j" type="main">Lecture notes in computer science</title>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Access control</term>
<term>Computer security</term>
<term>Formal specification</term>
<term>Information system</term>
<term>Model driven architecture</term>
<term>Modeling</term>
<term>Program verification</term>
<term>Proof theory</term>
<term>Refinement method</term>
<term>Software development</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr">
<term>Développement logiciel</term>
<term>Spécification formelle</term>
<term>Sécurité informatique</term>
<term>Théorie preuve</term>
<term>Vérification programme</term>
<term>Système information</term>
<term>Contrôle accès</term>
<term>Modélisation</term>
<term>Architecture basée modèle</term>
<term>Méthode raffinement</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">We address the proof-based development of (system) models satisfying a security policy. The security policy is expressed in a model called OrBAC, which allows one to state permissions and prohibitions on actions and activities and belongs to the family of role-based access control formalisms. The main question is to validate the link between the security policy expressed in OrBAC and the resulting system; a first B model is derived from the OrBAC specification of the security policy and then the model is refined to introduce properties that can be expressed in OrBAC. The refinement guarantees that the resulting B (system) model satisfies the security policy. We present a generic development of a system with respect to a security policy and it can be instantiated later for a given security policy.</div>
</front>
</TEI>
<inist>
<standard h6="B">
<pA>
<fA01 i1="01" i2="1">
<s0>0302-9743</s0>
</fA01>
<fA05>
<s2>4355</s2>
</fA05>
<fA08 i1="01" i2="1" l="ENG">
<s1>Integration of security policy into system modeling</s1>
</fA08>
<fA09 i1="01" i2="1" l="ENG">
<s1>B 2007 : formal specification and development in B : 7th international conference of B users, Besançon, France, January 17-19, 2007 : proceedings</s1>
</fA09>
<fA11 i1="01" i2="1">
<s1>BENAÏSA (Nazim)</s1>
</fA11>
<fA11 i1="02" i2="1">
<s1>CANSELL (Dominique)</s1>
</fA11>
<fA11 i1="03" i2="1">
<s1>MERY (Dominique)</s1>
</fA11>
<fA12 i1="01" i2="1">
<s1>JULLIAND (Jacques)</s1>
<s9>ed.</s9>
</fA12>
<fA12 i1="02" i2="1">
<s1>KOUCHNARENKO (Olga)</s1>
<s9>ed.</s9>
</fA12>
<fA14 i1="01">
<s1>Université Henri Poincaré Nancy</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</fA14>
<fA14 i1="02">
<s1>LORIA BP 239</s1>
<s2>54506 Vandoevre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>3 aut.</sZ>
</fA14>
<fA14 i1="03">
<s1>Université de Metz</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</fA14>
<fA20>
<s1>232-247</s1>
</fA20>
<fA21>
<s1>2006</s1>
</fA21>
<fA23 i1="01">
<s0>ENG</s0>
</fA23>
<fA26 i1="01">
<s0>978-3-540-68760-3</s0>
</fA26>
<fA43 i1="01">
<s1>INIST</s1>
<s2>16343</s2>
<s5>354000153639230160</s5>
</fA43>
<fA44>
<s0>0000</s0>
<s1>© 2008 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45>
<s0>15 ref.</s0>
</fA45>
<fA47 i1="01" i2="1">
<s0>08-0029213</s0>
</fA47>
<fA60>
<s1>P</s1>
<s2>C</s2>
</fA60>
<fA61>
<s0>A</s0>
</fA61>
<fA64 i1="01" i2="1">
<s0>Lecture notes in computer science</s0>
</fA64>
<fA66 i1="01">
<s0>DEU</s0>
</fA66>
<fC01 i1="01" l="ENG">
<s0>We address the proof-based development of (system) models satisfying a security policy. The security policy is expressed in a model called OrBAC, which allows one to state permissions and prohibitions on actions and activities and belongs to the family of role-based access control formalisms. The main question is to validate the link between the security policy expressed in OrBAC and the resulting system; a first B model is derived from the OrBAC specification of the security policy and then the model is refined to introduce properties that can be expressed in OrBAC. The refinement guarantees that the resulting B (system) model satisfies the security policy. We present a generic development of a system with respect to a security policy and it can be instantiated later for a given security policy.</s0>
</fC01>
<fC02 i1="01" i2="X">
<s0>001D02B07C</s0>
</fC02>
<fC02 i1="02" i2="X">
<s0>001D02B04</s0>
</fC02>
<fC02 i1="03" i2="X">
<s0>001D02B09</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE">
<s0>Développement logiciel</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG">
<s0>Software development</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA">
<s0>Desarrollo logicial</s0>
<s5>01</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE">
<s0>Spécification formelle</s0>
<s5>02</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG">
<s0>Formal specification</s0>
<s5>02</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA">
<s0>Especificación formal</s0>
<s5>02</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE">
<s0>Sécurité informatique</s0>
<s5>06</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG">
<s0>Computer security</s0>
<s5>06</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA">
<s0>Seguridad informatica</s0>
<s5>06</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE">
<s0>Théorie preuve</s0>
<s5>07</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG">
<s0>Proof theory</s0>
<s5>07</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA">
<s0>Teoría demonstración</s0>
<s5>07</s5>
</fC03>
<fC03 i1="05" i2="X" l="FRE">
<s0>Vérification programme</s0>
<s5>08</s5>
</fC03>
<fC03 i1="05" i2="X" l="ENG">
<s0>Program verification</s0>
<s5>08</s5>
</fC03>
<fC03 i1="05" i2="X" l="SPA">
<s0>Verificación programa</s0>
<s5>08</s5>
</fC03>
<fC03 i1="06" i2="X" l="FRE">
<s0>Système information</s0>
<s5>09</s5>
</fC03>
<fC03 i1="06" i2="X" l="ENG">
<s0>Information system</s0>
<s5>09</s5>
</fC03>
<fC03 i1="06" i2="X" l="SPA">
<s0>Sistema información</s0>
<s5>09</s5>
</fC03>
<fC03 i1="07" i2="3" l="FRE">
<s0>Contrôle accès</s0>
<s5>18</s5>
</fC03>
<fC03 i1="07" i2="3" l="ENG">
<s0>Access control</s0>
<s5>18</s5>
</fC03>
<fC03 i1="08" i2="X" l="FRE">
<s0>Modélisation</s0>
<s5>23</s5>
</fC03>
<fC03 i1="08" i2="X" l="ENG">
<s0>Modeling</s0>
<s5>23</s5>
</fC03>
<fC03 i1="08" i2="X" l="SPA">
<s0>Modelización</s0>
<s5>23</s5>
</fC03>
<fC03 i1="09" i2="X" l="FRE">
<s0>Architecture basée modèle</s0>
<s5>24</s5>
</fC03>
<fC03 i1="09" i2="X" l="ENG">
<s0>Model driven architecture</s0>
<s5>24</s5>
</fC03>
<fC03 i1="09" i2="X" l="SPA">
<s0>Arquitectura basada modelo</s0>
<s5>24</s5>
</fC03>
<fC03 i1="10" i2="X" l="FRE">
<s0>Méthode raffinement</s0>
<s5>25</s5>
</fC03>
<fC03 i1="10" i2="X" l="ENG">
<s0>Refinement method</s0>
<s5>25</s5>
</fC03>
<fC03 i1="10" i2="X" l="SPA">
<s0>Método afinamiento</s0>
<s5>25</s5>
</fC03>
<fN21>
<s1>052</s1>
</fN21>
<fN44 i1="01">
<s1>OTO</s1>
</fN44>
<fN82>
<s1>OTO</s1>
</fN82>
</pA>
<pR>
<fA30 i1="01" i2="1" l="ENG">
<s1>International Conference of B Users</s1>
<s2>7</s2>
<s3>Besançon FRA</s3>
<s4>2007</s4>
</fA30>
</pR>
</standard>
<server>
<NO>PASCAL 08-0029213 INIST</NO>
<ET>Integration of security policy into system modeling</ET>
<AU>BENAÏSA (Nazim); CANSELL (Dominique); MERY (Dominique); JULLIAND (Jacques); KOUCHNARENKO (Olga)</AU>
<AF>Université Henri Poincaré Nancy/France (1 aut., 3 aut.); LORIA BP 239/54506 Vandoevre-lès-Nancy/France (1 aut., 2 aut., 3 aut.); Université de Metz/France (2 aut.)</AF>
<DT>Publication en série; Congrès; Niveau analytique</DT>
<SO>Lecture notes in computer science; ISSN 0302-9743; Allemagne; Da. 2006; Vol. 4355; Pp. 232-247; Bibl. 15 ref.</SO>
<LA>Anglais</LA>
<EA>We address the proof-based development of (system) models satisfying a security policy. The security policy is expressed in a model called OrBAC, which allows one to state permissions and prohibitions on actions and activities and belongs to the family of role-based access control formalisms. The main question is to validate the link between the security policy expressed in OrBAC and the resulting system; a first B model is derived from the OrBAC specification of the security policy and then the model is refined to introduce properties that can be expressed in OrBAC. The refinement guarantees that the resulting B (system) model satisfies the security policy. We present a generic development of a system with respect to a security policy and it can be instantiated later for a given security policy.</EA>
<CC>001D02B07C; 001D02B04; 001D02B09</CC>
<FD>Développement logiciel; Spécification formelle; Sécurité informatique; Théorie preuve; Vérification programme; Système information; Contrôle accès; Modélisation; Architecture basée modèle; Méthode raffinement</FD>
<ED>Software development; Formal specification; Computer security; Proof theory; Program verification; Information system; Access control; Modeling; Model driven architecture; Refinement method</ED>
<SD>Desarrollo logicial; Especificación formal; Seguridad informatica; Teoría demonstración; Verificación programa; Sistema información; Modelización; Arquitectura basada modelo; Método afinamiento</SD>
<LO>INIST-16343.354000153639230160</LO>
<ID>08-0029213</ID>
</server>
</inist>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/PascalFrancis/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000351 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Corpus/biblio.hfd -nk 000351 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    PascalFrancis
   |étape=   Corpus
   |type=    RBID
   |clé=     Pascal:08-0029213
   |texte=   Integration of security policy into system modeling
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022