Integration of security policy into system modeling
Identifieur interne :
000351 ( PascalFrancis/Corpus );
précédent :
000350;
suivant :
000352
Integration of security policy into system modeling
Auteurs : Nazim Benaïsa ;
Dominique Cansell ;
Dominique MerySource :
-
Lecture notes in computer science [ 0302-9743 ] ; 2006.
RBID : Pascal:08-0029213
Descripteurs français
English descriptors
Abstract
We address the proof-based development of (system) models satisfying a security policy. The security policy is expressed in a model called OrBAC, which allows one to state permissions and prohibitions on actions and activities and belongs to the family of role-based access control formalisms. The main question is to validate the link between the security policy expressed in OrBAC and the resulting system; a first B model is derived from the OrBAC specification of the security policy and then the model is refined to introduce properties that can be expressed in OrBAC. The refinement guarantees that the resulting B (system) model satisfies the security policy. We present a generic development of a system with respect to a security policy and it can be instantiated later for a given security policy.
Notice en format standard (ISO 2709)
Pour connaître la documentation sur le format Inist Standard.
pA |
A01 | 01 | 1 | | @0 0302-9743 |
---|
A05 | | | | @2 4355 |
---|
A08 | 01 | 1 | ENG | @1 Integration of security policy into system modeling |
---|
A09 | 01 | 1 | ENG | @1 B 2007 : formal specification and development in B : 7th international conference of B users, Besançon, France, January 17-19, 2007 : proceedings |
---|
A11 | 01 | 1 | | @1 BENAÏSA (Nazim) |
---|
A11 | 02 | 1 | | @1 CANSELL (Dominique) |
---|
A11 | 03 | 1 | | @1 MERY (Dominique) |
---|
A12 | 01 | 1 | | @1 JULLIAND (Jacques) @9 ed. |
---|
A12 | 02 | 1 | | @1 KOUCHNARENKO (Olga) @9 ed. |
---|
A14 | 01 | | | @1 Université Henri Poincaré Nancy @3 FRA @Z 1 aut. @Z 3 aut. |
---|
A14 | 02 | | | @1 LORIA BP 239 @2 54506 Vandoevre-lès-Nancy @3 FRA @Z 1 aut. @Z 2 aut. @Z 3 aut. |
---|
A14 | 03 | | | @1 Université de Metz @3 FRA @Z 2 aut. |
---|
A20 | | | | @1 232-247 |
---|
A21 | | | | @1 2006 |
---|
A23 | 01 | | | @0 ENG |
---|
A26 | 01 | | | @0 978-3-540-68760-3 |
---|
A43 | 01 | | | @1 INIST @2 16343 @5 354000153639230160 |
---|
A44 | | | | @0 0000 @1 © 2008 INIST-CNRS. All rights reserved. |
---|
A45 | | | | @0 15 ref. |
---|
A47 | 01 | 1 | | @0 08-0029213 |
---|
A60 | | | | @1 P @2 C |
---|
A61 | | | | @0 A |
---|
A64 | 01 | 1 | | @0 Lecture notes in computer science |
---|
A66 | 01 | | | @0 DEU |
---|
C01 | 01 | | ENG | @0 We address the proof-based development of (system) models satisfying a security policy. The security policy is expressed in a model called OrBAC, which allows one to state permissions and prohibitions on actions and activities and belongs to the family of role-based access control formalisms. The main question is to validate the link between the security policy expressed in OrBAC and the resulting system; a first B model is derived from the OrBAC specification of the security policy and then the model is refined to introduce properties that can be expressed in OrBAC. The refinement guarantees that the resulting B (system) model satisfies the security policy. We present a generic development of a system with respect to a security policy and it can be instantiated later for a given security policy. |
---|
C02 | 01 | X | | @0 001D02B07C |
---|
C02 | 02 | X | | @0 001D02B04 |
---|
C02 | 03 | X | | @0 001D02B09 |
---|
C03 | 01 | X | FRE | @0 Développement logiciel @5 01 |
---|
C03 | 01 | X | ENG | @0 Software development @5 01 |
---|
C03 | 01 | X | SPA | @0 Desarrollo logicial @5 01 |
---|
C03 | 02 | X | FRE | @0 Spécification formelle @5 02 |
---|
C03 | 02 | X | ENG | @0 Formal specification @5 02 |
---|
C03 | 02 | X | SPA | @0 Especificación formal @5 02 |
---|
C03 | 03 | X | FRE | @0 Sécurité informatique @5 06 |
---|
C03 | 03 | X | ENG | @0 Computer security @5 06 |
---|
C03 | 03 | X | SPA | @0 Seguridad informatica @5 06 |
---|
C03 | 04 | X | FRE | @0 Théorie preuve @5 07 |
---|
C03 | 04 | X | ENG | @0 Proof theory @5 07 |
---|
C03 | 04 | X | SPA | @0 Teoría demonstración @5 07 |
---|
C03 | 05 | X | FRE | @0 Vérification programme @5 08 |
---|
C03 | 05 | X | ENG | @0 Program verification @5 08 |
---|
C03 | 05 | X | SPA | @0 Verificación programa @5 08 |
---|
C03 | 06 | X | FRE | @0 Système information @5 09 |
---|
C03 | 06 | X | ENG | @0 Information system @5 09 |
---|
C03 | 06 | X | SPA | @0 Sistema información @5 09 |
---|
C03 | 07 | 3 | FRE | @0 Contrôle accès @5 18 |
---|
C03 | 07 | 3 | ENG | @0 Access control @5 18 |
---|
C03 | 08 | X | FRE | @0 Modélisation @5 23 |
---|
C03 | 08 | X | ENG | @0 Modeling @5 23 |
---|
C03 | 08 | X | SPA | @0 Modelización @5 23 |
---|
C03 | 09 | X | FRE | @0 Architecture basée modèle @5 24 |
---|
C03 | 09 | X | ENG | @0 Model driven architecture @5 24 |
---|
C03 | 09 | X | SPA | @0 Arquitectura basada modelo @5 24 |
---|
C03 | 10 | X | FRE | @0 Méthode raffinement @5 25 |
---|
C03 | 10 | X | ENG | @0 Refinement method @5 25 |
---|
C03 | 10 | X | SPA | @0 Método afinamiento @5 25 |
---|
N21 | | | | @1 052 |
---|
N44 | 01 | | | @1 OTO |
---|
N82 | | | | @1 OTO |
---|
|
pR |
A30 | 01 | 1 | ENG | @1 International Conference of B Users @2 7 @3 Besançon FRA @4 2007 |
---|
|
Format Inist (serveur)
NO : | PASCAL 08-0029213 INIST |
ET : | Integration of security policy into system modeling |
AU : | BENAÏSA (Nazim); CANSELL (Dominique); MERY (Dominique); JULLIAND (Jacques); KOUCHNARENKO (Olga) |
AF : | Université Henri Poincaré Nancy/France (1 aut., 3 aut.); LORIA BP 239/54506 Vandoevre-lès-Nancy/France (1 aut., 2 aut., 3 aut.); Université de Metz/France (2 aut.) |
DT : | Publication en série; Congrès; Niveau analytique |
SO : | Lecture notes in computer science; ISSN 0302-9743; Allemagne; Da. 2006; Vol. 4355; Pp. 232-247; Bibl. 15 ref. |
LA : | Anglais |
EA : | We address the proof-based development of (system) models satisfying a security policy. The security policy is expressed in a model called OrBAC, which allows one to state permissions and prohibitions on actions and activities and belongs to the family of role-based access control formalisms. The main question is to validate the link between the security policy expressed in OrBAC and the resulting system; a first B model is derived from the OrBAC specification of the security policy and then the model is refined to introduce properties that can be expressed in OrBAC. The refinement guarantees that the resulting B (system) model satisfies the security policy. We present a generic development of a system with respect to a security policy and it can be instantiated later for a given security policy. |
CC : | 001D02B07C; 001D02B04; 001D02B09 |
FD : | Développement logiciel; Spécification formelle; Sécurité informatique; Théorie preuve; Vérification programme; Système information; Contrôle accès; Modélisation; Architecture basée modèle; Méthode raffinement |
ED : | Software development; Formal specification; Computer security; Proof theory; Program verification; Information system; Access control; Modeling; Model driven architecture; Refinement method |
SD : | Desarrollo logicial; Especificación formal; Seguridad informatica; Teoría demonstración; Verificación programa; Sistema información; Modelización; Arquitectura basada modelo; Método afinamiento |
LO : | INIST-16343.354000153639230160 |
ID : | 08-0029213 |
Links to Exploration step
Pascal:08-0029213
Le document en format XML
<record><TEI><teiHeader><fileDesc><titleStmt><title xml:lang="en" level="a">Integration of security policy into system modeling</title>
<author><name sortKey="Benaisa, Nazim" sort="Benaisa, Nazim" uniqKey="Benaisa N" first="Nazim" last="Benaïsa">Nazim Benaïsa</name>
<affiliation><inist:fA14 i1="01"><s1>Université Henri Poincaré Nancy</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation><inist:fA14 i1="02"><s1>LORIA BP 239</s1>
<s2>54506 Vandoevre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Cansell, Dominique" sort="Cansell, Dominique" uniqKey="Cansell D" first="Dominique" last="Cansell">Dominique Cansell</name>
<affiliation><inist:fA14 i1="02"><s1>LORIA BP 239</s1>
<s2>54506 Vandoevre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation><inist:fA14 i1="03"><s1>Université de Metz</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Mery, Dominique" sort="Mery, Dominique" uniqKey="Mery D" first="Dominique" last="Mery">Dominique Mery</name>
<affiliation><inist:fA14 i1="01"><s1>Université Henri Poincaré Nancy</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation><inist:fA14 i1="02"><s1>LORIA BP 239</s1>
<s2>54506 Vandoevre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">INIST</idno>
<idno type="inist">08-0029213</idno>
<date when="2006">2006</date>
<idno type="stanalyst">PASCAL 08-0029213 INIST</idno>
<idno type="RBID">Pascal:08-0029213</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000351</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title xml:lang="en" level="a">Integration of security policy into system modeling</title>
<author><name sortKey="Benaisa, Nazim" sort="Benaisa, Nazim" uniqKey="Benaisa N" first="Nazim" last="Benaïsa">Nazim Benaïsa</name>
<affiliation><inist:fA14 i1="01"><s1>Université Henri Poincaré Nancy</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation><inist:fA14 i1="02"><s1>LORIA BP 239</s1>
<s2>54506 Vandoevre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Cansell, Dominique" sort="Cansell, Dominique" uniqKey="Cansell D" first="Dominique" last="Cansell">Dominique Cansell</name>
<affiliation><inist:fA14 i1="02"><s1>LORIA BP 239</s1>
<s2>54506 Vandoevre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation><inist:fA14 i1="03"><s1>Université de Metz</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Mery, Dominique" sort="Mery, Dominique" uniqKey="Mery D" first="Dominique" last="Mery">Dominique Mery</name>
<affiliation><inist:fA14 i1="01"><s1>Université Henri Poincaré Nancy</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
<affiliation><inist:fA14 i1="02"><s1>LORIA BP 239</s1>
<s2>54506 Vandoevre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>3 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</analytic>
<series><title level="j" type="main">Lecture notes in computer science</title>
<idno type="ISSN">0302-9743</idno>
<imprint><date when="2006">2006</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt><title level="j" type="main">Lecture notes in computer science</title>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass><keywords scheme="KwdEn" xml:lang="en"><term>Access control</term>
<term>Computer security</term>
<term>Formal specification</term>
<term>Information system</term>
<term>Model driven architecture</term>
<term>Modeling</term>
<term>Program verification</term>
<term>Proof theory</term>
<term>Refinement method</term>
<term>Software development</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr"><term>Développement logiciel</term>
<term>Spécification formelle</term>
<term>Sécurité informatique</term>
<term>Théorie preuve</term>
<term>Vérification programme</term>
<term>Système information</term>
<term>Contrôle accès</term>
<term>Modélisation</term>
<term>Architecture basée modèle</term>
<term>Méthode raffinement</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">We address the proof-based development of (system) models satisfying a security policy. The security policy is expressed in a model called OrBAC, which allows one to state permissions and prohibitions on actions and activities and belongs to the family of role-based access control formalisms. The main question is to validate the link between the security policy expressed in OrBAC and the resulting system; a first B model is derived from the OrBAC specification of the security policy and then the model is refined to introduce properties that can be expressed in OrBAC. The refinement guarantees that the resulting B (system) model satisfies the security policy. We present a generic development of a system with respect to a security policy and it can be instantiated later for a given security policy.</div>
</front>
</TEI>
<inist><standard h6="B"><pA><fA01 i1="01" i2="1"><s0>0302-9743</s0>
</fA01>
<fA05><s2>4355</s2>
</fA05>
<fA08 i1="01" i2="1" l="ENG"><s1>Integration of security policy into system modeling</s1>
</fA08>
<fA09 i1="01" i2="1" l="ENG"><s1>B 2007 : formal specification and development in B : 7th international conference of B users, Besançon, France, January 17-19, 2007 : proceedings</s1>
</fA09>
<fA11 i1="01" i2="1"><s1>BENAÏSA (Nazim)</s1>
</fA11>
<fA11 i1="02" i2="1"><s1>CANSELL (Dominique)</s1>
</fA11>
<fA11 i1="03" i2="1"><s1>MERY (Dominique)</s1>
</fA11>
<fA12 i1="01" i2="1"><s1>JULLIAND (Jacques)</s1>
<s9>ed.</s9>
</fA12>
<fA12 i1="02" i2="1"><s1>KOUCHNARENKO (Olga)</s1>
<s9>ed.</s9>
</fA12>
<fA14 i1="01"><s1>Université Henri Poincaré Nancy</s1>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>3 aut.</sZ>
</fA14>
<fA14 i1="02"><s1>LORIA BP 239</s1>
<s2>54506 Vandoevre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
<sZ>2 aut.</sZ>
<sZ>3 aut.</sZ>
</fA14>
<fA14 i1="03"><s1>Université de Metz</s1>
<s3>FRA</s3>
<sZ>2 aut.</sZ>
</fA14>
<fA20><s1>232-247</s1>
</fA20>
<fA21><s1>2006</s1>
</fA21>
<fA23 i1="01"><s0>ENG</s0>
</fA23>
<fA26 i1="01"><s0>978-3-540-68760-3</s0>
</fA26>
<fA43 i1="01"><s1>INIST</s1>
<s2>16343</s2>
<s5>354000153639230160</s5>
</fA43>
<fA44><s0>0000</s0>
<s1>© 2008 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45><s0>15 ref.</s0>
</fA45>
<fA47 i1="01" i2="1"><s0>08-0029213</s0>
</fA47>
<fA60><s1>P</s1>
<s2>C</s2>
</fA60>
<fA64 i1="01" i2="1"><s0>Lecture notes in computer science</s0>
</fA64>
<fA66 i1="01"><s0>DEU</s0>
</fA66>
<fC01 i1="01" l="ENG"><s0>We address the proof-based development of (system) models satisfying a security policy. The security policy is expressed in a model called OrBAC, which allows one to state permissions and prohibitions on actions and activities and belongs to the family of role-based access control formalisms. The main question is to validate the link between the security policy expressed in OrBAC and the resulting system; a first B model is derived from the OrBAC specification of the security policy and then the model is refined to introduce properties that can be expressed in OrBAC. The refinement guarantees that the resulting B (system) model satisfies the security policy. We present a generic development of a system with respect to a security policy and it can be instantiated later for a given security policy.</s0>
</fC01>
<fC02 i1="01" i2="X"><s0>001D02B07C</s0>
</fC02>
<fC02 i1="02" i2="X"><s0>001D02B04</s0>
</fC02>
<fC02 i1="03" i2="X"><s0>001D02B09</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE"><s0>Développement logiciel</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG"><s0>Software development</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA"><s0>Desarrollo logicial</s0>
<s5>01</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE"><s0>Spécification formelle</s0>
<s5>02</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG"><s0>Formal specification</s0>
<s5>02</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA"><s0>Especificación formal</s0>
<s5>02</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE"><s0>Sécurité informatique</s0>
<s5>06</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG"><s0>Computer security</s0>
<s5>06</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA"><s0>Seguridad informatica</s0>
<s5>06</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE"><s0>Théorie preuve</s0>
<s5>07</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG"><s0>Proof theory</s0>
<s5>07</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA"><s0>Teoría demonstración</s0>
<s5>07</s5>
</fC03>
<fC03 i1="05" i2="X" l="FRE"><s0>Vérification programme</s0>
<s5>08</s5>
</fC03>
<fC03 i1="05" i2="X" l="ENG"><s0>Program verification</s0>
<s5>08</s5>
</fC03>
<fC03 i1="05" i2="X" l="SPA"><s0>Verificación programa</s0>
<s5>08</s5>
</fC03>
<fC03 i1="06" i2="X" l="FRE"><s0>Système information</s0>
<s5>09</s5>
</fC03>
<fC03 i1="06" i2="X" l="ENG"><s0>Information system</s0>
<s5>09</s5>
</fC03>
<fC03 i1="06" i2="X" l="SPA"><s0>Sistema información</s0>
<s5>09</s5>
</fC03>
<fC03 i1="07" i2="3" l="FRE"><s0>Contrôle accès</s0>
<s5>18</s5>
</fC03>
<fC03 i1="07" i2="3" l="ENG"><s0>Access control</s0>
<s5>18</s5>
</fC03>
<fC03 i1="08" i2="X" l="FRE"><s0>Modélisation</s0>
<s5>23</s5>
</fC03>
<fC03 i1="08" i2="X" l="ENG"><s0>Modeling</s0>
<s5>23</s5>
</fC03>
<fC03 i1="08" i2="X" l="SPA"><s0>Modelización</s0>
<s5>23</s5>
</fC03>
<fC03 i1="09" i2="X" l="FRE"><s0>Architecture basée modèle</s0>
<s5>24</s5>
</fC03>
<fC03 i1="09" i2="X" l="ENG"><s0>Model driven architecture</s0>
<s5>24</s5>
</fC03>
<fC03 i1="09" i2="X" l="SPA"><s0>Arquitectura basada modelo</s0>
<s5>24</s5>
</fC03>
<fC03 i1="10" i2="X" l="FRE"><s0>Méthode raffinement</s0>
<s5>25</s5>
</fC03>
<fC03 i1="10" i2="X" l="ENG"><s0>Refinement method</s0>
<s5>25</s5>
</fC03>
<fC03 i1="10" i2="X" l="SPA"><s0>Método afinamiento</s0>
<s5>25</s5>
</fC03>
<fN21><s1>052</s1>
</fN21>
<fN44 i1="01"><s1>OTO</s1>
</fN44>
<fN82><s1>OTO</s1>
</fN82>
</pA>
<pR><fA30 i1="01" i2="1" l="ENG"><s1>International Conference of B Users</s1>
<s2>7</s2>
<s3>Besançon FRA</s3>
<s4>2007</s4>
</fA30>
</pR>
</standard>
<server><NO>PASCAL 08-0029213 INIST</NO>
<ET>Integration of security policy into system modeling</ET>
<AU>BENAÏSA (Nazim); CANSELL (Dominique); MERY (Dominique); JULLIAND (Jacques); KOUCHNARENKO (Olga)</AU>
<AF>Université Henri Poincaré Nancy/France (1 aut., 3 aut.); LORIA BP 239/54506 Vandoevre-lès-Nancy/France (1 aut., 2 aut., 3 aut.); Université de Metz/France (2 aut.)</AF>
<DT>Publication en série; Congrès; Niveau analytique</DT>
<SO>Lecture notes in computer science; ISSN 0302-9743; Allemagne; Da. 2006; Vol. 4355; Pp. 232-247; Bibl. 15 ref.</SO>
<LA>Anglais</LA>
<EA>We address the proof-based development of (system) models satisfying a security policy. The security policy is expressed in a model called OrBAC, which allows one to state permissions and prohibitions on actions and activities and belongs to the family of role-based access control formalisms. The main question is to validate the link between the security policy expressed in OrBAC and the resulting system; a first B model is derived from the OrBAC specification of the security policy and then the model is refined to introduce properties that can be expressed in OrBAC. The refinement guarantees that the resulting B (system) model satisfies the security policy. We present a generic development of a system with respect to a security policy and it can be instantiated later for a given security policy.</EA>
<CC>001D02B07C; 001D02B04; 001D02B09</CC>
<FD>Développement logiciel; Spécification formelle; Sécurité informatique; Théorie preuve; Vérification programme; Système information; Contrôle accès; Modélisation; Architecture basée modèle; Méthode raffinement</FD>
<ED>Software development; Formal specification; Computer security; Proof theory; Program verification; Information system; Access control; Modeling; Model driven architecture; Refinement method</ED>
<SD>Desarrollo logicial; Especificación formal; Seguridad informatica; Teoría demonstración; Verificación programa; Sistema información; Modelización; Arquitectura basada modelo; Método afinamiento</SD>
<LO>INIST-16343.354000153639230160</LO>
<ID>08-0029213</ID>
</server>
</inist>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/PascalFrancis/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000351 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Corpus/biblio.hfd -nk 000351 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien
|wiki= Wicri/Lorraine
|area= InforLorV4
|flux= PascalFrancis
|étape= Corpus
|type= RBID
|clé= Pascal:08-0029213
|texte= Integration of security policy into system modeling
}}
| This area was generated with Dilib version V0.6.33. Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022 | ![](Common/icons/LogoDilib.gif) |