, ACF

, ACF

, ACF

, ACF

, ACF

, ACF

, ACF

, ACF

J. Ross and . Anderson, Security engineering: a guide to building dependable distributed systems, 2010.

A. , In Module 4 : La gestion de la cybersécurité au sein d'une organisation, 2017.

K. J. Biba, Integrity considerations for secure computer systems, 1977.

P. Bieber, R. Delmas, and C. Seguin, DALculus-theory and tool for development assurance level allocation, International Conference on Computer Safety, Reliability, and Security, pp.43-56, 2011.

R. Sravani-teja-bulusu, A. Laborde, F. Samer-wazan, A. Barrère, and . Benzekri, Towards the weaving of the characteristics of good security requirements, International Conference on Risks and Security of Internet and Systems, pp.60-74, 2016.

R. Sravani-teja-bulusu, A. Laborde, F. Samer-wazan, A. Barrère, and . Benzekri, Which security requirements engineering methodology should i choose?: Towards a requirements engineering-based evaluation approach, Proceedings of the 12th International Conference on Availability, Reliability and Security, p.29, 2017.

R. Sravani-teja-bulusu, A. Laborde, F. Samer-wazan, A. Barrère, and . Benzekri, A Requirements Engineering-Based Approach for Evaluating Security Requirements Engineering Methodologies, Information Technology -New Generations (Advances in Intelligent Systems and Computing), pp.517-525, 2018.

R. Sravani-teja-bulusu, A. Laborde, F. Samer-wazan, A. Barrere, and . Benzekri, Applying a Requirement Engineering Based Approach to Evaluate the Security Requirements Engineering Methodologies, Proceedings of the 33rd Annual ACM Symposium on Applied Computing (SAC '18), pp.1316-1318, 2018.

D. David, D. R. Clark, and . Wilson, A comparison of commercial and military computer security policies, Security and Privacy, pp.184-184, 1987.

. Csec, Baseline Security Requirements for Network Security Zones in the Government of Canada, 2007.

F. Dalpiaz, E. Paja, and P. Giorgini, Security requirements engineering: designing secure socio-technical systems, 2016.

R. Hicham-el-khoury, F. Laborde, M. Barrère, A. Chamoun, and . Benzekri, A Formal Data Flow-Oriented Model For Distributed Network Security Conflicts Detection, The Eighth International Conference on Networking and Services, pp.20-27, 2012.

. Eurocontrol, Specification for Data Assurance Levels. EUROPEAN ORGANISATION FOR THE SAFETY OF AIR NAVIGATION, 2018.

M. Gebser, R. Kaminski, B. Kaufmann, and T. Schaub, Answer set solving in practice, Synthesis Lectures on Artificial Intelligence and Machine Learning, vol.6, pp.1-238, 2012.

M. Gebser, R. Kaminski, B. Kaufmann, and T. Schaub, Clingo= ASP+ control: Preliminary report, 2014.

A. Gontarczyk, P. Mcmillan, and C. Pavlovski, Blueprint for Cyber Security Zone Modeling, INFORMATION TECHNOLOGY IN INDUSTRY, vol.3, pp.38-45, 2015.

H. Holm, K. Shahzad, M. Buschle, and M. Ekstedt, P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language, IEEE Transactions on Dependable and Secure Computing, vol.12, pp.626-639, 2015.

. Itu-t, User Requirements Notation (URN) -Language definition, 2012.

R. Laborde, F. Barrère, and A. Benzekri, Toward authorization as a service: a study of the XACML standard, Proceedings of the 16th Communications & Networking Symposium, p.9, 2013.

R. Laborde and M. Kamel, Implementation of a Formal Security Policy Refinement Process in WBEM Architecture, Journal of Network and Systems Management, vol.15, pp.241-266, 2007.

C. Lyons, Enterprise IT security architecture security zones: Network security zone standards, 2012.

. Microsoft, What is the Windows Integrity Mechanism?, 2018.

R. Mitchell and E. Walkup, Further refinements to the foundations of cyber zone defense, Military Communications Conference (MILCOM), MILCOM 2017-2017 IEEE, pp.823-828, 2017.

. Price, True Planning guidance for estimating the cost impacts of ARP-4754, DO-254 and DO-178b/c certification, 2015.

V. Harigovind, C. Ramasamy, B. Tsao, N. Pfitzmann, J. W. Joukov et al., Towards Automated Identification of Security Zone Classification in Enterprise Networks, Hot-ICE, 2011.

J. H. Saltzer and M. D. Schroeder, The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, pp.1278-1308, 1975.

. Securarc, Logical Security Zone Pattern

A. Sedgewick, Framework for improving critical infrastructure cybersecurity, 2014.

U. Shankar, T. Jaeger, and R. Sailer, Toward Automated Information-Flow Integrity Verification for Security-Critical Applications, NDSS, 2006.