1. Basin D., Clavel M., Doser J., Egea M.: Automated analysis of security-design models. Inf. Softw. Technol. 51(5), 815–831 (2009)
2. Basin D.A., Doser J., Lodderstedt T.: Model driven security: from UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15(1), 39–91 (2006)
3. Bézivin, J., Butner, F., Gogolla, M., Jouault, F., Kurtev, I., Lindow, A.: Model transformations? Transformation models!. In: Nierstrasz, O. (ed.) Proceedings of 9th international conference on model driven engineering languages and system, MoDELS 2006, Genova, Italy, October 1–6, Lecture Notes in Computer Science, vol. 4199, pp. 440–453. Springer, Berlin (2006)
4. Bouhoula A., Jouannaud J.-P., Meseguer J.: Specification and proof in membership equational logic. Theor. Comput. Sci. 236(1–2), 35–132 (2000)
5. Braga, C.: From access control policies to aspect code: a metamodel-based approach. In: Chaudron, M.R.V. (ed.) Proceedings of the 11th international conference on model driven engineering languages and systems (MODELS 2008), workshops and symposia at MODELS 2008, September 28–October 3, 2008, Toulouse, France. Lecture Notes in Computer Science, vol. 5421. Springer, Berlin (2008). (Also appeared in the proceedings of the 1st International Workshop on Non-functional System Properties in Domain Specific Modeling Language NFPinDSML-2008, Toulouse, France, September 28, 2008, Edited by Marko Boskovic, Dragan Gasevic, Claus Pahl and Bernhard Schatz, http://CEUR-WS.org/Vol-394/ )