S. Arlt, A. Podelski, C. Bertolini, M. Schäf, I. Banerjee et al., Lightweight Static Analysis for GUI Testing, 2012 IEEE 23rd International Symposium on Software Reliability Engineering, pp.301-310, 2012.
DOI : 10.1109/ISSRE.2012.25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.593.9376

M. Bishop, What is computer security?, IEEE Security & Privacy Magazine, vol.1, issue.1, pp.67-69, 2003.
DOI : 10.1109/MSECP.2003.1176998

A. Abou, E. Kalam, R. E. Baida, P. Balbiani, and S. Benferhat, Frédéric Cuppens, Yves Deswarte, Alexandre Miege, Claire Saurel, and Gilles Trouessin. Or-bac : un modele de contrôle d'acces basé sur les organisations. Cahiers francophones de la recherche en sécurité de l'information, pp.30-43, 2003.

P. Hope and P. White, Software security requirement the foundation for security Available : http ://sqgne. org/presentations, Cigital Inc, 2007.

M. Vinay, . Igure, D. Ronald, and . Williams, Taxonomies of attacks and vulnerabilities in computer systems, IEEE Communications Surveys & Tutorials, vol.10, issue.1, 2008.

N. Jovanovic, C. Kruegel, and E. Kirda, Pixy: a static analysis tool for detecting Web application vulnerabilities, 2006 IEEE Symposium on Security and Privacy (S&P'06), p.6, 2006.
DOI : 10.1109/SP.2006.29

J. Jürjens, UMLsec: Extending UML for Secure Systems Development, International Conference on The Unified Modeling Language, pp.412-425, 2002.
DOI : 10.1007/3-540-45800-X_32

J. David, H. G. Kasik, and . George, Toward automatic generation of novice user test scripts, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI'96, pp.244-251, 1996.

E. Carl, . Landwehr, R. Alan, . Bull, P. John et al., A taxonomy of computer program security flaws, ACM Computing Surveys (CSUR), vol.26, issue.3, pp.211-254, 1994.

V. Lelli, A. Blouin, and B. Baudry, Classifying and Qualifying GUI Defects, 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST), pp.1-10, 2015.
DOI : 10.1109/ICST.2015.7102582

URL : https://hal.archives-ouvertes.fr/hal-01114724

V. Lelli, A. Blouin, B. Baudry, and F. Coulon, On model-based testing advanced GUIs, 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp.1-10, 2015.
DOI : 10.1109/ICSTW.2015.7107403

URL : https://hal.archives-ouvertes.fr/hal-01123647

X. Li and Y. Xue, BLOCK, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.247-256, 2011.
DOI : 10.1145/2076732.2076767

URL : https://hal.archives-ouvertes.fr/hal-00922230

T. Lodderstedt, D. Basin, and J. Doser, SecureUML: A UML-Based Modeling Language for Model-Driven Security, International Conference on the Unified Modeling Language, pp.426-441, 2002.
DOI : 10.1007/3-540-45800-X_33

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.6554

A. M. Memon and Q. Xie, Empirical evaluation of the fault-detection effectiveness of smoke regression test cases for GUI-based software, 20th IEEE International Conference on Software Maintenance, 2004. Proceedings., pp.8-17, 2004.
DOI : 10.1109/ICSM.2004.1357785

M. Atif and . Memon, An event-flow model of GUI-based applications for testing. Software Testing, Verification and Reliability, pp.137-157, 2007.

T. Mouelhi, Testing and Modeling Security Mechanisms in Web Applications, Institut National des Télécommunications, 2010.
URL : https://hal.archives-ouvertes.fr/tel-00544431

R. Araújo and D. Oliveira, Formal specification and verification of interactive systems with plasticity : applications to nuclear-plant supervision, 2015.

F. Ricca and P. Tonella, Analysis and testing of Web applications, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001, pp.25-34, 2001.
DOI : 10.1109/ICSE.2001.919078