Search

Your search keyword '"Amel Mammar"' showing total 45 results

Search Constraints

Start Over You searched for: Author "Amel Mammar" Remove constraint Author: "Amel Mammar" Publisher hal ccsd Remove constraint Publisher: hal ccsd
45 results on '"Amel Mammar"'

Search Results

1. A formal refinement-based analysis of the hybrid ERTMS/ETCS level 3 standard

2. An Event-B model of an automotive adaptive exterior light system

3. Intrusion detection using ASTDs

4. SGAC: a multi-layered access control model with conflict resolution strategy

5. Assessment of a formal requirements modeling approach on a transportation system

6. A formal requirements modeling approach: application to rail communication

7. Intrusion detection systems: a cross-domain overview

8. Towards correct cloud resource allocation in FOSS applications

9. Extended algebraic state-transition diagrams

10. Parameterized verification of monotone information systems

11. Event-B expression and verification of translation rules between SysML/KAOS domain models and B system specifications

12. Modeling the hybrid ERTMS/ETCS level 3 standard using a formal requirements engineering approach

13. A formal approach to derive an aspect oriented programming-based implementation of a secure access control filter

14. A verification and deployment approach for elastic component-based applications

15. Verification of SGAC Access Control Policies Using Alloy and ProB

16. A formal guidance approach for correct process configuration

17. An event-B based approach for ensuring correct configurable business processes

18. SGAC: a patient-centered access control method

19. A tool for the generation of a secure access control filter

20. Formal verification of cloud resource allocation in business processes using Event-B

21. Formal development of a secure access control filter

22. A proved approach for building correct instances of UML associations : multiplicities satisfaction

23. Modeling a landing gear system in Event-B

24. Safety demonstration for a rail signaling application in nominal and degraded modes using formal proof

25. An assertions-based approach to verifying the absence property pattern

26. A systematic approach to integrate common timed security rules within a TEFSM-based system specification

27. Proving non-interference on reachability properties : a refinement approach

28. Using testing techniques for vulnerability detection in C programs

29. Using requirements engineering in an automatic security policy derivation process

30. An overview of a proof-based approach to detecting C vulnerabilities

31. Proving reachability in B using substitution refinement

32. A systematic approach to generate B preconditions : application to the database domain

33. Modeling system security rules with time constraints using timed extended finite state machines

34. Industrialising a proof-based verification approach of computerised interlocking systems

35. From a B formal specification to an executable code: application to the relational database domain

36. UB2SQL: A Tool for Building Database Applications Using UML and B Formal Method

37. A formal approach based on UML and B for the specification and development of database applications

38. Modélisation formelle des systèmes de détection d'intrusions

39. Formal modeling of intrusion detection systems

40. Towards a tooled and proven formal requirements engineering approach

41. Vers une approche formelle d'ingénierie des exigences outillée et éprouvée

42. A model driven engineering approach to build secure information systems

43. Verification and validation of healthcare access control policies

44. Two complementary approaches to detecting vulnerabilities in C programs

45. Proving dynamic properties in B

Catalog

Books, media, physical & digital resources