Search

Your search keyword '"Amel Mammar"' showing total 28 results

Search Constraints

Start Over You searched for: Author "Amel Mammar" Remove constraint Author: "Amel Mammar" Search Limiters Full Text Remove constraint Search Limiters: Full Text
28 results on '"Amel Mammar"'

Search Results

1. A formal refinement-based analysis of the hybrid ERTMS/ETCS level 3 standard

2. An Event-B model of an automotive adaptive exterior light system

3. Modelling Hybrid Programs with Event-B

4. SGAC: a multi-layered access control model with conflict resolution strategy

5. A formal validation of the RBAC ANSI 2012 standard using B

6. An automated approach for merging business process fragments

7. Towards correct cloud resource allocation in FOSS applications

8. Parameterized verification of monotone information systems

9. Modeling the hybrid ERTMS/ETCS level 3 standard using a formal requirements engineering approach

10. A formal approach to derive an aspect oriented programming-based implementation of a secure access control filter

11. Modeling a landing gear system in Event-B

12. Proving the Absence Property Pattern Using the B Method

13. A systematic approach to integrate common timed security rules within a TEFSM-based system specification

14. Using testing techniques for vulnerability detection in C programs

15. Proving reachability in B using substitution refinement

16. A formal framework to integrate timed security rules within a TEFSM-based system specification

17. Industrialising a proof-based verification approach of computerised interlocking systems

18. From a B formal specification to an executable code: application to the relational database domain

19. UB2SQL: A Tool for Building Database Applications Using UML and B Formal Method

20. A formal approach based on UML and B for the specification and development of database applications

21. Efficient: A Toolset for Building Trusted B2B Transactions

22. An overview of a method and its support tool for generating B specifications from UML notations

23. Formal modeling of intrusion detection systems

24. Towards a tooled and proven formal requirements engineering approach

25. A model driven engineering approach to build secure information systems

26. Verification and validation of healthcare access control policies

27. Two complementary approaches to detecting vulnerabilities in C programs

28. Proving dynamic properties in B

Catalog

Books, media, physical & digital resources