Search

Your search keyword '"Amel Mammar"' showing total 53 results

Search Constraints

Start Over You searched for: Author "Amel Mammar" Remove constraint Author: "Amel Mammar" Topic 0202 electrical engineering, electronic engineering, information engineering Remove constraint Topic: 0202 electrical engineering, electronic engineering, information engineering
53 results on '"Amel Mammar"'

Search Results

1. A formal refinement-based analysis of the hybrid ERTMS/ETCS level 3 standard

2. An Event-B model of an automotive adaptive exterior light system

3. Intrusion detection using ASTDs

4. Modelling Hybrid Programs with Event-B

5. SGAC: a multi-layered access control model with conflict resolution strategy

6. Assessment of a formal requirements modeling approach on a transportation system

7. Intrusion detection systems: a cross-domain overview

8. Towards Correct Cloud Resource Allocation in Business Processes

9. A formal validation of the RBAC ANSI 2012 standard using B

10. An automated approach for merging business process fragments

11. Towards correct cloud resource allocation in FOSS applications

12. Extended algebraic state-transition diagrams

13. Back Propagating B System Updates on SysML/KAOS Domain Models

14. Parameterized verification of monotone information systems

15. Event-B expression and verification of translation rules between SysML/KAOS domain models and B system specifications

16. Modeling the hybrid ERTMS/ETCS level 3 standard using a formal requirements engineering approach

17. Proof-based verification approaches for dynamic properties: application to the information system domain

18. Formalisation of SysML/KAOS Goal Assignments with B System Component Decompositions

19. An Event-B Model of the Hybrid ERTMS/ETCS Level 3 Standard

20. A formal approach to derive an aspect oriented programming-based implementation of a secure access control filter

21. A verification and deployment approach for elastic component-based applications

22. Towards Using Ontologies for Domain Modeling within the SysML/KAOS Approach

23. Verification of SGAC Access Control Policies Using Alloy and ProB

24. A formal guidance approach for correct process configuration

25. An event-B based approach for ensuring correct configurable business processes

26. SGAC: a patient-centered access control method

27. A tool for the generation of a secure access control filter

28. Formal verification of cloud resource allocation in business processes using Event-B

29. Formal development of a secure access control filter

30. A proved approach for building correct instances of UML associations : multiplicities satisfaction

31. Modeling a landing gear system in Event-B

32. Business Process Fragments Behavioral Merge

33. A Behavior-Aware Systematic Approach For Merging Business Process Fragments

34. Process Decomposition Based on Semantics and Privacy-Aware Requirements-Driven Approach

35. An assertions-based approach to verifying the absence property pattern

36. Proving the Absence Property Pattern Using the B Method

37. A systematic approach to integrate common timed security rules within a TEFSM-based system specification

38. Proving non-interference on reachability properties : a refinement approach

39. Using testing techniques for vulnerability detection in C programs

40. Using requirements engineering in an automatic security policy derivation process

41. An overview of a proof-based approach to detecting C vulnerabilities

42. A proof-based approach to verifying reachability properties

43. Proving reachability in B using substitution refinement

44. A systematic approach to generate B preconditions : application to the database domain

45. A formal framework to integrate timed security rules within a TEFSM-based system specification

46. Modeling system security rules with time constraints using timed extended finite state machines

47. Industrialising a proof-based verification approach of computerised interlocking systems

48. From a B formal specification to an executable code: application to the relational database domain

49. UB2SQL: A Tool for Building Database Applications Using UML and B Formal Method

50. A formal approach based on UML and B for the specification and development of database applications

Catalog

Books, media, physical & digital resources