169 results on '"Amel Mammar"'
Search Results
52. A Behavior-Aware Systematic Approach for Merging Business Process Fragments.
53. Verifying the Precedence Property Pattern Using the B Method.
54. A Proved Approach for Building Correct Instances of UML Associations: Multiplicities Satisfaction.
55. Formal Approach for Generating Privacy Preserving User Requirements-Based Business Process Fragments.
56. An Assertions-Based Approach to Verifying the Absence Property Pattern.
57. Proving the Absence Property Pattern Using the B Method.
58. Using Testing Techniques for Vulnerability Detection in C Programs.
59. Proving Non-interference on Reachability Properties: A Refinement Approach.
60. A proof-based approach to verifying reachability properties.
61. Using Requirements Engineering in an Automatic Security Policy Derivation Process.
62. From SysML/KAOS Domain Models to B System Specifications.
63. The Generic SysML/KAOS Domain Metamodel.
64. Proof-based verification approaches for dynamic properties: application to the information system domain.
65. A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification.
66. Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines.
67. Systematic Identification of Preconditions from Set-Based Integrity Constraints.
68. A Formal Approach and its Tool Support for the Specification and the Verification of Structural Properties on UML Activity Diagrams.
69. A formal framework to generate XPDL specifications from UML activity diagrams.
70. Efficient: A Toolset for Building Trusted B2B Transactions.
71. A Formal Semantics of Timed Activity Diagrams and its PROMELA Translation.
72. Design of an Automatic Prover Dedicated to the Refinement of Database Applications.
73. Formal Representation of SysML/KAOS Domain Model (Complete Version).
74. The SysML/KAOS Domain Modeling Approach.
75. Une Approche Formelle par Raffinement pour le Développement d'Applications Bases de Données Sûres.
76. A SPIN-based approach for detecting vulnerabilities in C programs.
77. A systematic approach to integrate common timed security rules within a TEFSM-based system specification.
78. An advanced approach for modeling and detecting software vulnerabilities.
79. An Overview of a Method and Its Support Tool for Generating B Specifications from UML Notations.
80. A Generic Process to Refine a B Specification into a Relational Database Implementation.
81. Proving Reachability in B using Substitution Refinement.
82. VDC-Based Dynamic Code Analysis: Application to C Programs.
83. A systematic approach to generate B preconditions: application to the database domain.
84. Implémentation JAVA d'une spAcification B. Application aux bases de données.
85. A formal approach based on UML and B for the specification and development of database applications.
86. UB2SQL: A Tool for Building Database Applications Using UML and B Formal Method.
87. From a B formal specification to an executable code: application to the relational database domain.
88. Développement formel par raffinement d'applications bases de données sûres.
89. An overview of a proof-based approach to detecting C vulnerabilities.
90. Integrating Domain Modeling Within a Formal Requirements Engineering Method
91. A formal refinement-based analysis of the hybrid ERTMS/ETCS level 3 standard
92. An Event-B model of an automotive adaptive exterior light system
93. Intrusion detection using ASTDs
94. Process Decomposition Based on Semantics and Privacy-Aware Requirements-Driven Approach.
95. SGAC: a multi-layered access control model with conflict resolution strategy
96. Assessment of a formal requirements modeling approach on a transportation system
97. Intrusion detection systems: a cross-domain overview
98. Towards Correct Cloud Resource Allocation in Business Processes
99. Towards correct cloud resource allocation in FOSS applications
100. Extended algebraic state-transition diagrams
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.