Publications de Muhammad-Nafees Qamar

Load the BibTeX file

Thèses et habilitations à diriger les recherches

  1. Muhammad Nafees Qamar. Spécification et animation de modèles de conception de la sécurité avec Z. Thèse de l'Université de Grenoble, Décembre 2011. details pdf

Conférences internationales

  1. Muhammad Nafees Qamar, Johannes Faber, Yves Ledru, Zhiming Liu. Automated Reviewing of Healthcare Security Policies. In Postproceedings of the 2nd Intl Symposium on the Foundations of Health Information Engineering and Systems - FHIES 2012, Lecture Notes in Computer Science, Volume 7789, Pages 176-193, 2013. details doi
  2. Muhammad Nafees Qamar, Johannes Faber, Yves Ledru, Zhiming Liu. Automated Reviewing of Healthcare Security Policies. In Preproceedings of the 2nd Intl Symposium on the Foundations of Health Information Engineering and Systems - FHIES 2012, Pages 176-193, 2012. details
  3. Muhammad Nafees Qamar, Yves Ledru, Akram Idani. Validation of Security-Design Models using Z. In Proceedings of the 13th International Conference on Formal Engineering Methods (ICFEM 2011), LNCS, Volume 6991, Pages 259-274, Durham, United Kingdom, Octobre 2011. details
  4. Yves Ledru, Muhammad Nafees Qamar, Akram Idani, Jean-Luc Richier, Mohamed-Amine Labiadh. Validation of Security Policies by the Animation of Z Specifications. In SACMAT 2011, 16th ACM Symposium on Access Control Models and Technologies, Ruth Breu, Jason Crampton, Jorge Lobo (eds.), Pages 155-164, Innsbruck, Austria, 2011. details
  5. Muhammad Nafees Qamar. Analysis and Composition of Multiple Aspects in Aspect Oriented Programs. In 16th IEEE Asia-Pacific Software Engineering Conference, Pages 223-230, Décembre 2009. details

Communications avec actes

  1. Muhammad Nafees Qamar, Yves Ledru, Akram Idani. Evaluating RBAC Supported Techniques and Their Validation and Verification. In Fifth International Workshop on Secure Software Engineering (SecSE'11) in conjunction with 6th IEEE International Conference on Availability, Reliability and Security (ARES'11), Pages 734-739, Vienna, Austria, Août 2011. details
  2. Y. Ledru, A. Idani, J. Milhau, M.-N. Qamar, R. Laleau, J.-L. Richier, M.-A. Labiadh. Taking into account functional models in the validation of IS security policies. In WISSE 2011, Advanced Information Systems Engineering Workshops - CAiSE 2011 International Workshops, Camille Salinesi, Oscar Pastor (eds.), Lecture Notes in Business Information Processing, Volume 83, Pages 592-606, London, UK, 2011. details


Cette page a été générée automatiquement par bib2html.