Publications 2011

Books

  1. Yves Ledru, Anne-Françoise Le Meur, Olivier Caron. Actes des troisièmes journées nationales du GDR CNRS Génie de la Programmation et du Logiciel. Université de Lille, June 2011. details

Academic Journals

  1. J. Milhau, A. Idani, R. Laleau, M. A. Labiadh, Y. Ledru, M. Frappier. Combining UML, ASTD and B for the formal specification of an access control filter. Innov. Syst. Softw. Eng, 7:303-313, December 2011. details doi doi
  2. Yliès Falcone, Laurent Mounier, Jean-Claude Fernandez, Jean-Luc Richier. Runtime enforcement monitors: composition, synthesis, and enforcement abilities. Formal Methods in System Design, 38(3):223-262, June 2011. details

International Conferences

  1. Y. Falcone, M. Jaber, Th-H. Nguyen, M. Bozga, S. Bensalem. Runtime Verification of Component-Based Systems. In SEFM11: International Conference of Software Engineering and Formal Methods, Pages 204-220, 2011. details
  2. Yves Grasland, Lydie du Bousquet, Roland Groz, Ioannis Parissis. Home Automation Systems Testing : A Coverage Measure for Hybrid Automata. In Proceedings of the 23rd IFIP Int. Conference on Testing Software and Systems, ICTSS'2011, Burkhart Wolff, Fatiha Zaidi (eds.), Pages 5-12, Paris, France, November 2011. details
  3. Muhammad Nafees Qamar, Yves Ledru, Akram Idani. Validation of Security-Design Models using Z. In Proceedings of the 13th International Conference on Formal Engineering Methods (ICFEM 2011), LNCS, Volume 6991, Pages 259-274, Durham, United Kingdom, October 2011. details
  4. Virginia Papailiopoulou, Ajitha Rajan, Ioannis Parissis. Structural Test Coverage Criteria for Integration Testing of LUSTRE/SCADE Programs. In Workshop on Formal Methods for Industrial Critical Systems (FMICS), Pages 85-101, Trento, Italie, August 2011. details download
  5. Yves Ledru, Jean-Luc Richier, Akram Idani, Mohamed-Amine Labiadh. From KAOS to RBAC: A Case Study in Designing Access Control Rules from a Requirements Analysis. In Conference on Network and Information Systems Security (SAR-SSI 2011), Pages 157-164, La Rochelle, France, May 2011. details download
  6. Laya Madani, Ioannis Parissis. Automatically testing interactive multimodal systems using task trees and fusion models. In Proceeding of the 6th international workshop on Automation of Software Test (AST'11), Pages 43-49, États-Unis, May 2011. details doi download
  7. Sofia Bekrar, Chaouki Bekrar, Roland Groz, Laurent Mounier. Finding Software Vulnerabilities by Smart Fuzzing. In IEEE Fourth International Conference on Software Testing, Verification and Validation, ICST 2011, Pages 427-430, Berlin, Germany, March 2011. details
  8. Yves Grasland. Testing Resource Usage in Home Automation Systems. In Proceedings of the 2011 Fourth IEEE International Conference on Software Testing, Verification and Validation (ICST'11) (short paper: 4 pages), Pages 419-422, Berlin, March 2011. details
  9. Yves Ledru, Muhammad Nafees Qamar, Akram Idani, Jean-Luc Richier, Mohamed-Amine Labiadh. Validation of Security Policies by the Animation of Z Specifications. In SACMAT 2011, 16th ACM Symposium on Access Control Models and Technologies, Ruth Breu, Jason Crampton, Jorge Lobo (eds.), Pages 155-164, Innsbruck, Austria, 2011. details

National conferences or workshops

  1. Muhammad Nafees Qamar, Yves Ledru, Akram Idani. Evaluating RBAC Supported Techniques and Their Validation and Verification. In Fifth International Workshop on Secure Software Engineering (SecSE'11) in conjunction with 6th IEEE International Conference on Availability, Reliability and Security (ARES'11), Pages 734-739, Vienna, Austria, August 2011. details
  2. Karim Hossen, Roland Groz, Jean-Luc Richier. Security Vulnerabilities Detection Using Model Inference for Applications and Security Protocols. In Second International Workshop on Security Testing (SECTEST 2011), Workshop of the IEEE Fourth International Conference on Software Testing, Verification and Validation (ICST2011), Pages 534-536, Berlin, Germany, March 2011. details download
  3. Y. Ledru, A. Idani, J. Milhau, M.-N. Qamar, R. Laleau, J.-L. Richier, M.-A. Labiadh. Taking into account functional models in the validation of IS security policies. In WISSE 2011, Advanced Information Systems Engineering Workshops - CAiSE 2011 International Workshops, Camille Salinesi, Oscar Pastor (eds.), Lecture Notes in Business Information Processing, Volume 83, Pages 592-606, London, UK, 2011. details

Other communications

  1. Lydie du Bousquet, Yves Ledru, Taha Triki. Tobias a tool for combinatorial software testing (poster). Fourth International Conference on Software Testing, Verification and Validation (ICST 2011), Berlin, Allemagne, 2011. details

Thesis and habilitations

  1. Muhammad Nafees Qamar. Spécification et animation de modèles de conception de la sécurité avec Z. PhD Thesis Université de Grenoble, December 2011. details pdf


This page has been automatically generated using the bib2html program.