Publications 2011

Thèses et habilitations à diriger les recherches

  1. Muhammad Nafees Qamar. Spécification et animation de modèles de conception de la sécurité avec Z. Thèse de l'Université de Grenoble, Décembre 2011. details pdf

Ouvrages

  1. Yves Ledru, Anne-Françoise Le Meur, Olivier Caron. Actes des troisièmes journées nationales du GDR CNRS Génie de la Programmation et du Logiciel. Université de Lille, Juin 2011. details

Articles de journaux

  1. J. Milhau, A. Idani, R. Laleau, M. A. Labiadh, Y. Ledru, M. Frappier. Combining UML, ASTD and B for the formal specification of an access control filter. Innov. Syst. Softw. Eng, 7:303-313, Décembre 2011. details doi doi
  2. Yliès Falcone, Laurent Mounier, Jean-Claude Fernandez, Jean-Luc Richier. Runtime enforcement monitors: composition, synthesis, and enforcement abilities. Formal Methods in System Design, 38(3):223-262, Juin 2011. details

Conférences internationales

  1. Y. Falcone, M. Jaber, Th-H. Nguyen, M. Bozga, S. Bensalem. Runtime Verification of Component-Based Systems. In SEFM11: International Conference of Software Engineering and Formal Methods, Pages 204-220, 2011. details
  2. Yves Grasland, Lydie du Bousquet, Roland Groz, Ioannis Parissis. Home Automation Systems Testing : A Coverage Measure for Hybrid Automata. In Proceedings of the 23rd IFIP Int. Conference on Testing Software and Systems, ICTSS'2011, Burkhart Wolff, Fatiha Zaidi (eds.), Pages 5-12, Paris, France, Novembre 2011. details
  3. Muhammad Nafees Qamar, Yves Ledru, Akram Idani. Validation of Security-Design Models using Z. In Proceedings of the 13th International Conference on Formal Engineering Methods (ICFEM 2011), LNCS, Volume 6991, Pages 259-274, Durham, United Kingdom, Octobre 2011. details
  4. Virginia Papailiopoulou, Ajitha Rajan, Ioannis Parissis. Structural Test Coverage Criteria for Integration Testing of LUSTRE/SCADE Programs. In Workshop on Formal Methods for Industrial Critical Systems (FMICS), Pages 85-101, Trento, Italie, Août 2011. details download
  5. Yves Ledru, Jean-Luc Richier, Akram Idani, Mohamed-Amine Labiadh. From KAOS to RBAC: A Case Study in Designing Access Control Rules from a Requirements Analysis. In Conference on Network and Information Systems Security (SAR-SSI 2011), Pages 157-164, La Rochelle, France, Mai 2011. details download
  6. Laya Madani, Ioannis Parissis. Automatically testing interactive multimodal systems using task trees and fusion models. In Proceeding of the 6th international workshop on Automation of Software Test (AST'11), Pages 43-49, États-Unis, Mai 2011. details doi download
  7. Sofia Bekrar, Chaouki Bekrar, Roland Groz, Laurent Mounier. Finding Software Vulnerabilities by Smart Fuzzing. In IEEE Fourth International Conference on Software Testing, Verification and Validation, ICST 2011, Pages 427-430, Berlin, Germany, Mars 2011. details
  8. Yves Grasland. Testing Resource Usage in Home Automation Systems. In Proceedings of the 2011 Fourth IEEE International Conference on Software Testing, Verification and Validation (ICST'11) (short paper: 4 pages), Pages 419-422, Berlin, Mars 2011. details
  9. Yves Ledru, Muhammad Nafees Qamar, Akram Idani, Jean-Luc Richier, Mohamed-Amine Labiadh. Validation of Security Policies by the Animation of Z Specifications. In SACMAT 2011, 16th ACM Symposium on Access Control Models and Technologies, Ruth Breu, Jason Crampton, Jorge Lobo (eds.), Pages 155-164, Innsbruck, Austria, 2011. details

Communications avec actes

  1. Muhammad Nafees Qamar, Yves Ledru, Akram Idani. Evaluating RBAC Supported Techniques and Their Validation and Verification. In Fifth International Workshop on Secure Software Engineering (SecSE'11) in conjunction with 6th IEEE International Conference on Availability, Reliability and Security (ARES'11), Pages 734-739, Vienna, Austria, Août 2011. details
  2. Karim Hossen, Roland Groz, Jean-Luc Richier. Security Vulnerabilities Detection Using Model Inference for Applications and Security Protocols. In Second International Workshop on Security Testing (SECTEST 2011), Workshop of the IEEE Fourth International Conference on Software Testing, Verification and Validation (ICST2011), Pages 534-536, Berlin, Germany, Mars 2011. details download
  3. Y. Ledru, A. Idani, J. Milhau, M.-N. Qamar, R. Laleau, J.-L. Richier, M.-A. Labiadh. Taking into account functional models in the validation of IS security policies. In WISSE 2011, Advanced Information Systems Engineering Workshops - CAiSE 2011 International Workshops, Camille Salinesi, Oscar Pastor (eds.), Lecture Notes in Business Information Processing, Volume 83, Pages 592-606, London, UK, 2011. details

Autres communications

  1. Lydie du Bousquet, Yves Ledru, Taha Triki. Tobias a tool for combinatorial software testing (poster). Fourth International Conference on Software Testing, Verification and Validation (ICST 2011), Berlin, Allemagne, 2011. details


Cette page a été générée automatiquement par bib2html.