BACK TO INDEX

All publications sorted by (null)
    1. C. Szyperski. Component Software. Addison-Wesley, 2002.
      Note: 2nd edition. [bibtex-key = Szyperski-2002]


    2. Proceedings of the 24th International Conference on Software Engineering, Orlando, FL, USA, May 2002. ACM Press. [bibtex-key = icse2002]


    3. A. Yonezawa and S. Matsuoka, editors. Meta-Level Architectures and Separation of Crosscutting Concerns, Third International Conference, Reflection 2001, volume 2192 of Lecture Notes in Computer Science, Kyoto, Japan, September 2001. Springer-Verlag. [bibtex-key = reflection2001]


    4. R. Sessions. COM+ and the battle for the Middle Tier. Wiley, 2000. [bibtex-key = Sessions:2000]


    5. V. Gruhn, editor. Proceedings of the 15th IEEE International Conference on Automated Software Engineering (ASE 2000), Grenoble, France, September 2000. ieee. [bibtex-key = ase2000]


    6. P. Naur and Randell B., editors. Proceedings of the NATO Conference on Software Engineering, Garmish, Germany, October 1968. NATO Science Committee. [bibtex-key = Naur-Randell:68]


    7. A. Myers and A. Sabelfeld. Language-Based Information-Flow Security. IEEE Journal on Selected Areas in Communications, 21(1):5--19, 2003. [bibtex-key = Myers:03:InformationFlow]


    8. J.-P. Bodeveix and M. Filali. Reduction and quantifier elimination techniques for program validation. Formal Methods in System Design, 20(1):69--89, 2002. [bibtex-key = [BF99c]]


    9. Jean-Claude Royer. The GAT Approach to Specify Mixed Systems. Informatica, 2002.
      Note: To appear, ISSN 0350-5596, \texttthttp://ai.ijs.si/informatica/. [bibtex-key = informatica]


    10. F. Besson, T. Jensen, D. Le Métayer, and T. Thorn. Model ckecking security prperties of control flow graphs. Journal of Computer Security, 9:217--250, 2001. [bibtex-key = Besson:01:ModelChecking]


    11. J.-P. Bodeveix, M. Filali, and C.A. Munoz. Formalisation de la méthode B en Coq et PVS. Technique et Science Informatiques, 20(7):901--926, July 2001. [bibtex-key = [BFM01]]


    12. Christine Choppy, Pascal Poizat, and Jean-Claude Royer. The Korrigan Environment. Journal of Universal Computer Science, 7(1):19-36, 2001.
      Note: Special issue: Tools for System Design and Verification, ISSN: 0948-6968. [WWW ] [bibtex-key = jucs2000]


    13. F. Cuppens, L. Cholvy, C. Saurel, and J. Carrère. Merging regulations : analysis of a practical example. International Journal of Intelligent Systems, 16(11), November 2001. [bibtex-key = CCSC01]


    14. F. Cuppens and A. Gabillon. Cover Story Management. Data and Knowledge Engineering, 37:177--201, 2001. [bibtex-key = CG01]


    15. F. Cuppens and A. Gabillon. Logical Foundations of Multilevel Databases. Data and Knowledge Engineering, 29(3):259--291, March 1999. [bibtex-key = CG99]


    16. M. Aksit, A. Black, L. Cardelli, P. Cointe, and al. Strategic Research Directions in Object Oriented Programming. ACM Computing Surveys, 28(4):691-700, December 1996. [WWW ]
      Keywords: object-oriented programming, aspect-oriented programming, distributed programming, design pattern, framework. [bibtex-key = abcc+96a]


    17. P.B. Kruchten. The $4+1$ View Model of Architecture. IEEE Software, pp 42-50, 1995. [bibtex-key = kru95a]


    18. Rajeev Alur and David L. Dill. A theory of timed automata. Theoretical Computer Science, 126(2):183--235, 1994. [WWW ] [bibtex-key = alur94theory]


    19. P. Bieber and F. Cuppens. A Logical View of Secure Dependencies. Journal of Computer Security, 1(1):99--129, 1992. [bibtex-key = BC92a]


    20. C. Yu and V. Gligor. A Specification and Verification Method for Preventing Denial of Service. IEEE Transactions on Software Engineering, 16(6):581--592, June 1990. [bibtex-key = YG90]


    21. F. Besson and T. Jensen. Modular class analysis with datalog. In R. Cousot, editor, Proc. of 10th Int. Static Analysis Symposium (SAS'2003), 2003. To appera in Springer LNCS. [bibtex-key = Besson:03:Modular]


    22. A. Abou El Kalam, R. El Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miège, C. Saurel, and G. Trouessin. Organization Based Access Control. In Policy'2003, Como, Italie, June 2003. [bibtex-key = KBBBCDMST03]


    23. M. Ségura-Devillechaise and J.-M. Menaud. microDyner : Un noyau efficace pour le tissage dynamique d'aspects sur processus natif en cours d'exécution. In LMO 2003, Vannes, pages 119-133, February 2003. Hermès. [bibtex-key = segura-menaud.lmo2003]


    24. M. Ségura-Devillechaise, J.-M. Menaud, G. Muller, and J. Lawall. Web Cache Prefetching as an aspect: Towards a Dynamic-Weaving Based Solution. In Proceedings of the 2nd international conference on Aspect-oriented software development, Enschede, The Netherlands, 2003. ACM Press.
      Note: À paraître.
      Abstract: Given the high proportion of HTTP traffic in the Internet, Web caches are crucial to reduce user access time, network latency, and bandwidth consumption. Prefetching in a Web cache can further enhance these benefits. Nevertheless, to achieve the best performance, the prefetching policy must match user and Web server characteristics. This implies that new prefetching policies must be loaded dynamically as needs change. Most Web caches are large C programs, and thus adding a single prefetching policy to an existing Web cache is a daunting task. Providing multiple policies is even more complex. The essential problem is that prefetching concerns crosscut the cache structure. Aspect-oriented programming is a natural technique to address this issue. Nevertheless, existing approaches do not provide dynamic weaving of aspects targeted toward C applications. In this paper, we present $\mu$Dyner, which addresses these needs. $\mu$Dyner also provides lower overhead for aspect invocation than other dynamic approaches, thus meeting the performance needs of Web caches.
      [bibtex-key = segura-menaud-al.aosd2003]


    25. J. Aldrich, C. Chambers, and D. Notkin. ArchJava: Connecting Software Architecture to Implementation. In Proceedings of the 24th International Conference on Software Engineering, Orlando, FL, USA, pages 187-197, May 2002. ACM Press. [bibtex-key = Aldrich-Chambers-Notkin:icse2002]


    26. Michel Allemand and Jean-Claude Royer. Mixed Formal Specification with PVS. In Proceedings of the 15th IPDPS 2002 Symposium, FMPPTA, 2002. IEEE Computer Society. [bibtex-key = fmppta2002]


    27. F. Besson, T. de Grenier de Latour, and T. Jensen. Secure calling contexts for stack inspection. In Proc. of 4th Int Conf. on Principles and Practice of Declarative Programming (PPDP 2002), pages 76--87, 2002. ACM Press. [bibtex-key = Besson:02:CallingContexts]


    28. G. Bobeff and J. Noyé. Component Specialization: Towards Deeper Adaptation. In Syste`mes a` composants adaptables et extensibles, Grenoble, France, October 2002. [bibtex-key = bobeff-noye.jc2002]


    29. G. Bobeff and J. Noyé. On the Interaction of Partial Evaluation and Inheritance. In First Inheritance Workshop at ECOOP 2002, Malaga, Spain, June 2002.
      Abstract: In this paper, we consider a direct, source-to-source, specialization of Java programs. In this setting, specialization does not boil down to partially evaluating functions (here called methods) any longer. Indeed, specialized methods have also to be encapsulated into residual classes. We show that inheritance offers new specialization opportunities but that these opportunities are not so easy to benefit from because of some deep incompatibilities between specialization as partial evaluation and specialization as inheritance in standard object-oriented languages.
      [bibtex-key = bobeff-noye.inhw-ecoop2002]


    30. F. Cuppens and A. Miège. Alert Correlation in a Cooperative Intrusion Detection Framework. In IEEE Symposium on Security and Privacy, Oakland, USA, 2002. [bibtex-key = Cup02]


    31. R. Douence, P. Fradet, and M. Südholt. A framework for the detection and resolution of aspect interactions. In Proceedings of the ACM SIGPLAN/SIGSOFT Conference on Generative Programming and Component Engineering (GPCE'02), pages 173--188, October 2002.
      Note: Preprint version is ftp://ftp.inria.fr/INRIA/publication/publi-pdf/RR/RR-4435.pdf.
      Keywords: aop, static analysis.
      Abstract: Aspect-Oriented Programming (AOP) promises separation of concerns at the implementation level. However, aspects are not always orthogonal and aspect interaction is an important problem. Currently there is almost no support for the detection and resolution of such interactions. The programmer is responsible for identifying interactions between conflicting aspects and implementing conflict resolution code. In this paper, we propose a solution to this problem based on a generic framework for AOP. The contributions are threefold: we present a formal and expressive crosscut language, two static conflict analyses and some linguistic support for conflict resolution.
      [bibtex-key = dfs02a]


    32. Rémi Douence, Pascal Fradet, and Mario Südholt. A framework for the detection and resolution of aspect interactions. In Proceedings of the ACM SIGPLAN/SIGSOFT Conference on Generative Programming and Component Engineering, 2002. Springer-Verlag, Lecture Notes in Computer Science 2487. [bibtex-key = Douence:02:AspectInteraction]


    33. Marc Eluard and Thomas Jensen. Secure object flow analysis for Java Card. In Proc. of 5th Smart Card Research and Advanced Application Conference (Cardis'02), pages 97--110, 2002. IFIP/USENIX. [bibtex-key = Eluard:02:JavaCard]


    34. A. Farias, Y.-G. Guéhéneuc, and M. Südholt. Integrating Behavioral Protocols in Enterprise Java Beans. In B. Kenneth and K. Haim, editors, Eleventh OOPSLA Workshop on Behavioral Semantics: Serving the Customer, pages 80--89, October 2002.
      Keywords: protocols, component models, detection, verification, EJB, JavaBeans. [bibtex-key = farias-gueheneuc-sudholt.bs-oopsla2002]


    35. Andrés Farìas and Mario Südholt. On components with explicit protocols satisfying a notion of correctness by construction. In International Symposium on Distributed Objects and Applications (DOA), LNCS, 2002.
      Note: To appear. [bibtex-key = farias-sudholt.doa2002]


    36. Andrés Farìas and Mario Südholt. On components with explicit protocols satisfying a notion of correctness by construction. In International Symposium on Distributed Objects and Applications (DOA), LNCS, 2002.
      Note: To appear. [bibtex-key = fs02b]


    37. S. Gombault and M. Diop. Mirador : reaction facility. In NATO Information Systems Technology Panel Symposium on Real Time Intrusion Detection, Lisbonne, May 2002. [bibtex-key = GD02]


    38. Y.-G. Guéhéneuc, R. Douence, and N. Jussien. No Java without Caffeine -- A Tool for Dynamic Analysis of Java Programs. In Proceedings of ASE 2002 : 17th International IEEE Conference on Automated Software Engineering, Edinburgh, UK, September 2002. [bibtex-key = gueheneuc-douence-jussien.ase2002]


    39. E. Tanter, M. Ségura-Devillechaise, J. Noyé, and J. Piquer. Altering Java Semantics via Bytecode Manipulation. In Proceedings of the ACM SIGPLAN/SIGSOFT Conference on Generative Programming and Component Engineering (GPCE'02), Lecture Notes in Computer Science, Pittsburgh, USA, October 2002. Springer-Verlag. [bibtex-key = tanter-segura-al.gpce2002]


    40. A. Bouabdallah and M. Laurent-Maknavicius. Formal validation of an ATM security context negotiation protocol. In I3S International Symposium on Software and Systems, Constantine, pages 25--33, February 2001. [bibtex-key = BLM01]


    41. Christine Choppy, Pascal Poizat, and Jean-Claude Royer. Formal Specification of Mixed Components with Korrigan. In Proceedings of the 8th Asia-Pacific Software Engineering Conference, APSEC'2001, pages 169--176, 2001. IEEE.
      Note: ISBN: 0-7695-1408-1. [bibtex-key = apsec2001]


    42. Christine Choppy, Pascal Poizat, and Jean-Claude Royer. Specification of Mixed Systems in KORRIGAN with the Support of a UML-Inspired Graphical Notation. In Heinrich Hussmann, editor, Fundamental Approaches to Software Engineering. 4th International Conference, FASE 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genova, Italy, April 2-6. 2001 Proceedings, volume 2029 of LNCS, pages 124--139, 2001. Springer. [bibtex-key = fase2001CCPP]


    43. F. Cuppens. Managing Alerts in a Multi-Intrusion Detection Environment. In 17th Annual Computer Security Applications Conference New-Orleans, New-Orleans, USA, December 2001. [bibtex-key = Cup01]


    44. Rémi Douence, Olivier Motelet, and Mario Südholt. A formal definition of crosscuts. In A. Yonezawa and S. Matsuoka, editors, Meta-Level Architectures and Separation of Crosscutting Concerns, Third International Conference, Reflection 2001, volume 2192 of Lecture Notes in Computer Science, Kyoto, Japan, pages 170-186, September 2001. Springer-Verlag. [WWW ]
      Keywords: aop, formal semantics.
      Abstract: Crosscutting, i.e. relating different program points is one of the key notions of Aspect-Oriented Programming. In this report, we consider a general and operational model for crosscutting based on execution monitors. A domain-specific language for the definition of crosscuts constitutes the core of the report. The semantics of this language is formally defined by means of parser operators matching event patterns in execution traces. We define an operational semantics of the matching process by means of rules relating the operators. The use of the language is exemplified by several sophisticated crosscut definitions. We sketch a prototype implementation in Java default which has been systematically derived from the language definition.
      [bibtex-key = dms01a]


    45. Jean-Claude Royer. Formal Specification and Temporal Proof Techniques for Mixed Systems. In Proceedings of the 15th IPDPS 2001 Symposium, FMPPTA, San Francisco, USA, 2001. IEEE Computer Society. [bibtex-key = fmppta2001]


    46. Jean-Paul Bodeveix and Mamoun Filali. FMona: a tool for expressing validation techniques over infinite state systems. In Susanne Graf and Michael Schwartzbach, editors, Tools and algorithms for the construction and analysis of systems TACAS, Berlin, volume 1785 of Lecture Notes in Computer Science, Berlin, pages 204-219, 27-31 mars 2000. Springer-Verlag.
      Keywords: abstraction, transition systems, model checkers, monadic second order logic. [bibtex-key = [BF00]]


    47. T. Colcombet and P. Fradet. Enforcing trace properties by program transformation. In Proc. of Principles of Programming Languages, pages 54-66, 2000. ACM Press. [bibtex-key = POPL2000]


    48. F. Cuppens and R. Ortalo. LAMBDA: A Language to Model a Database for Detection of Attacks. In Third International Workshop on the Recent Advances in Intrusion Detection (RAID'2000), Toulouse, France, October 2000. [bibtex-key = CO00]


    49. F. Cuppens and C. Saurel. Towards a formalization of availability and denial of service. In Information Systems Technology Panel Symposium on Protecting Nato Information Systems in the 21st Century, Washington, 1999. [bibtex-key = CS99]


    50. T. Jensen, D. Le Métayer, and T. Thorn. Verification of control flow based security properties. In Proc. of the 20th IEEE Symp. on Security and Privacy, pages 89--103, 1999. New York: IEEE Computer Society. [bibtex-key = Jensen:99:Verification]


    51. J.-P. Bodeveix and M. Filali. On the automatic validation of parameterized Unity programs. In J. Rolim, editor, Workshop on formal methods for parallel programming: theory and applica tions, volume 1388 of Lecture Notes in Computer Science, Berlin, Germany, pages 807-819, 1998. Springer-Verlag. [bibtex-key = [BF98]]


    52. L. Cholvy and F. Cuppens. Analyzing Consistency of Security Policies. In IEEE Symposium on Security and Privacy, Oakland, 1997. [bibtex-key = CC97]


    53. F. Cuppens and R. Demolombe. A modal logical framework for security policies. In Foundations of Intelligent Systems. 10th International Symposium ISMIS'97. LNAI 1325, 1997. Springer. [bibtex-key = CD97]


    54. J.G. Henriksen, J.L. Jensen, M.S. Jorgensen, N. Klarlund, R. Paige, T. Rauhe, and A.B. Sandholm. MONA: Monadic second-order logic in practice. In Workshop on Tools and Algorithms for the Construction and Analysis of Systems, http://www.brics.dk/ mona, Aarhus, pages 58-73, May 1995. [bibtex-key = [HJJKPRS95]]


    55. N. Boulahia-Cuppens and F. Cuppens. Asynchronous composition and required security condition. In IEEE Symposium on Security and Privacy, Oakland, 1994. [bibtex-key = BCC94]


    56. N. Boulahia-Cuppens, F. Cuppens, A. Gabillon, and K. Yazdanian. Decomposition of Multilevel Objects in an Object-Oriented Database. In European symposium on research in computer security, Brighton, UK, 1994. Springer Verlag. [bibtex-key = Bou94b]


    57. J. McLean. A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions. In IEEE Symposium on Security and Privacy, Oakland, 1994. [bibtex-key = McL94]


    58. F. Cuppens. A Logical Analysis of Authorized and Prohibited Information Flows. In IEEE Symposium on Security and Privacy, Oakland, 1993. [bibtex-key = Cup93]


    59. J.R. Burch, E.M. Clarke, K.L. McMillan, and D.L. Dill. Symbolic model checking: 10E20 states and beyond. In 5th Symposium on Logic in Computer Science, June 1990. [bibtex-key = [BCMD90]]


    60. J. Millen. Hookup Security for Synchronous Machines. In Proc. of the computer security foundations workshop, Franconia, 1990. [bibtex-key = Mil90]


    61. D. Johnson and F. Thayer. Security and the Composition of Machines. In Proc. of the computer security foundations workshop, Franconia, 1988. [bibtex-key = JT89]


    62. D. McCullough. Noninterference and the Composability of Security Properties. In IEEE Symposium on Security and Privacy, Oakland, 1988. [bibtex-key = McCu88a]


    63. D. McCullough. Specifications for Multi-Level Security and a Hook-Up Property. In IEEE Symposium on Security and Privacy, Oakland, 1987. [bibtex-key = McCu87]


    64. D. Sutherland. A Model of Information. In Proceedings of the 9th National Computer Security Conference, 1986. [bibtex-key = Suth86]


    65. J. Goguen and J. Meseguer. Unwinding and Inference Control. In IEEE Symposium on Security and Privacy, Oakland, 1984. [bibtex-key = GM84]


    66. M.D. McIlroy. Mass produced software components. In P. Naur and Randell B., editors, Proceedings of the NATO Conference on Software Engineering, Garmish, Germany, pages 138-155, October 1968. NATO Science Committee. [bibtex-key = McIlroy:68]


    67. G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. Lopes, J.-M. Loingtier, and J. Irwin. Aspect-Oriented Programming. In , pages 220-242, . [bibtex-key = k+97a]


    68. A. Farias and M. Südholt. On the construction of components with explicit protocols. Technical report 02/4/INFO, E'cole des Mines de Nantes, 2002.
      Abstract: Component-based programming promises to facilitate the construction of large-scale applications, which is supported by the important concept of interfaces. In most current component models, interfaces essentially declare types and sets of services that a component implements. They are not expressive enough to formulate many properties important for component collaboration. In this paper we consider an important class of such properties, sequencing constraints, which components must obey when calling one another services. We consider the integration into interfaces of sequencing properties by means of protocols formalized in terms of finite-state machines. The paper presents three contributions. First, a set of protocol composition operators and a discussion of correctness properties of such operators useful for component assembly. Second, we provide a first step toward the integration of additional state information into protocols. Finally, we show how JavaBeans can benefit from the techniques we present.
      [bibtex-key = farias-sudholt.tr2002]


    69. Object Management Group. CORBA Components. Adopted Specification formal/02-06-65, OMG, June 2002.
      Note: Version 3.0. [WWW ] [bibtex-key = CCM:2002]


    70. J.-P. Bodeveix and M. Filali. The FMONA tool. Technical report http://www.irit.fr/ACTIVITES/EQ_COS/MF/FMONA, IRIT, May 1999. [bibtex-key = [BF99b]]


    71. C. Saurel and F. Cuppens. Modélisation du concept de disponibilité. Technical report 1/3740.00 DTIM, ONERA DTIM, January 1999. [bibtex-key = [SC99]]


    72. W. Hürsch and C. Videira Lopes. Separation of Concerns. Technical report NU-CCS-95-03, Northeastern University, 1995. [WWW ]
      Keywords: aop, metaprogramming.
      Abstract: http://www.ccs.neu.edu/research/demeter/papers/publications-abstracts.html#SEP-CONCERNS
      [bibtex-key = hl95a]


    73. L.G. DeMichiel, L.Ü. Yalçinalp, and S. Krishnan. Enterprise JavaBeans$^{TM}$ Specification. SUN Microsystems, August 2001.
      Note: Version 2.0, Final Release. [bibtex-key = DeMichiel-UmitYalcinalp-Krishnan:2001]


    74. J. Millen. A Ressource Allocation Model for Denial of Service, 1992. [bibtex-key = Mil92]


    75. The tool Kronos http://www-verimag.imag.fr/TEMPORISE/kronos/. [bibtex-key = kronosurl]


    76. UPPAAL - A Tool Suite for Verification of Real-Time Systems - http:// www.docs.uu.se/docs/rtmv/uppaal/. [bibtex-key = uppaalurl]



    BACK TO INDEX




    Disclaimer:

    This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

    Les documents contenus dans ces répertoires sont rendus disponibles par les auteurs qui y ont contribué en vue d'assurer la diffusion à temps de travaux savants et techniques sur une base non-commerciale. Les droits de copie et autres droits sont gardés par les auteurs et par les détenteurs du copyright, en dépit du fait qu'ils présentent ici leurs travaux sous forme électronique. Les personnes copiant ces informations doivent adhérer aux termes et contraintes couverts par le copyright de chaque auteur. Ces travaux ne peuvent pas être rendus disponibles ailleurs sans la permission explicite du détenteur du copyright.




    Last modified: Wed Oct 29 14:44:30 2003
    Author: jensen.


    This document was translated from BibTEX by bibtex2html