BACK TO INDEX
Articles in journal or book chapters
|
-
A. Myers and A. Sabelfeld.
Language-Based Information-Flow Security.
IEEE Journal on Selected Areas in Communications,
21(1):5--19,
2003.
-
J.-P. Bodeveix and M. Filali.
Reduction and quantifier elimination techniques for program validation.
Formal Methods in System Design,
20(1):69--89,
2002.
-
Jean-Claude Royer.
The GAT Approach to Specify Mixed Systems.
Informatica,
2002.
Note: To appear, ISSN 0350-5596, \texttthttp://ai.ijs.si/informatica/.
-
F. Besson,
T. Jensen,
D. Le Métayer,
and T. Thorn.
Model ckecking security prperties of control flow graphs.
Journal of Computer Security,
9:217--250,
2001.
-
J.-P. Bodeveix,
M. Filali,
and C.A. Munoz.
Formalisation de la méthode B en Coq et PVS.
Technique et Science Informatiques,
20(7):901--926,
July 2001.
-
Christine Choppy,
Pascal Poizat,
and Jean-Claude Royer.
The Korrigan Environment.
Journal of Universal Computer Science,
7(1):19-36,
2001.
Note: Special issue: Tools for System Design and Verification, ISSN: 0948-6968.
[WWW
]
-
F. Cuppens,
L. Cholvy,
C. Saurel,
and J. Carrère.
Merging regulations : analysis of a practical example.
International Journal of Intelligent Systems,
16(11),
November 2001.
-
F. Cuppens and A. Gabillon.
Cover Story Management.
Data and Knowledge Engineering,
37:177--201,
2001.
-
F. Cuppens and A. Gabillon.
Logical Foundations of Multilevel Databases.
Data and Knowledge Engineering,
29(3):259--291,
March 1999.
-
M. Aksit,
A. Black,
L. Cardelli,
P. Cointe,
and al.
Strategic Research Directions in Object Oriented Programming.
ACM Computing Surveys,
28(4):691-700,
December 1996.
[WWW
]
Keywords:
object-oriented programming,
aspect-oriented programming,
distributed programming,
design pattern,
framework.
-
P.B. Kruchten.
The $4+1$ View Model of Architecture.
IEEE Software,
pp 42-50,
1995.
-
Rajeev Alur and David L. Dill.
A theory of timed automata.
Theoretical Computer Science,
126(2):183--235,
1994.
[WWW
]
-
P. Bieber and F. Cuppens.
A Logical View of Secure Dependencies.
Journal of Computer Security,
1(1):99--129,
1992.
-
C. Yu and V. Gligor.
A Specification and Verification Method for Preventing Denial of Service.
IEEE Transactions on Software Engineering,
16(6):581--592,
June 1990.
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of
scholarly and technical work. Copyright and all rights therein
are retained by authors or by other copyright holders.
All person copying this information are expected to adhere to
the terms and constraints invoked by each author's copyright.
In most cases, these works may not be reposted
without the explicit permission of the copyright holder.
Les documents contenus dans ces répertoires sont rendus disponibles
par les auteurs qui y ont contribué en vue d'assurer la diffusion
à temps de travaux savants et techniques sur une base non-commerciale.
Les droits de copie et autres droits sont gardés par les auteurs
et par les détenteurs du copyright, en dépit du fait qu'ils présentent
ici leurs travaux sous forme électronique. Les personnes copiant ces
informations doivent adhérer aux termes et contraintes couverts par
le copyright de chaque auteur. Ces travaux ne peuvent pas être
rendus disponibles ailleurs sans la permission explicite du détenteur
du copyright.
Last modified: Wed Oct 29 14:44:30 2003
Author: jensen.
This document was translated from BibTEX by
bibtex2html