BACK TO INDEX
-
F. Besson and T. Jensen.
Modular class analysis with datalog.
In R. Cousot, editor,
Proc. of 10th Int. Static Analysis Symposium (SAS'2003),
2003.
To appera in Springer LNCS.
-
A. Abou El Kalam,
R. El Baida,
P. Balbiani,
S. Benferhat,
F. Cuppens,
Y. Deswarte,
A. Miège,
C. Saurel,
and G. Trouessin.
Organization Based Access Control.
In Policy'2003,
Como, Italie,
June 2003.
-
M. Ségura-Devillechaise and J.-M. Menaud.
microDyner : Un noyau efficace pour le tissage dynamique d'aspects sur processus natif en cours d'exécution.
In LMO 2003,
Vannes,
pages 119-133,
February 2003.
Hermès.
-
M. Ségura-Devillechaise,
J.-M. Menaud,
G. Muller,
and J. Lawall.
Web Cache Prefetching as an aspect: Towards a Dynamic-Weaving Based Solution.
In Proceedings of the 2nd international conference on Aspect-oriented software development,
Enschede, The Netherlands,
2003.
ACM Press.
Note: À paraître.
-
J. Aldrich,
C. Chambers,
and D. Notkin.
ArchJava: Connecting Software Architecture to Implementation.
In Proceedings of the 24th International Conference on Software Engineering,
Orlando, FL, USA,
pages 187-197,
May 2002.
ACM Press.
-
Michel Allemand and Jean-Claude Royer.
Mixed Formal Specification with PVS.
In Proceedings of the 15th IPDPS 2002 Symposium, FMPPTA,
2002.
IEEE Computer Society.
-
F. Besson,
T. de Grenier de Latour,
and T. Jensen.
Secure calling contexts for stack inspection.
In Proc. of 4th Int Conf. on Principles and Practice of Declarative Programming (PPDP 2002),
pages 76--87,
2002.
ACM Press.
-
G. Bobeff and J. Noyé.
Component Specialization: Towards Deeper Adaptation.
In Syste`mes a` composants adaptables et extensibles,
Grenoble, France,
October 2002.
-
G. Bobeff and J. Noyé.
On the Interaction of Partial Evaluation and Inheritance.
In First Inheritance Workshop at ECOOP 2002,
Malaga, Spain,
June 2002.
-
F. Cuppens and A. Miège.
Alert Correlation in a Cooperative Intrusion Detection Framework.
In IEEE Symposium on Security and Privacy,
Oakland, USA,
2002.
-
R. Douence,
P. Fradet,
and M. Südholt.
A framework for the detection and resolution of aspect interactions.
In Proceedings of the ACM SIGPLAN/SIGSOFT Conference on Generative Programming and Component Engineering (GPCE'02),
pages 173--188,
October 2002.
Note: Preprint version is ftp://ftp.inria.fr/INRIA/publication/publi-pdf/RR/RR-4435.pdf.
Keywords:
aop,
static analysis.
-
Rémi Douence,
Pascal Fradet,
and Mario Südholt.
A framework for the detection and resolution of aspect interactions.
In Proceedings of the ACM SIGPLAN/SIGSOFT Conference on Generative Programming and Component Engineering,
2002.
Springer-Verlag, Lecture Notes in Computer Science 2487.
-
Marc Eluard and Thomas Jensen.
Secure object flow analysis for Java Card.
In Proc. of 5th Smart Card Research and Advanced Application Conference (Cardis'02),
pages 97--110,
2002.
IFIP/USENIX.
-
A. Farias,
Y.-G. Guéhéneuc,
and M. Südholt.
Integrating Behavioral Protocols in Enterprise Java Beans.
In B. Kenneth and K. Haim, editors,
Eleventh OOPSLA Workshop on Behavioral Semantics: Serving the Customer,
pages 80--89,
October 2002.
Keywords:
protocols,
component models,
detection,
verification,
EJB,
JavaBeans.
-
Andrés Farìas and Mario Südholt.
On components with explicit protocols satisfying a notion of correctness by construction.
In International Symposium on Distributed Objects and Applications (DOA),
LNCS,
2002.
Note: To appear.
-
Andrés Farìas and Mario Südholt.
On components with explicit protocols satisfying a notion of correctness by construction.
In International Symposium on Distributed Objects and Applications (DOA),
LNCS,
2002.
Note: To appear.
-
S. Gombault and M. Diop.
Mirador : reaction facility.
In NATO Information Systems Technology Panel Symposium on Real Time Intrusion Detection,
Lisbonne,
May 2002.
-
Y.-G. Guéhéneuc,
R. Douence,
and N. Jussien.
No Java without Caffeine -- A Tool for Dynamic Analysis of Java Programs.
In Proceedings of ASE 2002 : 17th International IEEE Conference on Automated Software Engineering,
Edinburgh, UK,
September 2002.
-
E. Tanter,
M. Ségura-Devillechaise,
J. Noyé,
and J. Piquer.
Altering Java Semantics via Bytecode Manipulation.
In Proceedings of the ACM SIGPLAN/SIGSOFT Conference on Generative Programming and Component Engineering (GPCE'02),
Lecture Notes in Computer Science,
Pittsburgh, USA,
October 2002.
Springer-Verlag.
-
A. Bouabdallah and M. Laurent-Maknavicius.
Formal validation of an ATM security context negotiation protocol.
In I3S International Symposium on Software and Systems,
Constantine,
pages 25--33,
February 2001.
-
Christine Choppy,
Pascal Poizat,
and Jean-Claude Royer.
Formal Specification of Mixed Components with Korrigan.
In Proceedings of the 8th Asia-Pacific Software Engineering Conference, APSEC'2001,
pages 169--176,
2001.
IEEE.
Note: ISBN: 0-7695-1408-1.
-
Christine Choppy,
Pascal Poizat,
and Jean-Claude Royer.
Specification of Mixed Systems in KORRIGAN with the Support of a UML-Inspired Graphical Notation.
In Heinrich Hussmann, editor,
Fundamental Approaches to Software Engineering. 4th International Conference, FASE 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genova, Italy, April 2-6. 2001 Proceedings,
volume 2029 of LNCS,
pages 124--139,
2001.
Springer.
-
F. Cuppens.
Managing Alerts in a Multi-Intrusion Detection Environment.
In 17th Annual Computer Security Applications Conference New-Orleans,
New-Orleans, USA,
December 2001.
-
Rémi Douence,
Olivier Motelet,
and Mario Südholt.
A formal definition of crosscuts.
In A. Yonezawa and S. Matsuoka, editors,
Meta-Level Architectures and Separation of Crosscutting Concerns, Third International Conference, Reflection 2001,
volume 2192 of Lecture Notes in Computer Science,
Kyoto, Japan,
pages 170-186,
September 2001.
Springer-Verlag.
[WWW
]
Keywords:
aop,
formal semantics.
-
Jean-Claude Royer.
Formal Specification and Temporal Proof Techniques for Mixed Systems.
In Proceedings of the 15th IPDPS 2001 Symposium, FMPPTA,
San Francisco, USA,
2001.
IEEE Computer Society.
-
Jean-Paul Bodeveix and Mamoun Filali.
FMona: a tool for expressing validation techniques over infinite state systems.
In Susanne Graf and Michael Schwartzbach, editors,
Tools and algorithms for the construction and analysis of systems TACAS, Berlin,
volume 1785 of Lecture Notes in Computer Science,
Berlin,
pages 204-219,
27-31 mars 2000.
Springer-Verlag.
Keywords:
abstraction,
transition systems,
model checkers,
monadic second order logic.
-
T. Colcombet and P. Fradet.
Enforcing trace properties by program transformation.
In Proc. of Principles of Programming Languages,
pages 54-66,
2000.
ACM Press.
-
F. Cuppens and R. Ortalo.
LAMBDA: A Language to Model a Database for Detection of Attacks.
In Third International Workshop on the Recent Advances in Intrusion Detection (RAID'2000),
Toulouse, France,
October 2000.
-
F. Cuppens and C. Saurel.
Towards a formalization of availability and denial of service.
In Information Systems Technology Panel Symposium on Protecting Nato Information Systems in the 21st Century,
Washington,
1999.
-
T. Jensen,
D. Le Métayer,
and T. Thorn.
Verification of control flow based security properties.
In Proc. of the 20th IEEE Symp. on Security and Privacy,
pages 89--103,
1999.
New York: IEEE Computer Society.
-
J.-P. Bodeveix and M. Filali.
On the automatic validation of parameterized Unity programs.
In J. Rolim, editor,
Workshop on formal methods for parallel programming: theory and applica tions,
volume 1388 of Lecture Notes in Computer Science,
Berlin, Germany,
pages 807-819,
1998.
Springer-Verlag.
-
L. Cholvy and F. Cuppens.
Analyzing Consistency of Security Policies.
In IEEE Symposium on Security and Privacy,
Oakland,
1997.
-
F. Cuppens and R. Demolombe.
A modal logical framework for security policies.
In Foundations of Intelligent Systems. 10th International Symposium ISMIS'97. LNAI 1325,
1997.
Springer.
-
J.G. Henriksen,
J.L. Jensen,
M.S. Jorgensen,
N. Klarlund,
R. Paige,
T. Rauhe,
and A.B. Sandholm.
MONA: Monadic second-order logic in practice.
In Workshop on Tools and Algorithms for the Construction and Analysis of Systems,
http://www.brics.dk/ mona,
Aarhus,
pages 58-73,
May 1995.
-
N. Boulahia-Cuppens and F. Cuppens.
Asynchronous composition and required security condition.
In IEEE Symposium on Security and Privacy,
Oakland,
1994.
-
N. Boulahia-Cuppens,
F. Cuppens,
A. Gabillon,
and K. Yazdanian.
Decomposition of Multilevel Objects in an Object-Oriented Database.
In European symposium on research in computer security,
Brighton, UK,
1994.
Springer Verlag.
-
J. McLean.
A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions.
In IEEE Symposium on Security and Privacy,
Oakland,
1994.
-
F. Cuppens.
A Logical Analysis of Authorized and Prohibited Information Flows.
In IEEE Symposium on Security and Privacy,
Oakland,
1993.
-
J.R. Burch,
E.M. Clarke,
K.L. McMillan,
and D.L. Dill.
Symbolic model checking: 10E20 states and beyond.
In 5th Symposium on Logic in Computer Science,
June 1990.
-
J. Millen.
Hookup Security for Synchronous Machines.
In Proc. of the computer security foundations workshop,
Franconia,
1990.
-
D. Johnson and F. Thayer.
Security and the Composition of Machines.
In Proc. of the computer security foundations workshop,
Franconia,
1988.
-
D. McCullough.
Noninterference and the Composability of Security Properties.
In IEEE Symposium on Security and Privacy,
Oakland,
1988.
-
D. McCullough.
Specifications for Multi-Level Security and a Hook-Up Property.
In IEEE Symposium on Security and Privacy,
Oakland,
1987.
-
D. Sutherland.
A Model of Information.
In Proceedings of the 9th National Computer Security Conference,
1986.
-
J. Goguen and J. Meseguer.
Unwinding and Inference Control.
In IEEE Symposium on Security and Privacy,
Oakland,
1984.
-
M.D. McIlroy.
Mass produced software components.
In P. Naur and Randell B., editors,
Proceedings of the NATO Conference on Software Engineering,
Garmish, Germany,
pages 138-155,
October 1968.
NATO Science Committee.
-
G. Kiczales,
J. Lamping,
A. Mendhekar,
C. Maeda,
C. Lopes,
J.-M. Loingtier,
and J. Irwin.
Aspect-Oriented Programming.
In ,
pages 220-242,
.
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of
scholarly and technical work. Copyright and all rights therein
are retained by authors or by other copyright holders.
All person copying this information are expected to adhere to
the terms and constraints invoked by each author's copyright.
In most cases, these works may not be reposted
without the explicit permission of the copyright holder.
Les documents contenus dans ces répertoires sont rendus disponibles
par les auteurs qui y ont contribué en vue d'assurer la diffusion
à temps de travaux savants et techniques sur une base non-commerciale.
Les droits de copie et autres droits sont gardés par les auteurs
et par les détenteurs du copyright, en dépit du fait qu'ils présentent
ici leurs travaux sous forme électronique. Les personnes copiant ces
informations doivent adhérer aux termes et contraintes couverts par
le copyright de chaque auteur. Ces travaux ne peuvent pas être
rendus disponibles ailleurs sans la permission explicite du détenteur
du copyright.
Last modified: Wed Oct 29 14:44:30 2003
Author: jensen.
This document was translated from BibTEX by
bibtex2html