<  Retour au portail Polytechnique Montréal

Documents dont l'auteur est "Mullins, John"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Nombre de documents: 77

Ammar, I., El Touati, Y., Yeddes, M., & Mullins, J. (2021). Bounded opacity for timed systems. Journal of Information Security and Applications, 61, 13 pages. Lien externe

Mindom, P. S. N., Nikanjam, A., Khomh, F., & Mullins, J. (décembre 2021). On Assessing The Safety of Reinforcement Learning algorithms Using Formal Methods [Communication écrite]. 21st International Conference on Software Quality, Reliability and Security (QRS 2021), Hainan, China. Lien externe

Ammar, I., El Touati, Y., Mullins, J., & Yeddes, M. (2021). Timed Bounded Verification of Inclusion Based on Timed Bounded Discretized Language. International Journal of Foundations of Computer Science, 32(2), 175-202. Lien externe

Beji, S., Hamadou, S., Mullins, J., & Gherbi, A. (2019). Iterative integration of TTEthernet network flows. International Journal of Critical Computer-Based Systems, 9(3), 167-92. Lien externe

Helouet, L., Marchand, H., & Mullins, J. (juin 2018). Concurrent Secrets with Quantified Suspicion [Communication écrite]. 18th International Conference on Application of Concurrency to System Design (ACSD 2018), Bratislava, Slovakia. Lien externe

Bérard, B., Kouchnarenko, O., Mullins, J., & Sassolas, M. (2018). Opacity for linear constraint Markov chains. Discrete Event Dynamic Systems: Theory and Applications, 28(1), 83-108. Lien externe

Robati, T., Gherbi, A., El Kouhen, A., & Mullins, J. (2017). Design and simulation of distributed IMA architectures using TTEthernet: a model-driven approach. Journal of Ambient Intelligence and Humanized Computing, 8(3), 345-355. Lien externe

Beji, S., Gherbi, A., Mullins, J., & Hladik, P.-E. (octobre 2016). Model-Driven Approach to the Optimal Configuration of Time-Triggered Flows in a TTEthernet Network [Communication écrite]. 9th International Conference on System Analysis and Modeling (SAM 2016), Saint-Malo, France. Lien externe

Robati, T., Gherbi, A., & Mullins, J. (mai 2016). A modeling and verification approach to the design of distributed IMA architectures using TTEthernet [Communication écrite]. 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016), Madrid, Espagne. Publié dans Procedia Computer Science, 83. Disponible

Bérard, B., Hélouët, L., & Mullins, J. (2016). Non-interference in partial order models. ACM Transactions on Embedded Computing Systems, 16(2), 1-34. Lien externe

Bérard, B., Kouchnarenko, O., Mullins, J., & Sassolas, M. (mai 2016). Preserving opacity on Interval Markov Chains under simulation [Communication écrite]. 13th International Workshop on Discrete Event Systems (WODES 2016), Xi'an, China. Lien externe

Hamadou, S., Mullins, J., & Gherbi, A. (2016). A real-time concurrent constraint calculus for analyzing avionic systems embedded in the IMA connected through TTethernet. Dans Theoretical Information Reuse and Integration (Vol. 446, 85-111). Lien externe

Robati, T., El Kouhen, A., Gherbi, A., & Mullins, J. (2016). Time-Triggered Ethernet Metamodel: Design and Application. Journal of Software, 11(10), 1040-1053. Lien externe

Bérard, B., Hélouët, L., & Mullins, J. (juin 2015). Non-interference in Partial Order Models [Communication écrite]. 15th International Conference on Application of Concurrency to System Design (ACSD 2015), Brussels, Belgium. Lien externe

Bérard, B., Kouchnarenko, O., Mullins, J., & Sassolas, M. (2015). Probabilistic opacity in refinement-based modeling. (Rapport technique). Lien externe

Bérard, B., Mullins, J., & Sassolas, M. (2015). Quantifying opacity. Mathematical Structures in Computer Science, 25(2), 361-403. Lien externe

Robati, T., El Kouhen, A., Gherbi, A., & Mullins, J. (septembre 2015). Simulation-based verification of avionic systems deployed on IMA architectures [Communication écrite]. 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems : Demo and Poster Session (MoDELS P&D 2015), Ottawa, ON, Canada. Lien externe

Hamadou, S., Mullins, J., Chareton, C., & Gherbi, A. (août 2015). Specifying avionic embedded systems by denotations of the time-triggered constraint-based calculus [Communication écrite]. 16th IEEE International Conference on Information Reuse and Integration (IRI 2015), San Francisco, CA. Lien externe

Hamadou, S., Mullins, J., Gherbi, A., & Beji, S. (avril 2015). A time-triggered constraint-based calculus for avionic systems [Communication écrite]. 18th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW 2015), Auckland , New Zealand. Lien externe

Robati, T., El Kouhen, A., Gherbi, A., Hamadou, S., & Mullins, J. (septembre 2014). An extension for AADL to model mixed-criticality avionic systems deployed on IMA architectures with TTEthernet [Communication écrite]. 1st International Workshop on Architecture Centric Virtual Integration (ACVI 2014), Valencia, Spain. Lien externe

Mullins, J., & Yeddes, M. (mai 2014). Opacity with Orwellian observers and intransitive non-interference [Communication écrite]. 12th IFAC/IEEE Workshop on Discrete Event Systems (WODES 2014), Cachan, France. Lien externe

Beji, S., Hamadou, S., Gherbi, A., & Mullins, J. (octobre 2014). SMT-based cost optimization approach for the integration of avionic functions in IMA and TTEthernet architectures [Communication écrite]. 18th IEEE/ACM International Symposium on Distributed Simulations and Real Time Applications (DS-RT 2014), Toulouse, France. Lien externe

Lauer, M., Mullins, J., & Yeddes, M. (juillet 2013). Cost optimization strategy for iterative integration of multi-critical functions in IMA and TTethernet architecture [Communication écrite]. 37th IEEE Annual Computer Software and Applications Conference Workshops (COMPSACW 2013), Kyoto, Japan. Lien externe

Benattar, G., Bérard, B., Lime, D., Mullins, J., Roux, O. H., & Sassolas, M. (août 2011). Channel synthesis for finite transducers [Communication écrite]. 13th International Conference on Automata and Format Languages (AFL'2011), Debrecen, Hungary. Publié dans International Journal of Foundations of Computer Science, 23(6). Lien externe

Abouzaid, F., Mullins, J., Mazzara, M., & Dragoni, N. (juin 2012). Modelling and analysis of dynamic reconfiguration in BP-calculus [Communication écrite]. 6th KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2012), Dubrovnik, Croatia. Lien externe

Kiraga, A. F., & Mullins, J. (avril 2011). Admissible adversaries in PRISM for probabilistic security analysis [Communication écrite]. 9th Workshop on Quantitative Aspects of Programming Languages (QAPL 2011), Saarbrücken, Germany. Non disponible

Kiraga, A. F., & Mullins, J. (septembre 2011). Admissible adversaries in PRISM for probabilistic security analysis [Communication écrite]. 5th International Workshop on Harnessing Theories for Tool Support in Software (TTSS 2011), Oslo, Norvège. Non disponible

Hamadou, S., & Mullins, J. (2010). Calibrating the power of schedulers for probabilistic polynomial-time calculus. Journal of Computer Security, 18(2), 265-316. Lien externe

Abouzaid, F., & Mullins, J. (septembre 2008). Formal Specification of Correlation in WS Orchestrations Using BP-calculus [Communication écrite]. 5th International Workshop on Formal Aspects of Component Software (FACS 2008), Malaga, Spain. Publié dans Electronic Notes in Theoretical Computer Science, 260. Lien externe

Bérard, B., Mullins, J., & Sassolas, M. (septembre 2010). Quantifying opacity [Communication écrite]. 7th International Conference on the Quantitative Evaluation of Systems (QEST 2010), Williamsburg, VA, USA. Lien externe

Benattar, G., Bérard, B., Lime, D., Mullins, J., Roux, O. H., & Sassolas, M. (août 2009). Covert channels with sequential transducers [Communication écrite]. 24th Annual IEEE Symposium on Logic in Computer Science (LICS 2009) and Satellite Workshop on Foundations of Computer Security (CFS 2009), Los Angeles, CA (15 pages). Lien externe

Abouzaid, F., & Mullins, J. (juillet 2009). Formal Specification of Correlation patterns for WS-BPEL [Communication écrite]. 9e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2009), Montréal, Québec. Non disponible

Abouzaid, F., & Mullins, J. (juillet 2009). Model-checking Web Services Orchestrations using BP-calculus [Communication écrite]. 8th International Workshop on the Foundations of Coordination Languages and Software Architectures (FOCLASA 2009), Rhodes, Greece. Publié dans Electronic Notes in Theoretical Computer Science, 255. Lien externe

Debbabi, M., Fellah, A., & Mullins, J. (juillet 2009). Secrecy in temporary secret based cryptographic protocols [Communication écrite]. 9e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2009), Montréal, Québec. Non disponible

Abouzaid, F., & Mullins, J. (décembre 2007). A Calculus for Generation, Verification and Refinement of BPEL Specifications [Communication écrite]. 3rd International Workshop on Automated Specification and Verification of Web Systems (WWV 2007), Venice, Italy. Publié dans Electronic Notes in Theoretical Computer Science, 200(3). Lien externe

Mullins, J., & Oarga, R. (juin 2007). Model checking of extended OCL constraints over UML models with SOCLe [Communication écrite]. 9th IFIP International Conference on Formal Methods for Open Object-based distributed Systems (FMOODS 2007), Paphos, Chypre. Lien externe

Gardey, G., Mullins, J., & Roux, O. H. (août 2005). Non-interference control synthesis for security timed automata [Communication écrite]. 4th Workshop on Security Issues in Concurrency (SecCO 2005), San Francisco, CA. Publié dans Electronic Notes in Theoretical Computer Science, 180(1). Lien externe

Brlek, S., Hamadou, S., & Mullins, J. (septembre 2007). A probabilistic scheduler for the analysis of cryptographic protocols [Communication écrite]. 5th International Workshop on Security Issues in Concurrency (SecCo 2007), Lisbonne, Portugal. Lien externe

Boteanu, D., Fernandez, J. M., McHugh, J., & Mullins, J. (octobre 2007). Queue management as a DoS counter-measure? [Communication écrite]. 10th Information Security Conference (ISC 2007), Valparaiso, Chile. Lien externe

Cassez, F., Mullins, J., & Roux, O. H. (septembre 2007). Synthesis of Non-interferent Distributed Systems [Communication écrite]. 4th International Conference on Mathematical Methods, Models and Architectire for Computer Networks Security (MMM-ACNS07), St-Petersburg, Russie. Lien externe

Minier, M., Galice, S., Mullins, J., & Ubeda, S. (septembre 2006). Cryptographic protocol to establish trusted history of interactions [Communication écrite]. 3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS 2006), Hambourg, Allemagne. Lien externe

Brlek, S., Hamadou, S., & Mullins, J. (2006). A Flaw in the Electronic Commerce Protocol Set. Information Processing Letters, 97(3), 104-108. Lien externe

Boteanu, D., Fernandez, J. M., & Mullins, J. (2006). On the efficiency of timeout-based DoS attack protections. (Rapport technique n° EPM-RT-2006-07). Non disponible

Brlek, S., Hamadou, S., & Mullins, J. (février 2006). Some remarks on the certificates registration of the electronic commerce protocol SET [Communication écrite]. International Conference on Internet and Web Applications and Services/Advanced International Conference on Telecommunications (AICT-ICIW 2006), San Jose, Ca. Lien externe

Fellah, A., & Mullins, J. Admissible Interference by Typing for Cryptographic Protocols [Communication écrite]. Information and Communications Security. Lien externe

Brlek, S., Hamadou, S., & Mullins, J. (2005). Anonymous and Secure Electronic Transaction Protocol. Annales des télécommunications, 60(5-6), 530-557. Lien externe

Bastien, G., & Mullins, J. (août 2005). ASPIC : A tool for symbolic analysis of cryptographic protocols [Communication écrite]. 5e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2005), Gatineau, Qc, Canada. Non disponible

Hadj-Alouane Nejib, B. E. N., Lafrance, S., Feng, L. I. N., Mullins, J., & Yeddes, M. (2005). Characterizing intransitive noninterference for 3-domain security policies with observability. IEEE Transactions on Automatic Control, 50(6), 920-925. Lien externe

Ben Hadj-Alouane, N., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (2005). On the Verification of Intransitive Noninterference in Mulitlevel Security. IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics, 35(5), 948-958. Lien externe

Bergeron, M., Azambre, D., & Mullins, J. (juin 2005). SOCLe : An OCL model-checker for UML models [Communication écrite]. 2nd International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES 2005), Rennes, France. Non disponible

Painchaud, F., Azambre, D., Bergeron, M., Mullins, J., & Oarga, R. M. (janvier 2005). Socle : Integrated design of software applications and security [Communication écrite]. 10th International Command and Control Research and TEchnology Symposium (ICCRTS 2005), McLean, VA. Lien externe

Azambre, D., Bergeron, M., & Mullins, J. (juin 2005). Validating UML and OCL models in SOCLe by simulation and model-checking [Communication écrite]. 2nd International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES 2005), Rennes, France. Non disponible

Ben Hadj-Alouane, N., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (décembre 2004). An algorithmic approach to verification of intransitive non-interference in security policies [Communication écrite]. 43rd IEEE Conference on Decision and Control (CDC 2004), Atlantis, Paradise Island, Bahamas. Lien externe

Ben Hadj-Alouane, N., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (septembre 2004). Discrete event systems approach to the verification of the information flow properties in secure protocols [Communication écrite]. 7th Workshop on Discrete Event System (WODES 2004), Reims, France. Publié dans IFAC Proceedings, 37(18). Lien externe

Boucheneb, H., & Mullins, J. (2003). Analyse des reseaux temporels : Calcul des classes en O(n²) et des temps de chemin en O(m×n). Technique et Science Informatiques, 22(4), 435-459. Lien externe

Brlek, S., Hamadou, S., & Mullins, J. (juin 2003). ASET-Un protocole anonyme et sécuritaire pour les transactions électroniques [Communication écrite]. 2e conférence francophone sur sécurité et architecture réseaux (SAR 2003), Nancy, France. Non disponible

Mullins, J., & Lafrance, S. (2003). Bisimulation-Based Non-Deterministic Admissible Interference and Its Application to the Analysis of Cryptographic Protocols. Information and Software Technology, 45(11), 779-790. Lien externe

Lafrance, S., & Mullins, J. (2003). An information flow method to detect denial of service vulnerabilities. Journal of Universal Computer Science, 9(11), 1350-1369. Disponible

Lafrance, S., & Mullins, J. (avril 2003). An information flow method to detect denial of service vulnerabilities [Communication écrite]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Huntsville, AL, US. Non disponible

Lafrance, S., & Mullins, J. (juin 2003). A symbolic approach to the analysis of security protocols [Communication écrite]. LICS 2003 Satellite Workshop on Foundations of Computer Security (FCS 2003), Ottawa, Ont. Canada. Non disponible

Lafrance, S., & Mullins, J. (juillet 2003). Using admissible interference to detect denial of service vulnerabilities [Communication écrite]. 6th International Workshop in Formal Methods (IWFM 2003) and Electronic Workshops in Computing by British Computer Society (BCSeWiC 2003), Dublin, Irlande. Lien externe

Lafrance, S., & Mullins, J. (2002). Using admissible interference to detect denial of service attacks. (Rapport technique n° EPM-RT-2002-01). Disponible

Lafrance, S., & Mullins, J. (janvier 2002). Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols [Communication écrite]. Computing: the Australasian Theory Symposium (CATS 2002), Monash University, Melbourne, Australia (24 pages). Publié dans Electronic Notes in Theoretical Computer Science, 61. Disponible

Yeddes, M., Alla, H., & Mullins, J. (2002). Analyse structurelle d'un fonctionnement séquentiel. Journal Européen des Systèmes Automatisés, 36(8), 1101-1118. Non disponible

Lafrance, S., & Mullins, J. (janvier 2002). A generic enemy process for the analysis of cryptographic protocols [Communication écrite]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Lund, Suède. Non disponible

Hains, G., Loulergue, F., & Mullins, J. (2001). Concrete Data Structures and Functional Parallel Programming. Theoretical Computer Science, 258(1-2), 233-267. Lien externe

Yeddes, M., & Mullins, J. (septembre 2001). Quasi-synchronous approach for distributed control in synchronous systems [Communication écrite]. IEEE International Symposium on Intelligent Control (ISIC 2001), Mexico City, Mexico. Lien externe

Mullins, J., & Yeddes, M. (avril 2001). Two proof methods for bisimulation-based non-deterministic admissible interference [Communication écrite]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Washington, D.C.. Non disponible

Mullins, J. (avril 2000). Non-deterministic admissible interference [Communication écrite]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Edinburgh, Scotland. Non disponible

Mullins, J. (2000). Nondeterministic admissible interference. Journal of Universal Computer Science, 6(11), 1054-1070. Lien externe

Mullins, J. (1997). On an effective hierarchy of communicating processes : separation principle and testing. Theoretical Computer Science, 174(1-2), 231-246. Lien externe

Desharnais, J., Hodgson, B., & Mullins, J. (1997). Relation algebras are models of noncommutative propositional linear logic. Dans Brink, C., & Schmidt, G. (édit.), Relational methods in computer science (106-115). Lien externe

Hains, G., & Mullins, J. (août 1996). A categorical model of array domains [Communication écrite]. 2nd International Euro-Par Conference on Parallel Processing (Euro-Par 1996), Lyon, France. Non disponible

Argon, P., Mullins, J., & Roux, O. (juillet 1996). A correct compiler construction using Coq [Communication écrite]. Workshop on Proof Search in Type-Theoretic Languages (CADE 1996), New Brunswick, USA. Non disponible

Hains, G., & Mullins, J. (août 1995). A metacircular data-parallel functional language [Communication écrite]. 1st International Euro-Par Conference on Parallel Processing (Euro-Par 1995), Stockholm, Suède. Lien externe

Mullins, J. (novembre 1995). On guaranteed recursively defined processes : limit and logical definability of testing [Communication écrite]. 5th Italian Conference on Theoretical Computer Science (ICTCS 1995), Ravello, Italie. Non disponible

Desharnais, J., Mili, A., Mullins, J., & Slimani, Y. (1995). Semantics of concurrent programming. Dans Somaya, A. Y. (édit.), Parallel and distributed computing handbook (24-74). Non disponible

Liste produite: Thu Mar 28 03:36:42 2024 EDT.