<  Back to the Polytechnique Montréal portal

Items where Author is "Mullins, John"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Jump to: A | B | C | D | F | G | H | K | L | M | P | R | Y
Number of items: 79.

A

Ammar, I., El Touati, Y., Yeddes, M., & Mullins, J. (2021). Bounded opacity for timed systems. Journal of Information Security and Applications, 61, 13 pages. External link

Ammar, I., El Touati, Y., Mullins, J., & Yeddes, M. (2021). Timed Bounded Verification of Inclusion Based on Timed Bounded Discretized Language. International Journal of Foundations of Computer Science, 32(2), 175-202. External link

Abouzaid, F., Mullins, J., Mazzara, M., & Dragoni, N. (2012, June). Modelling and analysis of dynamic reconfiguration in BP-calculus [Paper]. 6th KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2012), Dubrovnik, Croatia. External link

Abouzaid, F., & Mullins, J. (2008, September). Formal Specification of Correlation in WS Orchestrations Using BP-calculus [Paper]. 5th International Workshop on Formal Aspects of Component Software (FACS 2008), Malaga, Spain. Published in Electronic Notes in Theoretical Computer Science, 260. External link

Abouzaid, F., & Mullins, J. (2009, July). Formal Specification of Correlation patterns for WS-BPEL [Paper]. 9e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2009), Montréal, Québec. Unavailable

Abouzaid, F., & Mullins, J. (2009, July). Model-checking Web Services Orchestrations using BP-calculus [Paper]. 8th International Workshop on the Foundations of Coordination Languages and Software Architectures (FOCLASA 2009), Rhodes, Greece. Published in Electronic Notes in Theoretical Computer Science, 255. External link

Abouzaid, F., & Mullins, J. (2007, December). A Calculus for Generation, Verification and Refinement of BPEL Specifications [Paper]. 3rd International Workshop on Automated Specification and Verification of Web Systems (WWV 2007), Venice, Italy. Published in Electronic Notes in Theoretical Computer Science, 200(3). External link

Azambre, D., Bergeron, M., & Mullins, J. (2005, June). Validating UML and OCL models in SOCLe by simulation and model-checking [Paper]. 2nd International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES 2005), Rennes, France. Unavailable

Argon, P., Mullins, J., & Roux, O. (1996, July). A correct compiler construction using Coq [Paper]. Workshop on Proof Search in Type-Theoretic Languages (CADE 1996), New Brunswick, USA. Unavailable

B

Beji, S., Hamadou, S., Mullins, J., & Gherbi, A. (2019). Iterative integration of TTEthernet network flows. International Journal of Critical Computer-Based Systems, 9(3), 167-92. External link

Bérard, B., Kouchnarenko, O., Mullins, J., & Sassolas, M. (2018). Opacity for linear constraint Markov chains. Discrete Event Dynamic Systems: Theory and Applications, 28(1), 83-108. External link

Beji, S., Gherbi, A., Mullins, J., & Hladik, P.-E. (2016, October). Model-Driven Approach to the Optimal Configuration of Time-Triggered Flows in a TTEthernet Network [Paper]. 9th International Conference on System Analysis and Modeling (SAM 2016), Saint-Malo, France. External link

Berard, B., Helouet, L., & Mullins, J. (2016). Non-interference in partial order models. ACM Transactions on Embedded Computing Systems, 16(2), 34 pages. External link

Berard, B., Kouchnarenko, O., Mullins, J., & Sassolas, M. (2016, May). Preserving opacity on Interval Markov Chains under simulation [Paper]. 13th International Workshop on Discrete Event Systems (WODES 2016), Xi'an, China. External link

Berard, B., Helouet, L., & Mullins, J. (2015, June). Non-interference in Partial Order Models [Paper]. 15th International Conference on Application of Concurrency to System Design (ACSD 2015), Brussels, Belgium. External link

Bérard, B., Kouchnarenko, O., Mullins, J., & Sassolas, M. (2015). Probabilistic Opacity in Refinement-Based Modeling. (Technical Report). External link

Berard, B., Mullins, J., & Sassolas, M. (2015). Quantifying opacity. Mathematical Structures in Computer Science, 25(2), 361-403. External link

Beji, S., Hamadou, S., Gherbi, A., & Mullins, J. (2014, October). SMT-based cost optimization approach for the integration of avionic functions in IMA and TTEthernet architectures [Paper]. 18th IEEE/ACM International Symposium on Distributed Simulations and Real Time Applications (DS-RT 2014), Toulouse, France. External link

Benattar, G., Berard, B., Lime, D., Mullins, J., Roux, O. H., & Sassolas, M. (2011, August). Channel synthesis for finite transducers [Paper]. 13th International Conference on Automata and Format Languages (AFL'2011), Debrecen, Hungary. Published in International Journal of Foundations of Computer Science, 23(6). External link

Berard, B., Mullins, J., & Sassolas, M. (2010, September). Quantifying opacity [Paper]. 7th International Conference on the Quantitative Evaluation of Systems (QEST 2010), Williamsburg, VA, USA. External link

Benattar, G., Bérard, B., Lime, D., Mullins, J., Roux, O. H., & Sassolas, M. (2009, August). Covert channels with sequential transducers [Paper]. 24th Annual IEEE Symposium on Logic in Computer Science (LICS 2009) and Satellite Workshop on Foundations of Computer Security (CFS 2009), Los Angeles, CA. Unavailable

Brlek, S., Hamadou, S., & Mullins, J. (2007, September). A probabilistic scheduler for the analysis of cryptographic protocols [Paper]. 5th International Workshop on Security Issues in Concurrency (SecCo 2007), Lisbonne, Portugal. External link

Boteanu, D., Fernandez, J. M., McHugh, J., & Mullins, J. (2007, October). Queue management as a DoS counter-measure? [Paper]. 10th Information Security Conference (ISC 2007), Valparaiso, Chile. External link

Brlek, S., Hamadou, S., & Mullins, J. (2006). A Flaw in the Electronic Commerce Protocol Set. Information Processing Letters, 97(3), 104-108. External link

Boteanu, D., Fernandez, J. M., & Mullins, J. (2006). On the efficiency of timeout-based DoS attack protections. (Technical Report n° EPM-RT-2006-07). Unavailable

Brlek, S., Hamadou, S., & Mullins, J. (2006, February). Some remarks on the certificates registration of the electronic commerce protocol SET [Paper]. International Conference on Internet and Web Applications and Services/Advanced International Conference on Telecommunications (AICT-ICIW 2006), San Jose, Ca. External link

Brlek, S., Hamadou, S., & Mullins, J. (2005). Anonymous and Secure Electronic Transaction Protocol. Annales des télécommunications, 60(5-6), 530-557. External link

Bastien, G., & Mullins, J. (2005, August). ASPIC : A tool for symbolic analysis of cryptographic protocols [Paper]. 5e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2005), Gatineau, Qc, Canada. Unavailable

Bergeron, M., Azambre, D., & Mullins, J. (2005, June). SOCLe : An OCL model-checker for UML models [Paper]. 2nd International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES 2005), Rennes, France. Unavailable

Boucheneb, H., & Mullins, J. (2003). Analyse des reseaux temporels : Calcul des classes en O(n²) et des temps de chemin en O(mxn). Technique et Science Informatiques, 22(4), 435-459. Unavailable

Boucheneb, H., & Mullins, J. (2003). Analyse des réseaux temporels. Calcul des classes enO(n2)et des temps de chemin enO(m ×n). Techniques et sciences informatiques, 22(4), 435-459. External link

Brlek, S., Hamadou, S., & Mullins, J. (2003, June). ASET-Un protocole anonyme et sécuritaire pour les transactions électroniques [Paper]. 2e conférence francophone sur sécurité et architecture réseaux (SAR 2003), Nancy, France. Unavailable

C

Cassez, F., Mullins, J., & Roux, O. H. (2013, July). Synthesis of non-interferent distributed systems [Paper]. 15th International Conference on Human-Computer Interaction (HCI International 2013), Las Vegas, NV, United states. Unavailable

Cassez, F., Mullins, J., & Roux, O. H. (2007, September). Synthesis of Non-interferent Distributed Systems [Paper]. 4th International Conference on Mathematical Methods, Models and Architectire for Computer Networks Security (MMM-ACNS07), St-Petersburg, Russie. External link

D

Debbabi, M., Fellah, A., & Mullins, J. (2009, July). Secrecy in temporary secret based cryptographic protocols [Paper]. 9e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2009), Montréal, Québec. Unavailable

Desharnais, J., Hodgson, B., & Mullins, J. (1997). Relation algebras are models of noncommutative propositional linear logic. In Brink, C., & Schmidt, G. (eds.), Relational methods in computer science (106-115). External link

Desharnais, J., Mili, A., Mullins, J., & Slimani, Y. (1995). Semantics of concurrency. In Somaya, A. (ed.), Parallel and distributed computing handbook (24-74). Unavailable

F

Fellah, A., & Mullins, J. Admissible Interference by Typing for Cryptographic Protocols [Paper]. Information and Communications Security. External link

G

Gardey, G., Mullins, J., & Roux, O. H. (2005, August). Non-interference control synthesis for security timed automata [Paper]. 4th Workshop on Security Issues in Concurrency (SecCO 2005), San Francisco, CA. Published in Electronic Notes in Theoretical Computer Science, 180(1). External link

H

Helouet, L., Marchand, H., & Mullins, J. (2018, June). Concurrent Secrets with Quantified Suspicion [Paper]. 18th International Conference on Application of Concurrency to System Design (ACSD 2018), Bratislava, Slovakia. External link

Hamadou, S., Mullins, J., & Gherbi, A. (2016). A real-time concurrent constraint calculus for analyzing avionic systems embedded in the IMA connected through TTethernet. In Theoretical Information Reuse and Integration (85-111). External link

Hamadou, S., Mullins, J., Chareton, C., & Gherbi, A. (2015, August). Specifying avionic embedded systems by denotations of the time-triggered constraint-based calculus [Paper]. 16th IEEE International Conference on Information Reuse and Integration (IRI 2015), San Francisco, CA. External link

Hamadou, S., Mullins, J., Gherbi, A., & Beji, S. (2015, April). A time-triggered constraint-based calculus for avionic systems [Paper]. 18th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW 2015), Auckland , New Zealand. External link

Hamadou, S., & Mullins, J. (2010). Calibrating the power of schedulers for probabilistic polynomial-time calculus. Journal of Computer Security, 18(2), 265-316. External link

Hadj-Alouane Nejib, B. E. N., Lafrance, S., Feng, L. I. N., Mullins, J., & Yeddes, M. (2005). Characterizing intransitive noninterference for 3-domain security policies with observability. IEEE Transactions on Automatic Control, 50(6), 920-925. External link

Hadj-Alouane, N. B., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. M. (2005). On the Verification of Intransitive Noninterference in Mulitlevel Security. IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics, 35(5), 948-958. External link

Hadj-Alouane, N. B., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (2004, December). An algorithmic approach to verification of intransitive non-interference in security policies [Paper]. 43rd IEEE Conference on Decision and Control (CDC 2004), Atlantis, Paradise Island, Bahamas. External link

Hadj-Alouane, N. B., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (2004, September). Discrete event systems approach to the verification of the information flow properties in secure protocols [Paper]. 7th Workshop on Discrete Event System (WODES 2004), Reims, France. External link

Hains, G., Loulergue, F., & Mullins, J. (2001). Concrete Data Structures and Functional Parallel Programming. Theoretical Computer Science, 258(1-2), 233-267. External link

Hains, G., & Mullins, J. (1996, August). A categorical model of array domains [Paper]. 2nd International Euro-Par Conference on Parallel Processing (Euro-Par 1996), Lyon, France. Unavailable

Hains, G., & Mullins, J. (1995, August). A metacircular data-parallel functional language [Paper]. 1st International Euro-Par Conference on Parallel Processing (Euro-Par 1995), Stockholm, Suède. External link

K

Kiraga, A. F., & Mullins, J. (2011, April). Admissible adversaries in PRISM for probabilistic security analysis [Paper]. 9th Workshop on Quantitative Aspects of Programming Languages (QAPL 2011), Saarbrücken, Germany. Unavailable

Kiraga, A. F., & Mullins, J. (2011, September). Admissible adversaries in PRISM for probabilistic security analysis [Paper]. 5th International Workshop on Harnessing Theories for Tool Support in Software (TTSS 2011), Oslo, Norvège. Unavailable

L

Lauer, M., Mullins, J., & Yeddes, M. (2013, July). Cost optimization strategy for iterative integration of multi-critical functions in IMA and TTethernet architecture [Paper]. 37th IEEE Annual Computer Software and Applications Conference Workshops (COMPSACW 2013), Kyoto, Japan. External link

Lafrance, S., & Mullins, J. (2003, April). An information flow method to detect denial of service nulnerabilities [Paper]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Huntsville, AL, US. Unavailable

Lafrance, S., & Mullins, J. (2003). An information flow method to detect denial of service vulnerabilities. Journal of Universal Computer Science, 9(11), 1350-1369. Available

Lafrance, S., & Mullins, J. (2003, June). A symbolic approach to the analysis of security protocols [Paper]. LICS 2003 Satellite Workshop on Foundations of Computer Security (FCS 2003), Ottawa, Ont. Canada. Unavailable

Lafrance, S., & Mullins, J. (2003, July). Using admissible interference to detect denial of service vulnerabilities [Paper]. 6th International Workshop in Formal Methods (IWFM 2003) and Electronic Workshops in Computing by British Computer Society (BCSeWiC 2003), Dublin, Irlande. External link

Lafrance, S., & Mullins, J. (2002). Using admissible interference to detect denial of service attacks. (Technical Report n° EPM-RT-2002-01). Available

Lafrance, S., & Mullins, J. (2002, January). Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols [Paper]. Computing: the Australasian Theory Symposium (CATS 2002), Monash University, Melbourne, Australia (24 pages). Published in Electronic Notes in Theoretical Computer Science, 61. Available

Lafrance, S., & Mullins, J. (2002, January). A generic enemy process for the analysis of cryptographic protocols [Paper]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Lund, Suède. Unavailable

M

Mindom, P. S. N., Nikanjam, A., Khomh, F., & Mullins, J. (2021, December). On Assessing The Safety of Reinforcement Learning algorithms Using Formal Methods [Paper]. 21st International Conference on Software Quality, Reliability and Security (QRS 2021), Hainan, China. External link

Mullins, J., & Yeddes, M. (2014, May). Opacity with Orwellian observers and intransitive non-interference [Paper]. 12th IFAC/IEEE Workshop on Discrete Event Systems (WODES 2014), Cachan, France. External link

Mullins, J., & Oarga, R. (2007, June). Model checking of extended OCL constraints over UML models with SOCLe [Paper]. 9th IFIP International Conference on Formal Methods for Open Object-based distributed Systems (FMOODS 2007), Paphos, Chypre. External link

Minier, M., Galice, S., Mullins, J., & Ubeda, S. (2006, September). Cryptographic protocol to establish trusted history of interactions [Paper]. 3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS 2006), Hambourg, Allemagne. External link

Mullins, J., & Lafrance, S. (2003). Bisimulation-Based Non-Deterministic Admissible Interference and Its Application to the Analysis of Cryptographic Protocols. Information and Software Technology, 45(11), 779-790. External link

Mullins, J., & Yeddes, M. (2001, April). Two proof methods for bisimulation-based non-deterministic admissible interference [Paper]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Washington, D.C.. Unavailable

Mullins, J. (2000, April). Non-deterministic admissible interference [Paper]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Edinburgh, Scotland. Unavailable

Mullins, J. (2000). Nondeterministic admissible interference. Journal of Universal Computer Science, 6(11), 1054-1070. External link

Mullins, J. (1997). On an effective hierarchy of communicating processes : separation principle and testing. Theoretical Computer Science, 174(1-2), 231-246. External link

Mullins, J. (1995, November). On guaranteed recursively defined processes : limit and logical definability of testing [Paper]. 5th Italian Conference on Theoretical Computer Science (ICTCS 1995), Ravello, Italie. Unavailable

P

Painchaud, F., Azambre, D., Bergeron, M., Mullins, J., & Oarga, R. (2005, January). Socle : Integrated design of software applications and security [Paper]. 10th International Command and Control Research and TEchnology Symposium (ICCRTS 2005), McLean, VA. External link

R

Robati, T., Gherbi, A., El Kouhen, A., & Mullins, J. (2017). Design and simulation of distributed IMA architectures using TTEthernet: a model-driven approach. Journal of Ambient Intelligence and Humanized Computing, 8(3), 345-355. External link

Robati, T., Gherbi, A., & Mullins, J. (2016, May). A modeling and verification approach to the design of distributed IMA architectures using TTEthernet [Paper]. 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016), Madrid, Espagne. Published in Procedia Computer Science, 83. Available

Robati, T., El Kouhen, A., Gherbi, A., & Mullins, J. (2016). Time-Triggered Ethernet Metamodel: Design and Application. Journal of Software, 11(10), 1040-1053. External link

Robati, T., El Kouhen, A., Gherbi, A., & Mullins, J. (2015, September). Simulation-based verification of avionic systems deployed on IMA architectures [Paper]. 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems : Demo and Poster Session (MoDELS P&D 2015), Ottawa, ON, Canada. External link

Robati, T., El Kouhen, A., Gherbi, A., Hamadou, S., & Mullins, J. (2014, September). An extension for AADL to model mixed-criticality avionic systems deployed on IMA architectures with TTEthernet [Paper]. 1st International Workshop on Architecture Centric Virtual Integration (ACVI 2014), Valencia, Spain. External link

Y

Yeddes, M., Alla, H., & Mullins, J. (2002). Analyse structurelle d'un fonctionnement séquentiel. Journal Européen des Systèmes Automatisés, 36(8), 1101-1118. Unavailable

Yeddes, M., & Mullins, J. (2001, September). Quasi-synchronous approach for distributed control in synchronous systems [Paper]. IEEE International Symposium on Intelligent Control (ISIC 2001), Mexico City, Mexico. External link

List generated on: Fri Jun 9 06:26:02 2023 EDT