Monter d'un niveau |
Ce graphique trace les liens entre tous les collaborateurs des publications de {} figurant sur cette page.
Chaque lien représente une collaboration sur la même publication. L'épaisseur du lien représente le nombre de collaborations.
Utilisez la molette de la souris ou les gestes de défilement pour zoomer à l'intérieur du graphique.
Vous pouvez cliquer sur les noeuds et les liens pour les mettre en surbrillance et déplacer les noeuds en les glissant.
Enfoncez la touche "Ctrl" ou la touche "⌘" en cliquant sur les noeuds pour ouvrir la liste des publications de cette personne.
Ammar, I., El Touati, Y., Yeddes, M., & Mullins, J. (2021). Bounded opacity for timed systems. Journal of Information Security and Applications, 61, 13 pages. Lien externe
Ammar, I., El Touati, Y., Mullins, J., & Yeddes, M. (2021). Timed Bounded Verification of Inclusion Based on Timed Bounded Discretized Language. International Journal of Foundations of Computer Science, 32(2), 175-202. Lien externe
Abouzaid, F., Mullins, J., Mazzara, M., & Dragoni, N. (juin 2012). Modelling and analysis of dynamic reconfiguration in BP-calculus [Communication écrite]. 6th KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2012), Dubrovnik, Croatia. Lien externe
Abouzaid, F., & Mullins, J. (septembre 2008). Formal Specification of Correlation in WS Orchestrations Using BP-calculus [Communication écrite]. 5th International Workshop on Formal Aspects of Component Software (FACS 2008), Malaga, Spain. Publié dans Electronic Notes in Theoretical Computer Science, 260. Lien externe
Abouzaid, F., & Mullins, J. (juillet 2009). Formal Specification of Correlation patterns for WS-BPEL [Communication écrite]. 9e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2009), Montréal, Québec. Non disponible
Abouzaid, F., & Mullins, J. (juillet 2009). Model-checking Web Services Orchestrations using BP-calculus [Communication écrite]. 8th International Workshop on the Foundations of Coordination Languages and Software Architectures (FOCLASA 2009), Rhodes, Greece. Publié dans Electronic Notes in Theoretical Computer Science, 255. Lien externe
Abouzaid, F., & Mullins, J. (décembre 2007). A Calculus for Generation, Verification and Refinement of BPEL Specifications [Communication écrite]. 3rd International Workshop on Automated Specification and Verification of Web Systems (WWV 2007), Venice, Italy. Publié dans Electronic Notes in Theoretical Computer Science, 200(3). Lien externe
Azambre, D., Bergeron, M., & Mullins, J. (juin 2005). Validating UML and OCL models in SOCLe by simulation and model-checking [Communication écrite]. 2nd International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES 2005), Rennes, France. Non disponible
Argon, P., Mullins, J., & Roux, O. (juillet 1996). A correct compiler construction using Coq [Communication écrite]. Workshop on Proof Search in Type-Theoretic Languages (CADE 1996), New Brunswick, USA. Non disponible
Beji, S., Hamadou, S., Mullins, J., & Gherbi, A. (2019). Iterative integration of TTEthernet network flows. International Journal of Critical Computer-Based Systems, 9(3), 167-92. Lien externe
Bérard, B., Kouchnarenko, O., Mullins, J., & Sassolas, M. (2018). Opacity for linear constraint Markov chains. Discrete Event Dynamic Systems: Theory and Applications, 28(1), 83-108. Lien externe
Beji, S., Gherbi, A., Mullins, J., & Hladik, P.-E. (octobre 2016). Model-Driven Approach to the Optimal Configuration of Time-Triggered Flows in a TTEthernet Network [Communication écrite]. 9th International Conference on System Analysis and Modeling (SAM 2016), Saint-Malo, France. Lien externe
Bérard, B., Hélouët, L., & Mullins, J. (2016). Non-interference in partial order models. ACM Transactions on Embedded Computing Systems, 16(2), 1-34. Lien externe
Bérard, B., Kouchnarenko, O., Mullins, J., & Sassolas, M. (mai 2016). Preserving opacity on Interval Markov Chains under simulation [Communication écrite]. 13th International Workshop on Discrete Event Systems (WODES 2016), Xi'an, China. Lien externe
Bérard, B., Hélouët, L., & Mullins, J. (juin 2015). Non-interference in Partial Order Models [Communication écrite]. 15th International Conference on Application of Concurrency to System Design (ACSD 2015), Brussels, Belgium. Lien externe
Bérard, B., Kouchnarenko, O., Mullins, J., & Sassolas, M. (2015). Probabilistic opacity in refinement-based modeling. (Rapport technique). Lien externe
Bérard, B., Mullins, J., & Sassolas, M. (2015). Quantifying opacity. Mathematical Structures in Computer Science, 25(2), 361-403. Lien externe
Beji, S., Hamadou, S., Gherbi, A., & Mullins, J. (octobre 2014). SMT-based cost optimization approach for the integration of avionic functions in IMA and TTEthernet architectures [Communication écrite]. 18th IEEE/ACM International Symposium on Distributed Simulations and Real Time Applications (DS-RT 2014), Toulouse, France. Lien externe
Benattar, G., Bérard, B., Lime, D., Mullins, J., Roux, O. H., & Sassolas, M. (août 2011). Channel synthesis for finite transducers [Communication écrite]. 13th International Conference on Automata and Format Languages (AFL'2011), Debrecen, Hungary. Publié dans International Journal of Foundations of Computer Science, 23(6). Lien externe
Bérard, B., Mullins, J., & Sassolas, M. (septembre 2010). Quantifying opacity [Communication écrite]. 7th International Conference on the Quantitative Evaluation of Systems (QEST 2010), Williamsburg, VA, USA. Lien externe
Benattar, G., Bérard, B., Lime, D., Mullins, J., Roux, O. H., & Sassolas, M. (août 2009). Covert channels with sequential transducers [Communication écrite]. 24th Annual IEEE Symposium on Logic in Computer Science (LICS 2009) and Satellite Workshop on Foundations of Computer Security (CFS 2009), Los Angeles, CA (15 pages). Lien externe
Brlek, S., Hamadou, S., & Mullins, J. (septembre 2007). A probabilistic scheduler for the analysis of cryptographic protocols [Communication écrite]. 5th International Workshop on Security Issues in Concurrency (SecCo 2007), Lisbonne, Portugal. Lien externe
Boteanu, D., Fernandez, J. M., McHugh, J., & Mullins, J. (octobre 2007). Queue management as a DoS counter-measure? [Communication écrite]. 10th Information Security Conference (ISC 2007), Valparaiso, Chile. Lien externe
Brlek, S., Hamadou, S., & Mullins, J. (2006). A Flaw in the Electronic Commerce Protocol Set. Information Processing Letters, 97(3), 104-108. Lien externe
Boteanu, D., Fernandez, J. M., & Mullins, J. (2006). On the efficiency of timeout-based DoS attack protections. (Rapport technique n° EPM-RT-2006-07). Non disponible
Brlek, S., Hamadou, S., & Mullins, J. (février 2006). Some remarks on the certificates registration of the electronic commerce protocol SET [Communication écrite]. International Conference on Internet and Web Applications and Services/Advanced International Conference on Telecommunications (AICT-ICIW 2006), San Jose, Ca. Lien externe
Brlek, S., Hamadou, S., & Mullins, J. (2005). Anonymous and Secure Electronic Transaction Protocol. Annales des télécommunications, 60(5-6), 530-557. Lien externe
Bastien, G., & Mullins, J. (août 2005). ASPIC : A tool for symbolic analysis of cryptographic protocols [Communication écrite]. 5e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2005), Gatineau, Qc, Canada. Non disponible
Ben Hadj-Alouane, N., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (2005). On the Verification of Intransitive Noninterference in Mulitlevel Security. IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics, 35(5), 948-958. Lien externe
Bergeron, M., Azambre, D., & Mullins, J. (juin 2005). SOCLe : An OCL model-checker for UML models [Communication écrite]. 2nd International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES 2005), Rennes, France. Non disponible
Ben Hadj-Alouane, N., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (décembre 2004). An algorithmic approach to verification of intransitive non-interference in security policies [Communication écrite]. 43rd IEEE Conference on Decision and Control (CDC 2004), Atlantis, Paradise Island, Bahamas. Lien externe
Ben Hadj-Alouane, N., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (septembre 2004). Discrete event systems approach to the verification of the information flow properties in secure protocols [Communication écrite]. 7th Workshop on Discrete Event System (WODES 2004), Reims, France. Publié dans IFAC Proceedings, 37(18). Lien externe
Boucheneb, H., & Mullins, J. (2003). Analyse des reseaux temporels : Calcul des classes en O(n²) et des temps de chemin en O(m×n). Technique et Science Informatiques, 22(4), 435-459. Lien externe
Brlek, S., Hamadou, S., & Mullins, J. (juin 2003). ASET-Un protocole anonyme et sécuritaire pour les transactions électroniques [Communication écrite]. 2e conférence francophone sur sécurité et architecture réseaux (SAR 2003), Nancy, France. Non disponible
Cassez, F., Mullins, J., & Roux, O. H. (septembre 2007). Synthesis of Non-interferent Distributed Systems [Communication écrite]. 4th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS07), St-Petersburg, Russie. Lien externe
Debbabi, M., Fellah, A., & Mullins, J. (juillet 2009). Secrecy in temporary secret based cryptographic protocols [Communication écrite]. 9e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2009), Montréal, Québec. Non disponible
Desharnais, J., Hodgson, B., & Mullins, J. (1997). Relation algebras are models of noncommutative propositional linear logic. Dans Brink, C., & Schmidt, G. (édit.), Relational methods in computer science (p. 106-115). Lien externe
Desharnais, J., Mili, A., Mullins, J., & Slimani, Y. (1995). Semantics of concurrent programming. Dans Somaya, A. Y. (édit.), Parallel and distributed computing handbook (p. 24-74). Non disponible
Fellah, A., & Mullins, J. Admissible Interference by Typing for Cryptographic Protocols [Communication écrite]. Information and Communications Security. Lien externe
Gardey, G., Mullins, J., & Roux, O. H. (août 2005). Non-interference control synthesis for security timed automata [Communication écrite]. 4th Workshop on Security Issues in Concurrency (SecCO 2005), San Francisco, CA. Publié dans Electronic Notes in Theoretical Computer Science, 180(1). Lien externe
Helouet, L., Marchand, H., & Mullins, J. (juin 2018). Concurrent Secrets with Quantified Suspicion [Communication écrite]. 18th International Conference on Application of Concurrency to System Design (ACSD 2018), Bratislava, Slovakia. Lien externe
Hamadou, S., Mullins, J., & Gherbi, A. (2016). A real-time concurrent constraint calculus for analyzing avionic systems embedded in the IMA connected through TTethernet. Dans Theoretical Information Reuse and Integration (Vol. 446, p. 85-111). Lien externe
Hamadou, S., Mullins, J., Chareton, C., & Gherbi, A. (août 2015). Specifying avionic embedded systems by denotations of the time-triggered constraint-based calculus [Communication écrite]. 16th IEEE International Conference on Information Reuse and Integration (IRI 2015), San Francisco, CA. Lien externe
Hamadou, S., Mullins, J., Gherbi, A., & Beji, S. (avril 2015). A time-triggered constraint-based calculus for avionic systems [Communication écrite]. 18th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW 2015), Auckland , New Zealand. Lien externe
Hamadou, S., & Mullins, J. (2010). Calibrating the power of schedulers for probabilistic polynomial-time calculus. Journal of Computer Security, 18(2), 265-316. Lien externe
Hadj-Alouane Nejib, B. E. N., Lafrance, S., Feng, L. I. N., Mullins, J., & Yeddes, M. (2005). Characterizing intransitive noninterference for 3-domain security policies with observability. IEEE Transactions on Automatic Control, 50(6), 920-925. Lien externe
Hains, G., Loulergue, F., & Mullins, J. (2001). Concrete Data Structures and Functional Parallel Programming. Theoretical Computer Science, 258(1-2), 233-267. Lien externe
Hains, G., & Mullins, J. (août 1996). A categorical model of array domains [Communication écrite]. 2nd International Euro-Par Conference on Parallel Processing (Euro-Par 1996), Lyon, France. Non disponible
Hains, G., & Mullins, J. (août 1995). A metacircular data-parallel functional language [Communication écrite]. 1st International Euro-Par Conference on Parallel Processing (Euro-Par 1995), Stockholm, Suède. Lien externe
Kiraga, A. F., & Mullins, J. (avril 2011). Admissible adversaries in PRISM for probabilistic security analysis [Communication écrite]. 9th Workshop on Quantitative Aspects of Programming Languages (QAPL 2011), Saarbrücken, Germany. Non disponible
Kiraga, A. F., & Mullins, J. (septembre 2011). Admissible adversaries in PRISM for probabilistic security analysis [Communication écrite]. 5th International Workshop on Harnessing Theories for Tool Support in Software (TTSS 2011), Oslo, Norvège. Non disponible
Lauer, M., Mullins, J., & Yeddes, M. (juillet 2013). Cost optimization strategy for iterative integration of multi-critical functions in IMA and TTethernet architecture [Communication écrite]. 37th IEEE Annual Computer Software and Applications Conference Workshops (COMPSACW 2013), Kyoto, Japan. Lien externe
Lafrance, S., & Mullins, J. (2003). An information flow method to detect denial of service vulnerabilities. Journal of Universal Computer Science, 9(11), 1350-1369. Disponible
Lafrance, S., & Mullins, J. (avril 2003). An information flow method to detect denial of service vulnerabilities [Communication écrite]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Huntsville, AL, US. Non disponible
Lafrance, S., & Mullins, J. (juin 2003). A symbolic approach to the analysis of security protocols [Communication écrite]. LICS 2003 Satellite Workshop on Foundations of Computer Security (FCS 2003), Ottawa, Ont. Canada. Non disponible
Lafrance, S., & Mullins, J. (juillet 2003). Using admissible interference to detect denial of service vulnerabilities [Communication écrite]. 6th International Workshop in Formal Methods (IWFM 2003) and Electronic Workshops in Computing by British Computer Society (BCSeWiC 2003), Dublin, Irlande. Lien externe
Lafrance, S., & Mullins, J. (2002). Using admissible interference to detect denial of service attacks. (Rapport technique n° EPM-RT-2002-01). Disponible
Lafrance, S., & Mullins, J. (janvier 2002). Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols [Communication écrite]. Computing: the Australasian Theory Symposium (CATS 2002), Monash University, Melbourne, Australia (24 pages). Publié dans Electronic Notes in Theoretical Computer Science, 61. Disponible
Lafrance, S., & Mullins, J. (janvier 2002). A generic enemy process for the analysis of cryptographic protocols [Communication écrite]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Lund, Suède. Non disponible
Mindom, P. S. N., Nikanjam, A., Khomh, F., & Mullins, J. (décembre 2021). On Assessing The Safety of Reinforcement Learning algorithms Using Formal Methods [Communication écrite]. 21st International Conference on Software Quality, Reliability and Security (QRS 2021), Hainan, China. Lien externe
Mullins, J., & Yeddes, M. (mai 2014). Opacity with Orwellian observers and intransitive non-interference [Communication écrite]. 12th IFAC/IEEE Workshop on Discrete Event Systems (WODES 2014), Cachan, France. Lien externe
Mullins, J., & Oarga, R. (juin 2007). Model checking of extended OCL constraints over UML models with SOCLe [Communication écrite]. 9th IFIP International Conference on Formal Methods for Open Object-based distributed Systems (FMOODS 2007), Paphos, Chypre. Lien externe
Minier, M., Galice, S., Mullins, J., & Ubeda, S. (septembre 2006). Cryptographic protocol to establish trusted history of interactions [Communication écrite]. 3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS 2006), Hambourg, Allemagne. Lien externe
Mullins, J., & Lafrance, S. (2003). Bisimulation-Based Non-Deterministic Admissible Interference and Its Application to the Analysis of Cryptographic Protocols. Information and Software Technology, 45(11), 779-790. Lien externe
Mullins, J., & Yeddes, M. (avril 2001). Two proof methods for bisimulation-based non-deterministic admissible interference [Communication écrite]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Washington, D.C.. Non disponible
Mullins, J. (avril 2000). Non-deterministic admissible interference [Communication écrite]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Edinburgh, Scotland. Non disponible
Mullins, J. (2000). Nondeterministic admissible interference. Journal of Universal Computer Science, 6(11), 1054-1070. Lien externe
Mullins, J. (1997). On an effective hierarchy of communicating processes : separation principle and testing. Theoretical Computer Science, 174(1-2), 231-246. Lien externe
Mullins, J. (novembre 1995). On guaranteed recursively defined processes : limit and logical definability of testing [Communication écrite]. 5th Italian Conference on Theoretical Computer Science (ICTCS 1995), Ravello, Italie. Non disponible
Painchaud, F., Azambre, D., Bergeron, M., Mullins, J., & Oarga, R. M. (janvier 2005). Socle : Integrated design of software applications and security [Communication écrite]. 10th International Command and Control Research and TEchnology Symposium (ICCRTS 2005), McLean, VA. Lien externe
Robati, T., Gherbi, A., El Kouhen, A., & Mullins, J. (2017). Design and simulation of distributed IMA architectures using TTEthernet: a model-driven approach. Journal of Ambient Intelligence and Humanized Computing, 8(3), 345-355. Lien externe
Robati, T., Gherbi, A., & Mullins, J. (mai 2016). A modeling and verification approach to the design of distributed IMA architectures using TTEthernet [Communication écrite]. 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016), Madrid, Espagne. Publié dans Procedia Computer Science, 83. Disponible
Robati, T., El Kouhen, A., Gherbi, A., & Mullins, J. (2016). Time-Triggered Ethernet Metamodel: Design and Application. Journal of Software, 11(10), 1040-1053. Lien externe
Robati, T., El Kouhen, A., Gherbi, A., & Mullins, J. (septembre 2015). Simulation-based verification of avionic systems deployed on IMA architectures [Communication écrite]. 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems : Demo and Poster Session (MoDELS P&D 2015), Ottawa, ON, Canada. Lien externe
Robati, T., El Kouhen, A., Gherbi, A., Hamadou, S., & Mullins, J. (septembre 2014). An extension for AADL to model mixed-criticality avionic systems deployed on IMA architectures with TTEthernet [Communication écrite]. 1st International Workshop on Architecture Centric Virtual Integration (ACVI 2014), Valencia, Spain. Lien externe
Yeddes, M., Alla, H., & Mullins, J. (2002). Analyse structurelle d'un fonctionnement séquentiel. Journal Européen des Systèmes Automatisés, 36(8), 1101-1118. Non disponible
Yeddes, M., & Mullins, J. (septembre 2001). Quasi-synchronous approach for distributed control in synchronous systems [Communication écrite]. IEEE International Symposium on Intelligent Control (ISIC 2001), Mexico City, Mexico. Lien externe