Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
Ammar, I., El Touati, Y., Yeddes, M., & Mullins, J. (2021). Bounded opacity for timed systems. Journal of Information Security and Applications, 61, 13 pages. External link
Ammar, I., El Touati, Y., Mullins, J., & Yeddes, M. (2021). Timed Bounded Verification of Inclusion Based on Timed Bounded Discretized Language. International Journal of Foundations of Computer Science, 32(2), 175-202. External link
Abouzaid, F., Mullins, J., Mazzara, M., & Dragoni, N. (2012, June). Modelling and analysis of dynamic reconfiguration in BP-calculus [Paper]. 6th KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2012), Dubrovnik, Croatia. External link
Abouzaid, F., & Mullins, J. (2008, September). Formal Specification of Correlation in WS Orchestrations Using BP-calculus [Paper]. 5th International Workshop on Formal Aspects of Component Software (FACS 2008), Malaga, Spain. Published in Electronic Notes in Theoretical Computer Science, 260. External link
Abouzaid, F., & Mullins, J. (2009, July). Formal Specification of Correlation patterns for WS-BPEL [Paper]. 9e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2009), Montréal, Québec. Unavailable
Abouzaid, F., & Mullins, J. (2009, July). Model-checking Web Services Orchestrations using BP-calculus [Paper]. 8th International Workshop on the Foundations of Coordination Languages and Software Architectures (FOCLASA 2009), Rhodes, Greece. Published in Electronic Notes in Theoretical Computer Science, 255. External link
Abouzaid, F., & Mullins, J. (2007, December). A Calculus for Generation, Verification and Refinement of BPEL Specifications [Paper]. 3rd International Workshop on Automated Specification and Verification of Web Systems (WWV 2007), Venice, Italy. Published in Electronic Notes in Theoretical Computer Science, 200(3). External link
Azambre, D., Bergeron, M., & Mullins, J. (2005, June). Validating UML and OCL models in SOCLe by simulation and model-checking [Paper]. 2nd International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES 2005), Rennes, France. Unavailable
Argon, P., Mullins, J., & Roux, O. (1996, July). A correct compiler construction using Coq [Paper]. Workshop on Proof Search in Type-Theoretic Languages (CADE 1996), New Brunswick, USA. Unavailable
Beji, S., Hamadou, S., Mullins, J., & Gherbi, A. (2019). Iterative integration of TTEthernet network flows. International Journal of Critical Computer-Based Systems, 9(3), 167-92. External link
Bérard, B., Kouchnarenko, O., Mullins, J., & Sassolas, M. (2018). Opacity for linear constraint Markov chains. Discrete Event Dynamic Systems: Theory and Applications, 28(1), 83-108. External link
Beji, S., Gherbi, A., Mullins, J., & Hladik, P.-E. (2016, October). Model-Driven Approach to the Optimal Configuration of Time-Triggered Flows in a TTEthernet Network [Paper]. 9th International Conference on System Analysis and Modeling (SAM 2016), Saint-Malo, France. External link
Bérard, B., Hélouët, L., & Mullins, J. (2016). Non-interference in partial order models. ACM Transactions on Embedded Computing Systems, 16(2), 1-34. External link
Bérard, B., Kouchnarenko, O., Mullins, J., & Sassolas, M. (2016, May). Preserving opacity on Interval Markov Chains under simulation [Paper]. 13th International Workshop on Discrete Event Systems (WODES 2016), Xi'an, China. External link
Bérard, B., Hélouët, L., & Mullins, J. (2015, June). Non-interference in Partial Order Models [Paper]. 15th International Conference on Application of Concurrency to System Design (ACSD 2015), Brussels, Belgium. External link
Bérard, B., Kouchnarenko, O., Mullins, J., & Sassolas, M. (2015). Probabilistic opacity in refinement-based modeling. (Technical Report). External link
Bérard, B., Mullins, J., & Sassolas, M. (2015). Quantifying opacity. Mathematical Structures in Computer Science, 25(2), 361-403. External link
Beji, S., Hamadou, S., Gherbi, A., & Mullins, J. (2014, October). SMT-based cost optimization approach for the integration of avionic functions in IMA and TTEthernet architectures [Paper]. 18th IEEE/ACM International Symposium on Distributed Simulations and Real Time Applications (DS-RT 2014), Toulouse, France. External link
Benattar, G., Bérard, B., Lime, D., Mullins, J., Roux, O. H., & Sassolas, M. (2011, August). Channel synthesis for finite transducers [Paper]. 13th International Conference on Automata and Format Languages (AFL'2011), Debrecen, Hungary. Published in International Journal of Foundations of Computer Science, 23(6). External link
Bérard, B., Mullins, J., & Sassolas, M. (2010, September). Quantifying opacity [Paper]. 7th International Conference on the Quantitative Evaluation of Systems (QEST 2010), Williamsburg, VA, USA. External link
Benattar, G., Bérard, B., Lime, D., Mullins, J., Roux, O. H., & Sassolas, M. (2009, August). Covert channels with sequential transducers [Paper]. 24th Annual IEEE Symposium on Logic in Computer Science (LICS 2009) and Satellite Workshop on Foundations of Computer Security (CFS 2009), Los Angeles, CA (15 pages). External link
Brlek, S., Hamadou, S., & Mullins, J. (2007, September). A probabilistic scheduler for the analysis of cryptographic protocols [Paper]. 5th International Workshop on Security Issues in Concurrency (SecCo 2007), Lisbonne, Portugal. External link
Boteanu, D., Fernandez, J. M., McHugh, J., & Mullins, J. (2007, October). Queue management as a DoS counter-measure? [Paper]. 10th Information Security Conference (ISC 2007), Valparaiso, Chile. External link
Brlek, S., Hamadou, S., & Mullins, J. (2006). A Flaw in the Electronic Commerce Protocol Set. Information Processing Letters, 97(3), 104-108. External link
Boteanu, D., Fernandez, J. M., & Mullins, J. (2006). On the efficiency of timeout-based DoS attack protections. (Technical Report n° EPM-RT-2006-07). Unavailable
Brlek, S., Hamadou, S., & Mullins, J. (2006, February). Some remarks on the certificates registration of the electronic commerce protocol SET [Paper]. International Conference on Internet and Web Applications and Services/Advanced International Conference on Telecommunications (AICT-ICIW 2006), San Jose, Ca. External link
Brlek, S., Hamadou, S., & Mullins, J. (2005). Anonymous and Secure Electronic Transaction Protocol. Annales des télécommunications, 60(5-6), 530-557. External link
Bastien, G., & Mullins, J. (2005, August). ASPIC : A tool for symbolic analysis of cryptographic protocols [Paper]. 5e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2005), Gatineau, Qc, Canada. Unavailable
Ben Hadj-Alouane, N., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (2005). On the Verification of Intransitive Noninterference in Mulitlevel Security. IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics, 35(5), 948-958. External link
Bergeron, M., Azambre, D., & Mullins, J. (2005, June). SOCLe : An OCL model-checker for UML models [Paper]. 2nd International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES 2005), Rennes, France. Unavailable
Ben Hadj-Alouane, N., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (2004, December). An algorithmic approach to verification of intransitive non-interference in security policies [Paper]. 43rd IEEE Conference on Decision and Control (CDC 2004), Atlantis, Paradise Island, Bahamas. External link
Ben Hadj-Alouane, N., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (2004, September). Discrete event systems approach to the verification of the information flow properties in secure protocols [Paper]. 7th Workshop on Discrete Event System (WODES 2004), Reims, France. Published in IFAC Proceedings, 37(18). External link
Boucheneb, H., & Mullins, J. (2003). Analyse des reseaux temporels : Calcul des classes en O(n²) et des temps de chemin en O(m×n). Technique et Science Informatiques, 22(4), 435-459. External link
Brlek, S., Hamadou, S., & Mullins, J. (2003, June). ASET-Un protocole anonyme et sécuritaire pour les transactions électroniques [Paper]. 2e conférence francophone sur sécurité et architecture réseaux (SAR 2003), Nancy, France. Unavailable
Cassez, F., Mullins, J., & Roux, O. H. (2007, September). Synthesis of Non-interferent Distributed Systems [Paper]. 4th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS07), St-Petersburg, Russie. External link
Debbabi, M., Fellah, A., & Mullins, J. (2009, July). Secrecy in temporary secret based cryptographic protocols [Paper]. 9e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2009), Montréal, Québec. Unavailable
Desharnais, J., Hodgson, B., & Mullins, J. (1997). Relation algebras are models of noncommutative propositional linear logic. In Brink, C., & Schmidt, G. (eds.), Relational methods in computer science (pp. 106-115). External link
Desharnais, J., Mili, A., Mullins, J., & Slimani, Y. (1995). Semantics of concurrent programming. In Somaya, A. Y. (ed.), Parallel and distributed computing handbook (pp. 24-74). Unavailable
Fellah, A., & Mullins, J. Admissible Interference by Typing for Cryptographic Protocols [Paper]. Information and Communications Security. External link
Gardey, G., Mullins, J., & Roux, O. H. (2005, August). Non-interference control synthesis for security timed automata [Paper]. 4th Workshop on Security Issues in Concurrency (SecCO 2005), San Francisco, CA. Published in Electronic Notes in Theoretical Computer Science, 180(1). External link
Helouet, L., Marchand, H., & Mullins, J. (2018, June). Concurrent Secrets with Quantified Suspicion [Paper]. 18th International Conference on Application of Concurrency to System Design (ACSD 2018), Bratislava, Slovakia. External link
Hamadou, S., Mullins, J., & Gherbi, A. (2016). A real-time concurrent constraint calculus for analyzing avionic systems embedded in the IMA connected through TTethernet. In Theoretical Information Reuse and Integration (Vol. 446, pp. 85-111). External link
Hamadou, S., Mullins, J., Chareton, C., & Gherbi, A. (2015, August). Specifying avionic embedded systems by denotations of the time-triggered constraint-based calculus [Paper]. 16th IEEE International Conference on Information Reuse and Integration (IRI 2015), San Francisco, CA. External link
Hamadou, S., Mullins, J., Gherbi, A., & Beji, S. (2015, April). A time-triggered constraint-based calculus for avionic systems [Paper]. 18th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW 2015), Auckland , New Zealand. External link
Hamadou, S., & Mullins, J. (2010). Calibrating the power of schedulers for probabilistic polynomial-time calculus. Journal of Computer Security, 18(2), 265-316. External link
Hadj-Alouane Nejib, B. E. N., Lafrance, S., Feng, L. I. N., Mullins, J., & Yeddes, M. (2005). Characterizing intransitive noninterference for 3-domain security policies with observability. IEEE Transactions on Automatic Control, 50(6), 920-925. External link
Hains, G., Loulergue, F., & Mullins, J. (2001). Concrete Data Structures and Functional Parallel Programming. Theoretical Computer Science, 258(1-2), 233-267. External link
Hains, G., & Mullins, J. (1996, August). A categorical model of array domains [Paper]. 2nd International Euro-Par Conference on Parallel Processing (Euro-Par 1996), Lyon, France. Unavailable
Hains, G., & Mullins, J. (1995, August). A metacircular data-parallel functional language [Paper]. 1st International Euro-Par Conference on Parallel Processing (Euro-Par 1995), Stockholm, Suède. External link
Kiraga, A. F., & Mullins, J. (2011, April). Admissible adversaries in PRISM for probabilistic security analysis [Paper]. 9th Workshop on Quantitative Aspects of Programming Languages (QAPL 2011), Saarbrücken, Germany. Unavailable
Kiraga, A. F., & Mullins, J. (2011, September). Admissible adversaries in PRISM for probabilistic security analysis [Paper]. 5th International Workshop on Harnessing Theories for Tool Support in Software (TTSS 2011), Oslo, Norvège. Unavailable
Lauer, M., Mullins, J., & Yeddes, M. (2013, July). Cost optimization strategy for iterative integration of multi-critical functions in IMA and TTethernet architecture [Paper]. 37th IEEE Annual Computer Software and Applications Conference Workshops (COMPSACW 2013), Kyoto, Japan. External link
Lafrance, S., & Mullins, J. (2003). An information flow method to detect denial of service vulnerabilities. Journal of Universal Computer Science, 9(11), 1350-1369. Available
Lafrance, S., & Mullins, J. (2003, April). An information flow method to detect denial of service vulnerabilities [Paper]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Huntsville, AL, US. Unavailable
Lafrance, S., & Mullins, J. (2003, June). A symbolic approach to the analysis of security protocols [Paper]. LICS 2003 Satellite Workshop on Foundations of Computer Security (FCS 2003), Ottawa, Ont. Canada. Unavailable
Lafrance, S., & Mullins, J. (2003, July). Using admissible interference to detect denial of service vulnerabilities [Paper]. 6th International Workshop in Formal Methods (IWFM 2003) and Electronic Workshops in Computing by British Computer Society (BCSeWiC 2003), Dublin, Irlande. External link
Lafrance, S., & Mullins, J. (2002). Using admissible interference to detect denial of service attacks. (Technical Report n° EPM-RT-2002-01). Available
Lafrance, S., & Mullins, J. (2002, January). Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols [Paper]. Computing: the Australasian Theory Symposium (CATS 2002), Monash University, Melbourne, Australia (24 pages). Published in Electronic Notes in Theoretical Computer Science, 61. Available
Lafrance, S., & Mullins, J. (2002, January). A generic enemy process for the analysis of cryptographic protocols [Paper]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Lund, Suède. Unavailable
Mindom, P. S. N., Nikanjam, A., Khomh, F., & Mullins, J. (2021, December). On Assessing The Safety of Reinforcement Learning algorithms Using Formal Methods [Paper]. 21st International Conference on Software Quality, Reliability and Security (QRS 2021), Hainan, China. External link
Mullins, J., & Yeddes, M. (2014, May). Opacity with Orwellian observers and intransitive non-interference [Paper]. 12th IFAC/IEEE Workshop on Discrete Event Systems (WODES 2014), Cachan, France. External link
Mullins, J., & Oarga, R. (2007, June). Model checking of extended OCL constraints over UML models with SOCLe [Paper]. 9th IFIP International Conference on Formal Methods for Open Object-based distributed Systems (FMOODS 2007), Paphos, Chypre. External link
Minier, M., Galice, S., Mullins, J., & Ubeda, S. (2006, September). Cryptographic protocol to establish trusted history of interactions [Paper]. 3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS 2006), Hambourg, Allemagne. External link
Mullins, J., & Lafrance, S. (2003). Bisimulation-Based Non-Deterministic Admissible Interference and Its Application to the Analysis of Cryptographic Protocols. Information and Software Technology, 45(11), 779-790. External link
Mullins, J., & Yeddes, M. (2001, April). Two proof methods for bisimulation-based non-deterministic admissible interference [Paper]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Washington, D.C.. Unavailable
Mullins, J. (2000, April). Non-deterministic admissible interference [Paper]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Edinburgh, Scotland. Unavailable
Mullins, J. (2000). Nondeterministic admissible interference. Journal of Universal Computer Science, 6(11), 1054-1070. External link
Mullins, J. (1997). On an effective hierarchy of communicating processes : separation principle and testing. Theoretical Computer Science, 174(1-2), 231-246. External link
Mullins, J. (1995, November). On guaranteed recursively defined processes : limit and logical definability of testing [Paper]. 5th Italian Conference on Theoretical Computer Science (ICTCS 1995), Ravello, Italie. Unavailable
Painchaud, F., Azambre, D., Bergeron, M., Mullins, J., & Oarga, R. M. (2005, January). Socle : Integrated design of software applications and security [Paper]. 10th International Command and Control Research and TEchnology Symposium (ICCRTS 2005), McLean, VA. External link
Robati, T., Gherbi, A., El Kouhen, A., & Mullins, J. (2017). Design and simulation of distributed IMA architectures using TTEthernet: a model-driven approach. Journal of Ambient Intelligence and Humanized Computing, 8(3), 345-355. External link
Robati, T., Gherbi, A., & Mullins, J. (2016, May). A modeling and verification approach to the design of distributed IMA architectures using TTEthernet [Paper]. 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016), Madrid, Espagne. Published in Procedia Computer Science, 83. Available
Robati, T., El Kouhen, A., Gherbi, A., & Mullins, J. (2016). Time-Triggered Ethernet Metamodel: Design and Application. Journal of Software, 11(10), 1040-1053. External link
Robati, T., El Kouhen, A., Gherbi, A., & Mullins, J. (2015, September). Simulation-based verification of avionic systems deployed on IMA architectures [Paper]. 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems : Demo and Poster Session (MoDELS P&D 2015), Ottawa, ON, Canada. External link
Robati, T., El Kouhen, A., Gherbi, A., Hamadou, S., & Mullins, J. (2014, September). An extension for AADL to model mixed-criticality avionic systems deployed on IMA architectures with TTEthernet [Paper]. 1st International Workshop on Architecture Centric Virtual Integration (ACVI 2014), Valencia, Spain. External link
Yeddes, M., Alla, H., & Mullins, J. (2002). Analyse structurelle d'un fonctionnement séquentiel. Journal Européen des Systèmes Automatisés, 36(8), 1101-1118. Unavailable
Yeddes, M., & Mullins, J. (2001, September). Quasi-synchronous approach for distributed control in synchronous systems [Paper]. IEEE International Symposium on Intelligent Control (ISIC 2001), Mexico City, Mexico. External link