<  Back to the Polytechnique Montréal portal

Items where Author is "Mullins, John"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Publication Date | Document subtype | No Grouping
Number of items: 77.

Article

Ammar, I., El Touati, Y., Yeddes, M., & Mullins, J. (2021). Bounded opacity for timed systems. Journal of Information Security and Applications, 61, 13 pages. External link

Ammar, I., El Touati, Y., Mullins, J., & Yeddes, M. (2021). Timed Bounded Verification of Inclusion Based on Timed Bounded Discretized Language. International Journal of Foundations of Computer Science, 32(2), 175-202. External link

Beji, S., Hamadou, S., Mullins, J., & Gherbi, A. (2019). Iterative integration of TTEthernet network flows. International Journal of Critical Computer-Based Systems, 9(3), 167-92. External link

Bérard, B., Kouchnarenko, O., Mullins, J., & Sassolas, M. (2018). Opacity for linear constraint Markov chains. Discrete Event Dynamic Systems: Theory and Applications, 28(1), 83-108. External link

Robati, T., Gherbi, A., El Kouhen, A., & Mullins, J. (2017). Design and simulation of distributed IMA architectures using TTEthernet: a model-driven approach. Journal of Ambient Intelligence and Humanized Computing, 8(3), 345-355. External link

Bérard, B., Hélouët, L., & Mullins, J. (2016). Non-interference in partial order models. ACM Transactions on Embedded Computing Systems, 16(2), 1-34. External link

Robati, T., El Kouhen, A., Gherbi, A., & Mullins, J. (2016). Time-Triggered Ethernet Metamodel: Design and Application. Journal of Software, 11(10), 1040-1053. External link

Bérard, B., Mullins, J., & Sassolas, M. (2015). Quantifying opacity. Mathematical Structures in Computer Science, 25(2), 361-403. External link

Hamadou, S., & Mullins, J. (2010). Calibrating the power of schedulers for probabilistic polynomial-time calculus. Journal of Computer Security, 18(2), 265-316. External link

Brlek, S., Hamadou, S., & Mullins, J. (2006). A Flaw in the Electronic Commerce Protocol Set. Information Processing Letters, 97(3), 104-108. External link

Brlek, S., Hamadou, S., & Mullins, J. (2005). Anonymous and Secure Electronic Transaction Protocol. Annales des télécommunications, 60(5-6), 530-557. External link

Hadj-Alouane Nejib, B. E. N., Lafrance, S., Feng, L. I. N., Mullins, J., & Yeddes, M. (2005). Characterizing intransitive noninterference for 3-domain security policies with observability. IEEE Transactions on Automatic Control, 50(6), 920-925. External link

Ben Hadj-Alouane, N., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (2005). On the Verification of Intransitive Noninterference in Mulitlevel Security. IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics, 35(5), 948-958. External link

Boucheneb, H., & Mullins, J. (2003). Analyse des reseaux temporels : Calcul des classes en O(n²) et des temps de chemin en O(m×n). Technique et Science Informatiques, 22(4), 435-459. External link

Mullins, J., & Lafrance, S. (2003). Bisimulation-Based Non-Deterministic Admissible Interference and Its Application to the Analysis of Cryptographic Protocols. Information and Software Technology, 45(11), 779-790. External link

Lafrance, S., & Mullins, J. (2003). An information flow method to detect denial of service vulnerabilities. Journal of Universal Computer Science, 9(11), 1350-1369. Available

Yeddes, M., Alla, H., & Mullins, J. (2002). Analyse structurelle d'un fonctionnement séquentiel. Journal Européen des Systèmes Automatisés, 36(8), 1101-1118. Unavailable

Hains, G., Loulergue, F., & Mullins, J. (2001). Concrete Data Structures and Functional Parallel Programming. Theoretical Computer Science, 258(1-2), 233-267. External link

Mullins, J. (2000). Nondeterministic admissible interference. Journal of Universal Computer Science, 6(11), 1054-1070. External link

Mullins, J. (1997). On an effective hierarchy of communicating processes : separation principle and testing. Theoretical Computer Science, 174(1-2), 231-246. External link

Technical Report

Bérard, B., Kouchnarenko, O., Mullins, J., & Sassolas, M. (2015). Probabilistic opacity in refinement-based modeling. (Technical Report). External link

Boteanu, D., Fernandez, J. M., & Mullins, J. (2006). On the efficiency of timeout-based DoS attack protections. (Technical Report n° EPM-RT-2006-07). Unavailable

Lafrance, S., & Mullins, J. (2002). Using admissible interference to detect denial of service attacks. (Technical Report n° EPM-RT-2002-01). Available

Paper

Mindom, P. S. N., Nikanjam, A., Khomh, F., & Mullins, J. (2021, December). On Assessing The Safety of Reinforcement Learning algorithms Using Formal Methods [Paper]. 21st International Conference on Software Quality, Reliability and Security (QRS 2021), Hainan, China. External link

Helouet, L., Marchand, H., & Mullins, J. (2018, June). Concurrent Secrets with Quantified Suspicion [Paper]. 18th International Conference on Application of Concurrency to System Design (ACSD 2018), Bratislava, Slovakia. External link

Beji, S., Gherbi, A., Mullins, J., & Hladik, P.-E. (2016, October). Model-Driven Approach to the Optimal Configuration of Time-Triggered Flows in a TTEthernet Network [Paper]. 9th International Conference on System Analysis and Modeling (SAM 2016), Saint-Malo, France. External link

Robati, T., Gherbi, A., & Mullins, J. (2016, May). A modeling and verification approach to the design of distributed IMA architectures using TTEthernet [Paper]. 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016), Madrid, Espagne. Published in Procedia Computer Science, 83. Available

Bérard, B., Kouchnarenko, O., Mullins, J., & Sassolas, M. (2016, May). Preserving opacity on Interval Markov Chains under simulation [Paper]. 13th International Workshop on Discrete Event Systems (WODES 2016), Xi'an, China. External link

Bérard, B., Hélouët, L., & Mullins, J. (2015, June). Non-interference in Partial Order Models [Paper]. 15th International Conference on Application of Concurrency to System Design (ACSD 2015), Brussels, Belgium. External link

Robati, T., El Kouhen, A., Gherbi, A., & Mullins, J. (2015, September). Simulation-based verification of avionic systems deployed on IMA architectures [Paper]. 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems : Demo and Poster Session (MoDELS P&D 2015), Ottawa, ON, Canada. External link

Hamadou, S., Mullins, J., Chareton, C., & Gherbi, A. (2015, August). Specifying avionic embedded systems by denotations of the time-triggered constraint-based calculus [Paper]. 16th IEEE International Conference on Information Reuse and Integration (IRI 2015), San Francisco, CA. External link

Hamadou, S., Mullins, J., Gherbi, A., & Beji, S. (2015, April). A time-triggered constraint-based calculus for avionic systems [Paper]. 18th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW 2015), Auckland , New Zealand. External link

Robati, T., El Kouhen, A., Gherbi, A., Hamadou, S., & Mullins, J. (2014, September). An extension for AADL to model mixed-criticality avionic systems deployed on IMA architectures with TTEthernet [Paper]. 1st International Workshop on Architecture Centric Virtual Integration (ACVI 2014), Valencia, Spain. External link

Mullins, J., & Yeddes, M. (2014, May). Opacity with Orwellian observers and intransitive non-interference [Paper]. 12th IFAC/IEEE Workshop on Discrete Event Systems (WODES 2014), Cachan, France. External link

Beji, S., Hamadou, S., Gherbi, A., & Mullins, J. (2014, October). SMT-based cost optimization approach for the integration of avionic functions in IMA and TTEthernet architectures [Paper]. 18th IEEE/ACM International Symposium on Distributed Simulations and Real Time Applications (DS-RT 2014), Toulouse, France. External link

Lauer, M., Mullins, J., & Yeddes, M. (2013, July). Cost optimization strategy for iterative integration of multi-critical functions in IMA and TTethernet architecture [Paper]. 37th IEEE Annual Computer Software and Applications Conference Workshops (COMPSACW 2013), Kyoto, Japan. External link

Benattar, G., Bérard, B., Lime, D., Mullins, J., Roux, O. H., & Sassolas, M. (2011, August). Channel synthesis for finite transducers [Paper]. 13th International Conference on Automata and Format Languages (AFL'2011), Debrecen, Hungary. Published in International Journal of Foundations of Computer Science, 23(6). External link

Abouzaid, F., Mullins, J., Mazzara, M., & Dragoni, N. (2012, June). Modelling and analysis of dynamic reconfiguration in BP-calculus [Paper]. 6th KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2012), Dubrovnik, Croatia. External link

Kiraga, A. F., & Mullins, J. (2011, April). Admissible adversaries in PRISM for probabilistic security analysis [Paper]. 9th Workshop on Quantitative Aspects of Programming Languages (QAPL 2011), Saarbrücken, Germany. Unavailable

Kiraga, A. F., & Mullins, J. (2011, September). Admissible adversaries in PRISM for probabilistic security analysis [Paper]. 5th International Workshop on Harnessing Theories for Tool Support in Software (TTSS 2011), Oslo, Norvège. Unavailable

Abouzaid, F., & Mullins, J. (2008, September). Formal Specification of Correlation in WS Orchestrations Using BP-calculus [Paper]. 5th International Workshop on Formal Aspects of Component Software (FACS 2008), Malaga, Spain. Published in Electronic Notes in Theoretical Computer Science, 260. External link

Bérard, B., Mullins, J., & Sassolas, M. (2010, September). Quantifying opacity [Paper]. 7th International Conference on the Quantitative Evaluation of Systems (QEST 2010), Williamsburg, VA, USA. External link

Benattar, G., Bérard, B., Lime, D., Mullins, J., Roux, O. H., & Sassolas, M. (2009, August). Covert channels with sequential transducers [Paper]. 24th Annual IEEE Symposium on Logic in Computer Science (LICS 2009) and Satellite Workshop on Foundations of Computer Security (CFS 2009), Los Angeles, CA (15 pages). External link

Abouzaid, F., & Mullins, J. (2009, July). Formal Specification of Correlation patterns for WS-BPEL [Paper]. 9e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2009), Montréal, Québec. Unavailable

Abouzaid, F., & Mullins, J. (2009, July). Model-checking Web Services Orchestrations using BP-calculus [Paper]. 8th International Workshop on the Foundations of Coordination Languages and Software Architectures (FOCLASA 2009), Rhodes, Greece. Published in Electronic Notes in Theoretical Computer Science, 255. External link

Debbabi, M., Fellah, A., & Mullins, J. (2009, July). Secrecy in temporary secret based cryptographic protocols [Paper]. 9e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2009), Montréal, Québec. Unavailable

Abouzaid, F., & Mullins, J. (2007, December). A Calculus for Generation, Verification and Refinement of BPEL Specifications [Paper]. 3rd International Workshop on Automated Specification and Verification of Web Systems (WWV 2007), Venice, Italy. Published in Electronic Notes in Theoretical Computer Science, 200(3). External link

Mullins, J., & Oarga, R. (2007, June). Model checking of extended OCL constraints over UML models with SOCLe [Paper]. 9th IFIP International Conference on Formal Methods for Open Object-based distributed Systems (FMOODS 2007), Paphos, Chypre. External link

Gardey, G., Mullins, J., & Roux, O. H. (2005, August). Non-interference control synthesis for security timed automata [Paper]. 4th Workshop on Security Issues in Concurrency (SecCO 2005), San Francisco, CA. Published in Electronic Notes in Theoretical Computer Science, 180(1). External link

Brlek, S., Hamadou, S., & Mullins, J. (2007, September). A probabilistic scheduler for the analysis of cryptographic protocols [Paper]. 5th International Workshop on Security Issues in Concurrency (SecCo 2007), Lisbonne, Portugal. External link

Boteanu, D., Fernandez, J. M., McHugh, J., & Mullins, J. (2007, October). Queue management as a DoS counter-measure? [Paper]. 10th Information Security Conference (ISC 2007), Valparaiso, Chile. External link

Cassez, F., Mullins, J., & Roux, O. H. (2007, September). Synthesis of Non-interferent Distributed Systems [Paper]. 4th International Conference on Mathematical Methods, Models and Architectire for Computer Networks Security (MMM-ACNS07), St-Petersburg, Russie. External link

Minier, M., Galice, S., Mullins, J., & Ubeda, S. (2006, September). Cryptographic protocol to establish trusted history of interactions [Paper]. 3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS 2006), Hambourg, Allemagne. External link

Brlek, S., Hamadou, S., & Mullins, J. (2006, February). Some remarks on the certificates registration of the electronic commerce protocol SET [Paper]. International Conference on Internet and Web Applications and Services/Advanced International Conference on Telecommunications (AICT-ICIW 2006), San Jose, Ca. External link

Fellah, A., & Mullins, J. Admissible Interference by Typing for Cryptographic Protocols [Paper]. Information and Communications Security. External link

Bastien, G., & Mullins, J. (2005, August). ASPIC : A tool for symbolic analysis of cryptographic protocols [Paper]. 5e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2005), Gatineau, Qc, Canada. Unavailable

Bergeron, M., Azambre, D., & Mullins, J. (2005, June). SOCLe : An OCL model-checker for UML models [Paper]. 2nd International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES 2005), Rennes, France. Unavailable

Painchaud, F., Azambre, D., Bergeron, M., Mullins, J., & Oarga, R. M. (2005, January). Socle : Integrated design of software applications and security [Paper]. 10th International Command and Control Research and TEchnology Symposium (ICCRTS 2005), McLean, VA. External link

Azambre, D., Bergeron, M., & Mullins, J. (2005, June). Validating UML and OCL models in SOCLe by simulation and model-checking [Paper]. 2nd International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES 2005), Rennes, France. Unavailable

Ben Hadj-Alouane, N., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (2004, December). An algorithmic approach to verification of intransitive non-interference in security policies [Paper]. 43rd IEEE Conference on Decision and Control (CDC 2004), Atlantis, Paradise Island, Bahamas. External link

Ben Hadj-Alouane, N., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (2004, September). Discrete event systems approach to the verification of the information flow properties in secure protocols [Paper]. 7th Workshop on Discrete Event System (WODES 2004), Reims, France. Published in IFAC Proceedings, 37(18). External link

Brlek, S., Hamadou, S., & Mullins, J. (2003, June). ASET-Un protocole anonyme et sécuritaire pour les transactions électroniques [Paper]. 2e conférence francophone sur sécurité et architecture réseaux (SAR 2003), Nancy, France. Unavailable

Lafrance, S., & Mullins, J. (2003, April). An information flow method to detect denial of service vulnerabilities [Paper]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Huntsville, AL, US. Unavailable

Lafrance, S., & Mullins, J. (2003, June). A symbolic approach to the analysis of security protocols [Paper]. LICS 2003 Satellite Workshop on Foundations of Computer Security (FCS 2003), Ottawa, Ont. Canada. Unavailable

Lafrance, S., & Mullins, J. (2003, July). Using admissible interference to detect denial of service vulnerabilities [Paper]. 6th International Workshop in Formal Methods (IWFM 2003) and Electronic Workshops in Computing by British Computer Society (BCSeWiC 2003), Dublin, Irlande. External link

Lafrance, S., & Mullins, J. (2002, January). Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols [Paper]. Computing: the Australasian Theory Symposium (CATS 2002), Monash University, Melbourne, Australia (24 pages). Published in Electronic Notes in Theoretical Computer Science, 61. Available

Lafrance, S., & Mullins, J. (2002, January). A generic enemy process for the analysis of cryptographic protocols [Paper]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Lund, Suède. Unavailable

Yeddes, M., & Mullins, J. (2001, September). Quasi-synchronous approach for distributed control in synchronous systems [Paper]. IEEE International Symposium on Intelligent Control (ISIC 2001), Mexico City, Mexico. External link

Mullins, J., & Yeddes, M. (2001, April). Two proof methods for bisimulation-based non-deterministic admissible interference [Paper]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Washington, D.C.. Unavailable

Mullins, J. (2000, April). Non-deterministic admissible interference [Paper]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Edinburgh, Scotland. Unavailable

Hains, G., & Mullins, J. (1996, August). A categorical model of array domains [Paper]. 2nd International Euro-Par Conference on Parallel Processing (Euro-Par 1996), Lyon, France. Unavailable

Argon, P., Mullins, J., & Roux, O. (1996, July). A correct compiler construction using Coq [Paper]. Workshop on Proof Search in Type-Theoretic Languages (CADE 1996), New Brunswick, USA. Unavailable

Hains, G., & Mullins, J. (1995, August). A metacircular data-parallel functional language [Paper]. 1st International Euro-Par Conference on Parallel Processing (Euro-Par 1995), Stockholm, Suède. External link

Mullins, J. (1995, November). On guaranteed recursively defined processes : limit and logical definability of testing [Paper]. 5th Italian Conference on Theoretical Computer Science (ICTCS 1995), Ravello, Italie. Unavailable

Book Section

Hamadou, S., Mullins, J., & Gherbi, A. (2016). A real-time concurrent constraint calculus for analyzing avionic systems embedded in the IMA connected through TTethernet. In Theoretical Information Reuse and Integration (Vol. 446, 85-111). External link

Desharnais, J., Hodgson, B., & Mullins, J. (1997). Relation algebras are models of noncommutative propositional linear logic. In Brink, C., & Schmidt, G. (eds.), Relational methods in computer science (106-115). External link

Desharnais, J., Mili, A., Mullins, J., & Slimani, Y. (1995). Semantics of concurrent programming. In Somaya, A. Y. (ed.), Parallel and distributed computing handbook (24-74). Unavailable

List generated on: Mon Jun 24 14:52:37 2024 EDT