John Mullins
Citeras av
Citeras av
Quantifying opacity
B Bérard, J Mullins, M Sassolas
Mathematical Structures in Computer Science 25 (2), 361-403, 2015
On the verification of intransitive noninterference in mulitlevel security
NB Hadj-Alouane, S Lafrance, F Lin, J Mullins, MM Yeddes
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 35 …, 2005
Nondeterministic Admissible Interference.
J Mullins
J. Univers. Comput. Sci. 6 (11), 1054-1070, 2000
A calculus for generation, verification and refinement of bpel specifications
F Abouzaid, J Mullins
Electronic Notes in Theoretical Computer Science 200 (3), 43-65, 2008
A flaw in the electronic commerce protocol SET
S Brlek, S Hamadou, J Mullins
Information Processing Letters 97 (3), 104-108, 2006
Non-interference control synthesis for security timed automata
G Gardey, J Mullins, OH Roux
Electronic Notes in Theoretical Computer Science 180 (1), 35-53, 2007
SMT-based cost optimization approach for the integration of avionic functions in IMA and TTEthernet architectures
S Beji, S Hamadou, A Gherbi, J Mullins
2014 IEEE/ACM 18th International Symposium on Distributed Simulation and …, 2014
Analyse des réseaux temporels: Calcul des classes en O (n 2) et des temps de chemin en
H Boucheneb, J Mullins
Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols
S Lafrance, J Mullins
Electronic Notes in Theoretical Computer Science 61, 154-177, 2002
Queue Management as a DoS counter-measure?
D Boteanu, JM Fernandez, J McHugh, J Mullins
Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007
Characterizing intransitive noninterference for 3-domain security policies with observability
NB Hadj-Alouane, S Lafrance, F Lin, J Mullins, M Yeddes
IEEE transactions on automatic control 50 (6), 920-925, 2005
Opacity with orwellian observers and intransitive non-interference
J Mullins, M Yeddes
IFAC Proceedings Volumes 47 (2), 344-349, 2014
Model checking of extended OCL constraints on UML models in SOCLe
J Mullins, R Oarga
Formal Methods for Open Object-Based Distributed Systems: 9th IFIP WG 6.1 …, 2007
Synthesis of non-interferent distributed systems
F Cassez, J Mullins, OH Roux
Computer Network Security: Fourth International Conference on Mathematical …, 2007
Model-checking web services orchestrations using bp-calculus
F Abouzaid, J Mullins
Electronic Notes in Theoretical Computer Science 255, 3-21, 2009
Using Admissible Interference to Detect Denial of Service Vulnerabilities.
S Lafrance, J Mullins
IWFM, 2003
Cost optimization strategy for iterative integration of multi-critical functions in ima and ttethernet architecture
M Lauer, J Mullins, M Yeddes
2013 IEEE 37th Annual Computer Software and Applications Conference …, 2013
An information flow method to detect denial of service vulnerabilities
S Lafrance, J Mullins
Journal of Universal Computer Science 9 (11), 1350-1369, 2003
Towards a formal analysis of dynamic reconfiguration in WS-BPEL
F Abouzaid, M Mazzara, J Mullins, N Qamar
Intelligent Decision Technologies 7 (3), 213-224, 2013
Design and simulation of distributed IMA architectures using TTEthernet: a model-driven approach
T Robati, A Gherbi, A El Kouhen, J Mullins
Journal of Ambient Intelligence and Humanized Computing 8, 345-355, 2017
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20