Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Jérémy Milhau"'
Publikováno v:
HAL
ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes, 2012, 37 (4), pp.1-8
ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes, 2012, 37 (4), pp.1-8
astd is a formal and graphical language specifically defined for information system specification. Up to now, a specifier had to build an astd specification from scratch and there were no refinement techniques for stepwise construction. This paper ai
Autor:
Nafees Qamar, Régine Laleau, Jérémy Milhau, Jean-Luc Richier, Mohamed Amine Labiadh, Yves Ledru, Akram Idani
Publikováno v:
International Journal of Information System Modeling and Design
International Journal of Information System Modeling and Design, IGI Global, 2015, 6 (1), pp.24-46
International Journal of Information System Modeling and Design, IGI Global, 2015, 6 (1), pp.24-46
Designing a security policy for an information system (IS) is a non-trivial task. Variants of the RBAC model can be used to express such policies as access-control rules associated to constraints. In this paper, we advocate that currently available t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6756b94d890d1d3523399b4a319a9a2f
https://hal.inria.fr/hal-00976108
https://hal.inria.fr/hal-00976108
Publikováno v:
Formal Asp. Comput.
Formal Asp. Comput., 2014, 26 (5), pp.919--941. ⟨10.1007/s00165-013-0286-3⟩
Formal Asp. Comput., 2014, 26 (5), pp.919--941. ⟨10.1007/s00165-013-0286-3⟩
This paper introduces three refinement patterns for algebraic state-transition diagrams ( astds ): state refinement, transition refinement and loop-transition refinement. These refinement patterns are derived from practice in using astds for specifyi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::55174b5ad4966a02987d79d462e09c79
https://hal.archives-ouvertes.fr/hal-01575321
https://hal.archives-ouvertes.fr/hal-01575321
Publikováno v:
Foundations and Practice of Security ISBN: 9783642279003
FPS
FPS
Verification and validation of access-control policies for information systems is a difficult yet necessary task. In order to take advantage of the formal properties and tools of the B method, we introduce in this paper a metamodel of the B modeling
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a4610de8a5844b11c051157fe24f9497
https://doi.org/10.1007/978-3-642-27901-0_19
https://doi.org/10.1007/978-3-642-27901-0_19
Publikováno v:
Innovations in Systems and Software Engineering
Innovations in Systems and Software Engineering, Springer Verlag, 2011, 7 (4), pp.303-313. ⟨10.1007/s11334-011-0166-z⟩
Innovations in Systems and Software Engineering, Springer Verlag, 2011, 7 (4), pp.303-313. ⟨10.1007/s11334-011-0166-z⟩
International audience; Combination of formal and semi-formal methods is more and more required to produce specifications that can be, on the one hand, understood and thus validated by both designers and users and, on the other hand, precise enough t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cb01d5c4a38ece76bfc4facbb1e58fde
https://hal.archives-ouvertes.fr/hal-00860798
https://hal.archives-ouvertes.fr/hal-00860798
Autor:
Akram Idani, Jérémy Milhau, Mohamed-Amine Labiadh, Régine Laleau, Jean-Luc Richier, Yves Ledru, Nafees Qamar
Publikováno v:
Advanced Information Systems Engineering Workshops (CAiSE 2011)
WISSE 2011-1st International Workshop on Information Systems Security Engineering (in CAiSE 2011)
WISSE 2011-1st International Workshop on Information Systems Security Engineering (in CAiSE 2011), Jun 2011, London, United Kingdom. pp.592-606, ⟨10.1007/978-3-642-22056-2_62⟩
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications ISBN: 9783319125671
CAiSE Workshops
WISSE 2011-1st International Workshop on Information Systems Security Engineering (in CAiSE 2011)
WISSE 2011-1st International Workshop on Information Systems Security Engineering (in CAiSE 2011), Jun 2011, London, United Kingdom. pp.592-606, ⟨10.1007/978-3-642-22056-2_62⟩
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications ISBN: 9783319125671
CAiSE Workshops
International audience; Designing a security policy for an information system (IS) is a non-trivial task. Variants of the RBAC model can be used to express such policies as access-control rules associated to constraints. In this paper, we advocate th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c88e8590c8966d47482ce5b3c29dae4a
https://hal.archives-ouvertes.fr/hal-00860806
https://hal.archives-ouvertes.fr/hal-00860806
Autor:
Michel Embe-Jiague, Marc Frappier, Frederic Gervais, Pierre Konopacki, Régine Laleau, Jérémy Milhau, Richard St-Denis
Publikováno v:
12th International Conference on Enterprise Information Systems (ICEIS)
12th International Conference on Enterprise Information Systems (ICEIS), 2010, Unknown, Unknown Region. pp.374--379
HAL
12th International Conference on Enterprise Information Systems (ICEIS), 2010, Unknown, Unknown Region. pp.374--379
HAL
International audience; no abstract
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::fbb26e1bb80b2bc6e8fe56b63bcf6f38
https://hal.science/hal-01224649
https://hal.science/hal-01224649
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642002540
IFM
IFM
This paper describes an algorithm to automatically generate error messages for events refused by a process expression. It can be used in the context of an information system specified with the EB3 method. In this method, a process expression is used
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d4c5934983bc876138c884bb2dfdf73b
https://doi.org/10.1007/978-3-642-00255-7_23
https://doi.org/10.1007/978-3-642-00255-7_23