Amel Mammar

Orcid: 0000-0003-0016-6898

Affiliations:
  • Télécom SudParis


According to our database1, Amel Mammar authored at least 83 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A formal approach for the correct deployment of cloud applications.
Sci. Comput. Program., January, 2024

2023
Modeling and Verifying an Arrival Manager Using Event-B.
Proceedings of the Rigorous State-Based Methods - 9th International Conference, 2023

A Tool-Supported Approach for Modeling and Verifying Hybrid Systems using EVENT-B and the Differential Equation Solver SAGEMATH.
Proceedings of the 18th International Conference on Software Technologies, 2023

Proving Local Invariants in ASTDs.
Proceedings of the Formal Methods and Software Engineering, 2023

2022
A Correct-by-Construction Model for Verifying Transactional Composite Services Configuration.
IEEE Trans. Serv. Comput., 2022

Modeling and proving hybrid programs with Event-B: An approach by generalization and instantiation.
Sci. Comput. Program., 2022

An Event-B-Based Approach to Model and Verify Behaviors for Component-Based Applications.
Comput. J., 2022

Building Correct Hybrid Systems using Event-B and Sagemath: Illustration by the Hybrid Smart Heating System Case Study.
Proceedings of the 26th International Conference on Engineering of Complex Computer Systems, 2022

2020
A formal refinement-based analysis of the hybrid ERTMS/ETCS level 3 standard.
Int. J. Softw. Tools Technol. Transf., 2020

Modeling the hybrid ERTMS/ETCS level 3 standard using a formal requirements engineering approach.
Int. J. Softw. Tools Technol. Transf., 2020

An Event-B Model of an Automotive Adaptive Exterior Light System.
Proceedings of the Rigorous State-Based Methods - 7th International Conference, 2020

Modeling of a Speed Control System Using Event-B.
Proceedings of the Rigorous State-Based Methods - 7th International Conference, 2020

Modelling Hybrid Programs with Event-B.
Proceedings of the Rigorous State-Based Methods - 7th International Conference, 2020

Intrusion Detection Using ASTDs.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Towards correct cloud resource allocation in FOSS applications.
Future Gener. Comput. Syst., 2019

Intrusion Detection Systems: A Cross-Domain Overview.
IEEE Commun. Surv. Tutorials, 2019

SGAC: A Multi-Layered Access Control Model with Conflict Resolution Strategy.
Comput. J., 2019

A Formal Requirements Modeling Approach: Application to Rail Communication.
Proceedings of the 14th International Conference on Software Technologies, 2019

Assessment of a Formal Requirements Modeling Approach on a Transportation System.
Proceedings of the Formal Methods and Software Engineering, 2019

2018
Parameterized verification of monotone information systems.
Formal Aspects Comput., 2018

The Generic SysML/KAOS Domain Metamodel.
CoRR, 2018

From SysML/KAOS Domain Models to B System Specifications.
CoRR, 2018

Formalisation of SysML/KAOS Goal Assignments with B System Component Decompositions.
Proceedings of the Integrated Formal Methods - 14th International Conference, 2018

Extended Algebraic State-Transition Diagrams.
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018

Back Propagating B System Updates on SysML/KAOS Domain Models.
Proceedings of the 23rd International Conference on Engineering of Complex Computer Systems, 2018

An Event-B Model of the Hybrid ERTMS/ETCS Level 3 Standard.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2018

Event-B Expression and Verification of Translation Rules Between SysML/KAOS Domain Models and B System Specifications.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2018

2017
Towards Correct Cloud Resource Allocation in Business Processes.
IEEE Trans. Serv. Comput., 2017

Modeling a landing gear system in Event-B.
Int. J. Softw. Tools Technol. Transf., 2017

A formal approach to derive an aspect oriented programming-based implementation of a secure access control filter.
Inf. Softw. Technol., 2017

A verification and deployment approach for elastic component-based applications.
Formal Aspects Comput., 2017

Formal Representation of SysML/KAOS Domain Model (Complete Version).
CoRR, 2017

The SysML/KAOS Domain Modeling Approach.
CoRR, 2017

Towards Using Ontologies for Domain Modeling within the SysML/KAOS Approach.
Proceedings of the IEEE 25th International Requirements Engineering Conference Workshops, 2017

Verification of SGAC Access Control Policies Using Alloy and ProB.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

2016
A formal validation of the RBAC ANSI 2012 standard using B.
Sci. Comput. Program., 2016

An automated approach for merging business process fragments.
Comput. Ind., 2016

A tool for the generation of a secure access control filter.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

SGAC: A patient-centered access control method.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

On the Use of Domain and System Knowledge Modeling in Goal-Based Event-B Specifications.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, 2016

An Event-B Based Approach for Ensuring Correct Configurable Business Processes.
Proceedings of the IEEE International Conference on Web Services, 2016

A Formal Guidance Approach for Correct Process Configuration.
Proceedings of the Service-Oriented Computing - 14th International Conference, 2016

Formal Development of a Secure Access Control Filter.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Formal Verification of Cloud Resource Allocation in Business Processes Using Event-B.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Proof-based verification approaches for dynamic properties: application to the information system domain.
Formal Aspects Comput., 2015

2014
A Tool for Verifying Dynamic Properties in B.
Proceedings of the Software Engineering and Formal Methods - 12th International Conference, 2014

Business Process Fragments Behavioral Merge.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014

A Behavior-Aware Systematic Approach for Merging Business Process Fragments.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

Verifying the Precedence Property Pattern Using the B Method.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Validating the RBAC ANSI 2012 Standard Using B.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2014

A Proved Approach for Building Correct Instances of UML Associations: Multiplicities Satisfaction.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

Formal Approach for Generating Privacy Preserving User Requirements-Based Business Process Fragments.
Proceedings of the Thirty-Seventh Australasian Computer Science Conference, 2014

2013
Process Decomposition Based on Semantics and Privacy-Aware Requirements-Driven Approach.
Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services, 2013

2012
An advanced approach for modeling and detecting software vulnerabilities.
Inf. Softw. Technol., 2012

A systematic approach to integrate common timed security rules within a TEFSM-based system specification.
Inf. Softw. Technol., 2012

A SPIN-based approach for detecting vulnerabilities in C programs.
Autom. Control. Comput. Sci., 2012

An Assertions-Based Approach to Verifying the Absence Property Pattern.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

Proving the Absence Property Pattern Using the B Method.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

2011
VDC-Based Dynamic Code Analysis: Application to C Programs.
J. Internet Serv. Inf. Secur., 2011

Proving Reachability in B using Substitution Refinement.
Proceedings of the B 2011 Workshop, 2011

A proof-based approach to verifying reachability properties.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

An overview of a proof-based approach to detecting C vulnerabilities.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Using Testing Techniques for Vulnerability Detection in C Programs.
Proceedings of the Testing Software and Systems, 2011

Using Requirements Engineering in an Automatic Security Policy Derivation Process.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Proving Non-interference on Reachability Properties: A Refinement Approach.
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011

2009
A systematic approach to generate B preconditions: application to the database domain.
Softw. Syst. Model., 2009

A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification.
Proceedings of the 16th Asia-Pacific Software Engineering Conference, 2009

UB2SQL.
Proceedings of the Database Technologies: Concepts, 2009

2008
Implémentation JAVA d'une spAcification B. Application aux bases de données.
Tech. Sci. Informatiques, 2008

Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008

2006
UB2SQL: A Tool for Building Database Applications Using UML and B Formal Method.
J. Database Manag., 2006

From a B formal specification to an executable code: application to the relational database domain.
Inf. Softw. Technol., 2006

A formal approach based on UML and B for the specification and development of database applications.
Autom. Softw. Eng., 2006

A Formal Approach and its Tool Support for the Specification and the Verification of Structural Properties on UML Activity Diagrams.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

A formal framework to generate XPDL specifications from UML activity diagrams.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Systematic Identification of Preconditions from Set-Based Integrity Constraints.
Proceedings of the Actes du XXIVème Congrès INFORSID, Hammamet, Tunisie, 31 mai, 2006

2005
Efficient: A Toolset for Building Trusted B2B Transactions.
Proceedings of the Advanced Information Systems Engineering, 17th International Conference, 2005

A Formal Semantics of Timed Activity Diagrams and its PROMELA Translation.
Proceedings of the 12th Asia-Pacific Software Engineering Conference (APSEC 2005), 2005

2003
Design of an Automatic Prover Dedicated to the Refinement of Database Applications.
Proceedings of the FME 2003: Formal Methods, 2003

2001
Développement formel par raffinement d'applications bases de données sûres.
Ingénierie des Systèmes d Inf., 2001

Une Approche Formelle par Raffinement pour le Développement d'Applications Bases de Données Sûres.
Proceedings of the Actes du XIXème Congrès INFORSID, Martigny, Suisse, 24-27 mai, 2001, 2001

2000
A Generic Process to Refine a B Specification into a Relational Database Implementation.
Proceedings of the ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, York, UK, August 29, 2000

An Overview of a Method and Its Support Tool for Generating B Specifications from UML Notations.
Proceedings of the Fifteenth IEEE International Conference on Automated Software Engineering, 2000


  Loading...