Amel Mammar

According to our database1, Amel Mammar
  • authored at least 60 papers between 2000 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
From SysML/KAOS Domain Models to B System Specifications.
CoRR, 2018

An Event-B Model of the Hybrid ERTMS/ETCS Level 3 Standard.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2018

Event-B Expression and Verification of Translation Rules Between SysML/KAOS Domain Models and B System Specifications.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2018

Modeling the Hybrid ERTMS/ETCS Level 3 Standard Using a Formal Requirements Engineering Approach.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2018

2017
Towards Correct Cloud Resource Allocation in Business Processes.
IEEE Trans. Services Computing, 2017

Modeling a landing gear system in Event-B.
STTT, 2017

A formal approach to derive an aspect oriented programming-based implementation of a secure access control filter.
Information & Software Technology, 2017

A verification and deployment approach for elastic component-based applications.
Formal Asp. Comput., 2017

Formal Representation of SysML/KAOS Domain Model (Complete Version).
CoRR, 2017

The SysML/KAOS Domain Modeling Approach.
CoRR, 2017

Towards Using Ontologies for Domain Modeling within the SysML/KAOS Approach.
Proceedings of the IEEE 25th International Requirements Engineering Conference Workshops, 2017

Verification of SGAC Access Control Policies Using Alloy and ProB.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

2016
A formal validation of the RBAC ANSI 2012 standard using B.
Sci. Comput. Program., 2016

An automated approach for merging business process fragments.
Computers in Industry, 2016

A tool for the generation of a secure access control filter.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

SGAC: A patient-centered access control method.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

On the Use of Domain and System Knowledge Modeling in Goal-Based Event-B Specifications.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, 2016

An Event-B Based Approach for Ensuring Correct Configurable Business Processes.
Proceedings of the IEEE International Conference on Web Services, 2016

A Formal Guidance Approach for Correct Process Configuration.
Proceedings of the Service-Oriented Computing - 14th International Conference, 2016

Formal Development of a Secure Access Control Filter.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Formal Verification of Cloud Resource Allocation in Business Processes Using Event-B.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Proof-based verification approaches for dynamic properties: application to the information system domain.
Formal Asp. Comput., 2015

2014
A Tool for Verifying Dynamic Properties in B.
Proceedings of the Software Engineering and Formal Methods - 12th International Conference, 2014

Business Process Fragments Behavioral Merge.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014

A Behavior-Aware Systematic Approach for Merging Business Process Fragments.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

Verifying the Precedence Property Pattern Using the B Method.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Validating the RBAC ANSI 2012 Standard Using B.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2014

A Proved Approach for Building Correct Instances of UML Associations: Multiplicities Satisfaction.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

Formal Approach for Generating Privacy Preserving User Requirements-Based Business Process Fragments.
Proceedings of the Thirty-Seventh Australasian Computer Science Conference, 2014

2013
Process Decomposition Based on Semantics and Privacy-Aware Requirements-Driven Approach.
Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services, 2013

2012
An advanced approach for modeling and detecting software vulnerabilities.
Information & Software Technology, 2012

A systematic approach to integrate common timed security rules within a TEFSM-based system specification.
Information & Software Technology, 2012

A SPIN-based approach for detecting vulnerabilities in C programs.
Automatic Control and Computer Sciences, 2012

An Assertions-Based Approach to Verifying the Absence Property Pattern.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

Proving the Absence Property Pattern Using the B Method.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

2011
VDC-Based Dynamic Code Analysis: Application to C Programs.
J. Internet Serv. Inf. Secur., 2011

Proving Reachability in B using Substitution Refinement.
Electr. Notes Theor. Comput. Sci., 2011

A proof-based approach to verifying reachability properties.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

An overview of a proof-based approach to detecting C vulnerabilities.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Using Testing Techniques for Vulnerability Detection in C Programs.
Proceedings of the Testing Software and Systems, 2011

Using Requirements Engineering in an Automatic Security Policy Derivation Process.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Proving Non-interference on Reachability Properties: A Refinement Approach.
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011

2009
A systematic approach to generate B preconditions: application to the database domain.
Software and System Modeling, 2009

A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification.
Proceedings of the 16th Asia-Pacific Software Engineering Conference, 2009

UB2SQL.
Proceedings of the Database Technologies: Concepts, 2009

2008
Implémentation JAVA d'une spAcification B. Application aux bases de données.
Technique et Science Informatiques, 2008

Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines.
Proceedings of the 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008

2006
UB2SQL: A Tool for Building Database Applications Using UML and B Formal Method.
J. Database Manag., 2006

From a B formal specification to an executable code: application to the relational database domain.
Information & Software Technology, 2006

A formal approach based on UML and B for the specification and development of database applications.
Autom. Softw. Eng., 2006

A Formal Approach and its Tool Support for the Specification and the Verification of Structural Properties on UML Activity Diagrams.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

A formal framework to generate XPDL specifications from UML activity diagrams.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Systematic Identification of Preconditions from Set-Based Integrity Constraints.
Proceedings of the Actes du XXIVème Congrès INFORSID, Hammamet, Tunisie, 31 mai, 2006

2005
Efficient: A Toolset for Building Trusted B2B Transactions.
Proceedings of the Advanced Information Systems Engineering, 17th International Conference, 2005

A Formal Semantics of Timed Activity Diagrams and its PROMELA Translation.
Proceedings of the 12th Asia-Pacific Software Engineering Conference (APSEC 2005), 2005

2003
Design of an Automatic Prover Dedicated to the Refinement of Database Applications.
Proceedings of the FME 2003: Formal Methods, 2003

2001
Développement formel par raffinement d'applications bases de données sûres.
Ingénierie des Systèmes d'Information, 2001

Une Approche Formelle par Raffinement pour le Développement d'Applications Bases de Données Sûres.
Proceedings of the Actes du XIXème Congrès INFORSID, Martigny, Suisse, 24-27 mai, 2001, 2001

2000
A Generic Process to Refine a B Specification into a Relational Database Implementation.
Proceedings of the ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, York, UK, August 29, 2000

An Overview of a Method and Its Support Tool for Generating B Specifications from UML Notations.
Proceedings of the Fifteenth IEEE International Conference on Automated Software Engineering, 2000


  Loading...