Jean-Luc Richier

Affiliations:
  • IMAG, Grenoble, France


According to our database1, Jean-Luc Richier authored at least 33 papers between 1985 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2015
Validation of IS Security Policies Featuring Authorisation Constraints.
Int. J. Inf. Syst. Model. Des., 2015

Validation of a Security Policy by the Test of Its Formal B Specification - A Case Study.
Proceedings of the 3rd IEEE/ACM FME Workshop on Formal Methods in Software Engineering, 2015

2014
Automatic Model Inference of Web Applications for Security Testing.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

KameleonFuzz: evolutionary fuzzing for black-box XSS detection.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
LigRE: Reverse-engineering of control and data flow models for black-box XSS detection.
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

Automatic Generation of Test Drivers for Model Inference of Web Applications.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Evolving indigestible codes: Fuzzing interpreters with genetic programming.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, 2013

2012
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

2011
Runtime enforcement monitors: composition, synthesis, and enforcement abilities.
Formal Methods Syst. Des., 2011

Validation of security policies by the animation of Z specifications.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Security Vulnerabilities Detection Using Model Inference for Applications and Security Protocols.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Taking into Account Functional Models in the Validation of IS Security Policies.
Proceedings of the Advanced Information Systems Engineering Workshops, 2011

2010
Assertion-based test oracles for home automation systems.
Proceedings of the 7th International Workshop on Model-Based Methodologies for Pervasive and Embedded Software, 2010

2009
Service specification and validation in the context of the home.
Proceedings of the Feature Interactions in Software and Communication Systems X, 2009

2008
j-POST: a Java Toolchain for Property-Oriented Software Testing.
Proceedings of the Fourth Workshop on Model Based Testing, 2008

Test generation and execution for security rules in temporal logic.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

2007
A Compositional Testing Framework Driven by Partial Specifications.
Proceedings of the Testing of Software and Communicating Systems, 2007

2006
Test Generation for Network Security Rules.
Proceedings of the Testing of Communicating Systems, 2006

A Test Calculus Framework Applied to Network Security Policies.
Proceedings of the Formal Approaches to Software Testing and Runtime Verification, 2006

2003
Testing Against Some Eventuality Properties of Synchronous Software: A Case Study.
Proceedings of the Synchronous Languages, Applications and Programming, 2003

An Environment for Interactive Service Specification.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VII, 2003

2000
Feature interaction detection using a synchronous approach and testing.
Comput. Networks, 2000

1999
Lutess: A Specification-Driven Testing Environment for Synchronous Software.
Proceedings of the 1999 International Conference on Software Engineering, 1999

1998
Lutess: a testing environment for synchronous software.
Proceedings of the International Workshop Tool Support for System Specification, 1998

Expressing and implementing operational profiles for reactive software validation.
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998

Incremental Feature Validation: a Synchronous Point of View.
Proceedings of the Feature Interactions in Telecommunications and Software Systems V, September 29, 1998

1992
Active Replication in Delta-4.
Proceedings of the Digest of Papers: FTCS-22, 1992

1990
ATP: an Algebra for Timed Processes.
Proceedings of the Programming concepts and methods: Proceedings of the IFIP Working Group 2.2, 1990

Formal Specification and Verification of a Network Independent Atomic Multicast Protocol.
Proceedings of the Formal Description Techniques, 1990

1989
What are the Limits of Model Checking Methods for the Verification of Real Life Protocols?
Proceedings of the Automatic Verification Methods for Finite State Systems, 1989

1987
Verification in XESAR of the Sliding Window Protocol.
Proceedings of the Protocol Specification, 1987

1985
Distributed Termination in CSP: Symmetric Solutions with Minimal Storage.
Proceedings of the STACS 85, 1985

Verification of protocol specificaitons using the CESAR system.
Proceedings of the Protocol Specification, 1985


  Loading...