Mohamed Moez Yeddes

According to our database1, Mohamed Moez Yeddes authored at least 21 papers between 2000 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Bounded opacity for timed systems.
J. Inf. Secur. Appl., 2021

Timed Bounded Verification of Inclusion Based on Timed Bounded Discretized Language.
Int. J. Found. Comput. Sci., 2021

2017
Checking and Enforcing Security Through Opacity in Healthcare Applications.
Proceedings of the Service-Oriented Computing - ICSOC 2017 Workshops, 2017

2016
Enforcing opacity with Orwellian observation.
Proceedings of the 13th International Workshop on Discrete Event Systems, 2016

2014
Opacity with Orwellian Observers and Intransitive Non-Interference.
Proceedings of the 12th International Workshop on Discrete Event Systems, 2014

2013
Cost Optimization Strategy for Iterative Integration of Multi-critical Functions in IMA and TTEthernet Architecture.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
An Approach for Producing Privacy-Aware Reusable Business Process Fragments.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

A Semantics-Based Privacy-Aware Approach for Fragmenting Business Processes.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
An approach for the synthesis of decentralised supervisors for distributed adaptive systems.
Int. J. Crit. Comput. Based Syst., 2011

Negotiating Deadline Constraints in Inter-organizational Logistic Systems: A Healthcare Case Study.
Proceedings of the Business Process Management Workshops, 2011

2010
Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

Modeling Time Constraints in Inter-organizational Workflows.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 3, ISAS, Funchal, Madeira, Portugal, June 8, 2010

Engineering Process for Capacity-driven Web Services.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 1, DISI, Funchal, Madeira, Portugal, June 8, 2010

2009
Modifying Security Policies for the Satisfaction of Intransitive Non-Interference.
IEEE Trans. Autom. Control., 2009

Limited-Time Lookahead Diagnosability of Rectangular Hybrid Automata.
Proceedings of the 3rd IFAC Conference on Analysis and Design of Hybrid Systems, 2009

2006
A Mixed Integer Dynamic Programming Approach to a Class of Optimal Control Problems in Hybrid Systems.
Cybern. Syst., 2006

2005
On the verification of intransitive noninterference in multilevel security.
IEEE Trans. Syst. Man Cybern. Part B, 2005

Characterizing intransitive noninterference for 3-domain security policies with observability.
IEEE Trans. Autom. Control., 2005

2004
An algorithmic approach to verification of intransitive non-interference in security policies.
Proceedings of the 43rd IEEE Conference on Decision and Control, 2004

2000
Checking order-insensitivity using ternary simulation in synchronous programs.
Proceedings of the 2000 IEEE International Symposium on Performance Analysis of Systems and Software, 2000

The Partition Method for the Order - Insensitivity in a Synchronous Distributed Systems.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000


  Loading...