Author of the publication

A language agnostic approach to modeling requirements: specification and verification.

, , , , and . MoDELS (Companion), page 78:1-78:10. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms., , and . ACM Conference on Computer and Communications Security, page 432-441. ACM, (2009)In my Wish List, an Automated Tool for Fail-Secure Design Analysis: an Alloy-Based Feasibility Draft.. ESSS, volume 150 of EPTCS, page 50-55. (2014)Confidentiality Enforcement Using Dynamic Information Flow Analyses.. Kansas State University, United States of America, (2007)From Monolithic to Microservice Architecture: The Case of Extensible and Domain-Specific IDEs., , , , and . MoDELS (Companion), page 454-463. IEEE, (2021)Automata-Based Confidentiality Monitoring., , , and . ASIAN, volume 4435 of Lecture Notes in Computer Science, page 75-89. Springer, (2006)Information Flow Testing.. ASIAN, volume 4846 of Lecture Notes in Computer Science, page 33-47. Springer, (2007)FLIC: Application to Caching of a Dynamic Dependency Analysis for a 3D Oriented CRS., and . RULE@RDP, volume 219 of Electronic Notes in Theoretical Computer Science, page 3-18. Elsevier, (2007)Precise Dynamic Verification of Confidentiality.. VERIFY, volume 372 of CEUR Workshop Proceedings, CEUR-WS.org, (2008)Automaton-based Confidentiality Monitoring of Concurrent Programs.. CSF, page 218-232. IEEE Computer Society, (2007)USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework., , , and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 732-742. Springer, (2018)