Author of the publication

Formal Development of a Secure Access Control Filter.

, , and . HASE, page 173-180. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of an Automatic Prover Dedicated to the Refinement of Database Applications., and . FME, volume 2805 of Lecture Notes in Computer Science, page 834-854. Springer, (2003)Formal Requirements Modeling and Verification for Critical Systems.. ICEIS (1), page 19. SCITEPRESS, (2020)A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress., , , , and . FPS, volume 6888 of Lecture Notes in Computer Science, page 218-226. Springer, (2011)Model-driven Engineering of Functional Security Policies., , , , , , and . ICEIS (3), page 374-379. SciTePress, (2010)Using Variants in KAOS Goal Modelling., , , and . ICEIS (3-2), page 339-344. (2008)978-989-8111-38-8.Supporting Variability in Goal-based Requirements., , and . RCIS, page 237-246. IEEE, (2009)Modelling Hybrid Programs with Event-B., , and . ABZ, volume 12071 of Lecture Notes in Computer Science, page 139-154. Springer, (2020)An Event-B Model of an Automotive Adaptive Exterior Light System., , and . ABZ, volume 12071 of Lecture Notes in Computer Science, page 351-366. Springer, (2020)Reuse of Specification Patterns with the B Method., , and . ZB, volume 2651 of Lecture Notes in Computer Science, page 40-57. Springer, (2003)A Proved Approach for Building Correct Instances of UML Associations: Multiplicities Satisfaction., and . APSEC (1), page 438-445. IEEE Computer Society, (2014)