Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of an Automatic Prover Dedicated to the Refinement of Database Applications., and . FME, volume 2805 of Lecture Notes in Computer Science, page 834-854. Springer, (2003)Formal Requirements Modeling and Verification for Critical Systems.. ICEIS (1), page 19. SCITEPRESS, (2020)A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress., , , , and . FPS, volume 6888 of Lecture Notes in Computer Science, page 218-226. Springer, (2011)Model-driven Engineering of Functional Security Policies., , , , , , and . ICEIS (3), page 374-379. SciTePress, (2010)Modeling and Verification of Solidity Smart Contracts with the B Method., , , and . ICECCS, volume 14784 of Lecture Notes in Computer Science, page 159-178. Springer, (2024)A Proved Approach for Building Correct Instances of UML Associations: Multiplicities Satisfaction., and . APSEC (1), page 438-445. IEEE Computer Society, (2014)Assessment of a Formal Requirements Modeling Approach on a Transportation System., , , , , and . ICFEM, volume 11852 of Lecture Notes in Computer Science, page 470-486. Springer, (2019)From a B formal specification to an executable code: application to the relational database domain., and . Inf. Softw. Technol., 48 (4): 253-279 (2006)Reuse of Specification Patterns with the B Method., , and . ZB, volume 2651 of Lecture Notes in Computer Science, page 40-57. Springer, (2003)Preface., and . ReMo2V, volume 241 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)