关注
Tony Bourdier
Tony Bourdier
iRaiser
在 iraiser.eu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Extensional and intensional strategies
T Bourdier, H Cirstea, D Dougherty, H Kirchner
arXiv preprint arXiv:1001.4427, 2010
312010
Formal specification and validation of security policies
T Bourdier, H Cirstea, M Jaume, H Kirchner
Foundations and Practice of Security: 4th Canada-France MITACS Workshop, FPS …, 2012
172012
On formal specification and analysis of security policies
T Bourdier, H Cirstea, M Jaume, H Kirchner
2010 Grande Region Security and Reliability Day, 2010
82010
Symbolic analysis of network security policies using rewrite systems
T Bourdier, H Cirstea
Proceedings of the 13th international ACM SIGPLAN symposium on Principles …, 2011
52011
Une nouvelle méthode de Web Usage Mining basée sur une analyse sémiotique du comportement de navigation.
S Mellot, T Bourdier, M Baccouche
EGC, 299-304, 2015
42015
Tree automata based semantics of firewalls
T Bourdier
2011 Conference on Network and Information Systems Security, 1-8, 2011
42011
Specification, analysis and transformation of security policies via rewriting techniques
T Bourdier
Journal of Information Assurance and Security 6 (5), 357-368, 2011
22011
Formal specification and validation of security policies
T Bourdier, H Cirstea, M Jaume, H Kirchner
22010
Constrained rewriting in recognizable theories
T Bourdier, H Cirstea
22010
Analysis of lattice-based access control policies using rewriting systems and tom
T Bourdier, H Cirstea, PE Moreau, AS de Oliveira
Proceedings of the 1st Luxembourg Day on Security and Reliability, 33-40, 2009
22009
Rule-based specification and analysis of security policies
T Bourdier, H Cirstea, M Jaume, H Kirchner
22009
Méthodes algébriques pour la formalisation et l'analyse de politiques de sécurité
T Bourdier
Université Henri Poincaré-Nancy I, 2011
12011
Mathématiques et Histoire de l'art
T Bourdier, S Mellot
Pourquoi les Mathématiques?, 2015
2015
Algebraic methods for designing and analyzing security policies
T Bourdier
< bound method Organization. get_name_with_acronym of< Organization: TEL …, 2011
2011
Méthodes algébriques pour la formalisation et l'analyse de politiques de sécurité| Theses. fr
T Bourdier
Nancy 1, 2011
2011
Algebraic methods for specifying and analyzing security policies
T Bourdier
HAL 2011, 2011
2011
Automatic analysis of firewalls using tree automata
T Bourdier
Rule Based Specification of Security Policies
T Bourdier, H Cirstea, C Hurlin, H Kirchner
系统目前无法执行此操作,请稍后再试。
文章 1–18