Quantifying opacity B Bérard, J Mullins, M Sassolas Mathematical Structures in Computer Science 25 (2), 361-403, 2015 | 98 | 2015 |
On the verification of intransitive noninterference in mulitlevel security NB Hadj-Alouane, S Lafrance, F Lin, J Mullins, MM Yeddes IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 35 …, 2005 | 86 | 2005 |
Nondeterministic admissible interference J Mullins Journal of Universal Computer Science, 2024 | 47 | 2024 |
A calculus for generation, verification and refinement of bpel specifications F Abouzaid, J Mullins Electronic Notes in Theoretical Computer Science 200 (3), 43-65, 2008 | 45 | 2008 |
Non-interference control synthesis for security timed automata G Gardey, J Mullins, OH Roux Electronic Notes in Theoretical Computer Science 180 (1), 35-53, 2007 | 42 | 2007 |
A flaw in the electronic commerce protocol SET S Brlek, S Hamadou, J Mullins Information Processing Letters 97 (3), 104-108, 2006 | 37 | 2006 |
SMT-based cost optimization approach for the integration of avionic functions in IMA and TTEthernet architectures S Beji, S Hamadou, A Gherbi, J Mullins 2014 IEEE/ACM 18th International Symposium on Distributed Simulation and …, 2014 | 32 | 2014 |
Characterizing intransitive noninterference for 3-domain security policies with observability NB Hadj-Alouane, S Lafrance, F Lin, J Mullins, M Yeddes IEEE transactions on automatic control 50 (6), 920-925, 2005 | 31 | 2005 |
Opacity with orwellian observers and intransitive non-interference J Mullins, M Yeddes IFAC Proceedings Volumes 47 (2), 344-349, 2014 | 29 | 2014 |
Analyse des réseaux temporels: Calcul des classes en O (n 2) et des temps de chemin en H Boucheneb, J Mullins | 28 | 2003 |
Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols S Lafrance, J Mullins Electronic Notes in Theoretical Computer Science 61, 154-177, 2002 | 27 | 2002 |
Queue Management as a DoS counter-measure? D Boteanu, JM Fernandez, J McHugh, J Mullins Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007 | 26 | 2007 |
Model checking of extended OCL constraints on UML models in SOCLe J Mullins, R Oarga International Conference on Formal Methods for Open Object-Based Distributed …, 2007 | 24 | 2007 |
Synthesis of non-interferent distributed systems F Cassez, J Mullins, OH Roux Computer Network Security: Fourth International Conference on Mathematical …, 2007 | 23* | 2007 |
Bounded opacity for timed systems I Ammar, Y El Touati, M Yeddes, J Mullins Journal of Information Security and Applications 61, 102926, 2021 | 20 | 2021 |
Model-checking web services orchestrations using bp-calculus F Abouzaid, J Mullins Electronic Notes in Theoretical Computer Science 255, 3-21, 2009 | 19 | 2009 |
Using Admissible Interference to Detect Denial of Service Vulnerabilities. S Lafrance, J Mullins IWFM, 2003 | 17 | 2003 |
Cost optimization strategy for iterative integration of multi-critical functions in ima and ttethernet architecture M Lauer, J Mullins, M Yeddes 2013 IEEE 37th Annual Computer Software and Applications Conference …, 2013 | 16 | 2013 |
An information flow method to detect denial of service vulnerabilities S Lafrance, J Mullins Journal of Universal Computer Science 9 (11), 1350-1369, 2003 | 15 | 2003 |
Design and simulation of distributed IMA architectures using TTEthernet: a model-driven approach T Robati, A Gherbi, A El Kouhen, J Mullins Journal of Ambient Intelligence and Humanized Computing 8, 345-355, 2017 | 14 | 2017 |