John Mullins
Cited by
Cited by
Quantifying opacity
B Bérard, J Mullins, M Sassolas
Mathematical Structures in Computer Science 25 (2), 361-403, 2015
On the verification of intransitive noninterference in mulitlevel security
NB Hadj-Alouane, S Lafrance, F Lin, J Mullins, MM Yeddes
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 35 …, 2005
Non-deterministic admissible interference
J Mullins
A calculus for generation, verification and refinement of bpel specifications
F Abouzaid, J Mullins
Electronic Notes in Theoretical Computer Science 200 (3), 43-65, 2008
Non-interference control synthesis for security timed automata
G Gardey, J Mullins, OH Roux
Electronic Notes in Theoretical Computer Science 180 (1), 35-53, 2007
A flaw in the electronic commerce protocol SET
S Brlek, S Hamadou, J Mullins
Information Processing Letters 97 (3), 104-108, 2006
SMT-based cost optimization approach for the integration of avionic functions in IMA and TTEthernet architectures
S Beji, S Hamadou, A Gherbi, J Mullins
2014 IEEE/ACM 18th International Symposium on Distributed Simulation and …, 2014
Characterizing intransitive noninterference for 3-domain security policies with observability
NB Hadj-Alouane, S Lafrance, F Lin, J Mullins, M Yeddes
IEEE transactions on automatic control 50 (6), 920-925, 2005
Opacity with orwellian observers and intransitive non-interference
J Mullins, M Yeddes
IFAC Proceedings Volumes 47 (2), 344-349, 2014
Analyse des réseaux temporels: Calcul des classes en O (n 2) et des temps de chemin en
H Boucheneb, J Mullins
Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols
S Lafrance, J Mullins
Electronic Notes in Theoretical Computer Science 61, 154-177, 2002
Queue Management as a DoS counter-measure?
D Boteanu, JM Fernandez, J McHugh, J Mullins
Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007
Model checking of extended OCL constraints on UML models in SOCLe
J Mullins, R Oarga
International Conference on Formal Methods for Open Object-Based Distributed …, 2007
Synthesis of non-interferent distributed systems
F Cassez, J Mullins, OH Roux
Computer Network Security: Fourth International Conference on Mathematical …, 2007
Bounded opacity for timed systems
I Ammar, Y El Touati, M Yeddes, J Mullins
Journal of Information Security and Applications 61, 102926, 2021
Model-checking web services orchestrations using bp-calculus
F Abouzaid, J Mullins
Electronic Notes in Theoretical Computer Science 255, 3-21, 2009
Using Admissible Interference to Detect Denial of Service Vulnerabilities.
S Lafrance, J Mullins
IWFM, 2003
Cost optimization strategy for iterative integration of multi-critical functions in ima and ttethernet architecture
M Lauer, J Mullins, M Yeddes
2013 IEEE 37th Annual Computer Software and Applications Conference …, 2013
An information flow method to detect denial of service vulnerabilities
S Lafrance, J Mullins
Journal of Universal Computer Science 9 (11), 1350-1369, 2003
Design and simulation of distributed IMA architectures using TTEthernet: a model-driven approach
T Robati, A Gherbi, A El Kouhen, J Mullins
Journal of Ambient Intelligence and Humanized Computing 8, 345-355, 2017
The system can't perform the operation now. Try again later.
Articles 1–20