John Mullins
Cited by
Cited by
Quantifying opacity
B Bérard, J Mullins, M Sassolas
2010 Seventh International Conference on the Quantitative Evaluation of …, 2010
On the verification of intransitive noninterference in mulitlevel security
NB Hadj-Alouane, S Lafrance, F Lin, J Mullins, MM Yeddes
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 35 …, 2005
Nondeterministic admissible interference
J Mullins
Journal of Universal computer science 6 (11), 1054-1070, 2000
A calculus for generation, verification and refinement of bpel specifications
F Abouzaid, J Mullins
Electronic Notes in Theoretical Computer Science 200 (3), 43-65, 2008
Making unbreakable code
J Mullins
IEEE Spectrum 39 (5), 40-45, 2002
A flaw in the electronic commerce protocol SET
S Brlek, S Hamadou, J Mullins
Information Processing Letters 97 (3), 104-108, 2006
Queue Management as a DoS counter-measure?
D Boteanu, JM Fernandez, J McHugh, J Mullins
International Conference on Information Security, 263-280, 2007
Non-interference control synthesis for security timed automata
G Gardey, J Mullins, OH Roux
Electronic Notes in Theoretical Computer Science 180 (1), 35-53, 2007
Characterizing intransitive noninterference for 3-domain security policies with observability
NB Hadj-Alouane, S Lafrance, F Lin, J Mullins, M Yeddes
IEEE transactions on automatic control 50 (6), 920-925, 2005
Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols
S Lafrance, J Mullins
Electronic Notes in Theoretical Computer Science 61, 154-177, 2002
A deep learning approach to detect SNP interactions.
S Uppu, A Krishna, RP Gopalan
JSW 11 (10), 965-975, 2016
Analyse des réseaux temporels: Calcul des classes en O (n 2) et des temps de chemin en
H Boucheneb, J Mullins
Opacity with orwellian observers and intransitive non-interference
J Mullins, M Yeddes
IFAC Proceedings Volumes 47 (2), 344-349, 2014
Synthesis of non-interferent distributed systems
F Cassez, J Mullins, OH Roux
International Conference on Mathematical Methods, Models, and Architectures …, 2007
Model checking of extended OCL constraints on UML models in SOCLe
J Mullins, R Oarga
International Conference on Formal Methods for Open Object-Based Distributed …, 2007
SMT-based cost optimization approach for the integration of avionic functions in IMA and TTEthernet architectures
S Beji, S Hamadou, A Gherbi, J Mullins
2014 IEEE/ACM 18th International Symposium on Distributed Simulation and …, 2014
Using Admissible Interference to Detect Denial of Service Vulnerabilities.
S Lafrance, J Mullins
IWFM, 2003
Model-checking web services orchestrations using bp-calculus
F Abouzaid, J Mullins
Electronic Notes in Theoretical Computer Science 255, 3-21, 2009
An information flow method to detect denial of service vulnerabilities
S Lafrance, J Mullins
J. UCS 9 (11), 1350-, 2003
Towards a formal analysis of dynamic reconfiguration in WS-BPEL
F Abouzaid, M Mazzara, J Mullins, N Qamar
Intelligent Decision Technologies 7 (3), 213-224, 2013
The system can't perform the operation now. Try again later.
Articles 1–20