|
|
SCSS 2017: Author Index| Author | Papers |
|---|
| A | | Abid, Chiheb Ameur | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems | | Andrianarivelo, Nirina | Transforming Prefix-constrained or Controlled Rewrite Systems | | B | | Ben Youssef, Nihel | Automatic detection and correction of firewall misconfigurations- A formal approach | | Bhateja, Puneet | Asynchronous testing of real-time systems | | Bouhoula, Adel | Automatic detection and correction of firewall misconfigurations- A formal approach Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment | | Boussabbeh, Maha | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques | | Brenas, Jon Hael | C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions | | C | | Cerna, David | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications | | E | | Echahed, Rachid | C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions | | Evina, Pierrette Annie | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems | | H | | Hadj Kacem, Ahmed | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques | | Haeri, Seyed Hossein | Integration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage | | Hamdi, Mohamed | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors | | I | | Ida, Tetsuo | Origami folds in higher-dimension | | J | | Jaidi, Faouzi | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment | | K | | Kim, Tai-Hoon | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors | | Klai, Kais | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems | | L | | Labbene Ayachi, Faten | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment | | M | | Mosbah, Mohamed | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques | | O | | Ouni, Hiba | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems | | P | | Pelletier, Vivien | Transforming Prefix-constrained or Controlled Rewrite Systems | | R | | Réty, Pierre | Transforming Prefix-constrained or Controlled Rewrite Systems | | S | | Saâdaoui, Amina | Automatic detection and correction of firewall misconfigurations- A formal approach | | Schreiner, Wolfgang | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications | | Schupp, Sibylle | Integration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage | | Strecker, Martin | C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions | | T | | Tounsi, Mohamed | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques | | W | | Watt, Stephen | Origami folds in higher-dimension | | Z | | Zouari, Belhassen | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems | | Zouari, Jaweher | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors |
|
|
|