Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Runtime support for rule-based access-control evaluation through model-transformation., , and . SLE, page 57-69. ACM, (2016)Enabling the Reuse of Stored Model Transformations Through Annotations., , , and . ICMT, volume 9152 of Lecture Notes in Computer Science, page 43-58. Springer, (2015)Lazy Execution of Model-to-Model Transformations., , , and . MoDELS, volume 6981 of Lecture Notes in Computer Science, page 32-46. Springer, (2011)Extending ATL for Native UML Profile Support: An Experience Report., , and . MtATL@TOOLS, volume 742 of CEUR Workshop Proceedings, page 49-62. CEUR-WS.org, (2011)A model-driven approach for the extraction of network access-control policies., , , , and . MDsec@MoDELS, page 5. ACM, (2012)Automatic reconstruction and analysis of security policies from deployed security components. (Analyse et reconstruction automatique de politiques de sécurité de composants de sécurité déployés).. École des mines de Nantes, France, (2014)P ORTOLAN: a Model-Driven Cartography Framework, , , , and . CoRR, (2011)Towards an Access-Control Metamodel for Web Content Management Systems., , , , and . ICWE Workshops, volume 8295 of Lecture Notes in Computer Science, page 148-155. Springer, (2013)Model-Driven Extraction and Analysis of Network Security Policies., , , , and . MoDELS, volume 8107 of Lecture Notes in Computer Science, page 52-68. Springer, (2013)ModelSET Component Framework: Refinando el Ciclo de Vida de MDA., , , , and . JISBD, page 174-177. (2009)