Author of the publication

How to Verify Dynamic Properties of Information Systems.

, , , and . SEFM, page 416-425. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Computer Science Modeling Techniques for Airport Security Certification., , , , , , , and . RCIS, page 61-72. (2007)Synthesizing Information Systems: the APIS Project., , , , and . RCIS, page 73-84. (2007)Generating relational database transactions from eb3 attribute definitions., , and . Software and Systems Modeling, 8 (3): 423-445 (2009)Design of an Automatic Prover Dedicated to the Refinement of Database Applications., and . FME, volume 2805 of Lecture Notes in Computer Science, page 834-854. Springer, (2003)From ASTD Access Control Policies to WS-BPEL Processes Deployed in a SOA Environment., , , , and . WISE Workshops, volume 6724 of Lecture Notes in Computer Science, page 126-141. Springer, (2010)Taking into Account Functional Models in the Validation of IS Security Policies., , , , , , and . CAiSE Workshops, volume 83 of Lecture Notes in Business Information Processing, page 592-606. Springer, (2011)Systematic Translation Rules from astd to Event-B., , , and . IFM, volume 6396 of Lecture Notes in Computer Science, page 245-259. Springer, (2010)Refinement of eb3 Process Patterns into B Specifications., , and . B, volume 4355 of Lecture Notes in Computer Science, page 201-215. Springer, (2007)UB2SQL: A Tool for Building Database Applications Using UML and B Formal Method., and . J. Database Manag., 17 (4): 70-89 (2006)Une tentative d'utilisation conjointe d'UML et d'une méthode formelle pour la modélisation de la sécurité des aéroports., , and . Ingénierie des Systèmes d'Information, 13 (4): 133-157 (2008)