Bounded opacity for timed systems
Ammar, Ikhlass, El Touati, Yamen, Yeddes, Moez, Mullins, John
Published in Journal of information security and applications (01.09.2021)
Published in Journal of information security and applications (01.09.2021)
Get full text
Journal Article
Enforcing opacity with Orwellian observation
Yeddes, Moez
Published in 2016 13th International Workshop on Discrete Event Systems (WODES) (01.05.2016)
Published in 2016 13th International Workshop on Discrete Event Systems (WODES) (01.05.2016)
Get full text
Conference Proceeding
Modifying Security Policies for the Satisfaction of Intransitive Non-Interference
Yeddes, M., Feng Lin, Ben Hadj-Alouane, N.
Published in IEEE transactions on automatic control (01.08.2009)
Published in IEEE transactions on automatic control (01.08.2009)
Get full text
Journal Article
Characterizing intransitive noninterference for 3-domain security policies with observability
Hadj-Alouane, N.B., Lafrance, S., Feng Lin, Mullins, J., Yeddes, M.
Published in IEEE transactions on automatic control (01.06.2005)
Published in IEEE transactions on automatic control (01.06.2005)
Get full text
Journal Article
An Approach for Producing Privacy-Aware Reusable Business Process Fragments
Zemni, M., Hadj-Anouane, N. B., Yeddes, M.
Published in 2012 IEEE 19th International Conference on Web Services (01.06.2012)
Published in 2012 IEEE 19th International Conference on Web Services (01.06.2012)
Get full text
Conference Proceeding
Modeling and control of constant speed Dynamic Hybrid Systems using Extended Time Petri Networks
El Touati, Y., Ben Hadj Alouane, Nejib, Yeddes, M.
Published in 2012 24th Chinese Control and Decision Conference (CCDC) (01.05.2012)
Published in 2012 24th Chinese Control and Decision Conference (CCDC) (01.05.2012)
Get full text
Conference Proceeding
Online Diagnosis of Systems with Rectangular Hybrid Automata Models
Derbel, Haithem, Alla, Hassane, Hadj-Alouane, Nejib Ben, Yeddes, Moez
Published in IFAC Proceedings Volumes (2009)
Published in IFAC Proceedings Volumes (2009)
Get full text
Journal Article
A Semantics-Based Privacy-Aware Approach for Fragmenting Business Processes
Zemni, M-A, Hadj-Anouane, N. B., Yeddes, M.
Published in 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops (01.07.2012)
Published in 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops (01.07.2012)
Get full text
Conference Proceeding
Computing the infimal superlanguage for generalized observability
Ben Said, Achraf, Feng Lin, Ben Hadj-Alouane, Nejib, Yeddes, M.
Published in 2011 Chinese Control and Decision Conference (CCDC) (01.05.2011)
Published in 2011 Chinese Control and Decision Conference (CCDC) (01.05.2011)
Get full text
Conference Proceeding