Seguir
Dr. Tejeddine Mouelhi
Dr. Tejeddine Mouelhi
researcher in Software Engineering
Dirección de correo verificada de uni.lu - Página principal
Título
Citado por
Citado por
Año
A model-based framework for security policy specification, deployment and testing
T Mouelhi, F Fleurey, B Baudry, Y Le Traon
Model Driven Engineering Languages and Systems: 11th International …, 2008
1362008
Testing security policies: going beyond functional testing
Y Le Traon, T Mouelhi, B Baudry
The 18th IEEE International Symposium on Software Reliability (ISSRE'07), 93-102, 2007
1092007
Model-based tests for access control policies
A Pretschner, T Mouelhi, Y Le Traon
2008 1st International Conference on Software Testing, Verification, and …, 2008
1082008
Transforming and selecting functional test cases for security policy testing
T Mouelhi, Y Le Traon, B Baudry
2009 International Conference on Software Testing Verification and …, 2009
612009
Security-driven model-based dynamic adaptation
B Morin, T Mouelhi, F Fleurey, Y Le Traon, O Barais, JM Jézéquel
Proceedings of the 25th IEEE/ACM International Conference on Automated …, 2010
552010
A model-based approach to automated testing of access control policies
D Xu, L Thomas, M Kent, T Mouelhi, Y Le Traon
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
532012
A Generic Metamodel For Security Policies Mutation
T Mouelhiv, F Fleurey, B Baudry
Software Testing Verification and Validation Workshop, 2008. ICSTW'08. IEEE …, 2008
482008
Test-driven assessment of access control in legacy applications
Y Le Traon, T Mouelhi, A Pretschner, B Baudry
2008 1st International Conference on Software Testing, Verification, and …, 2008
472008
Mutation analysis for security tests qualification
T Mouelhi, Y Le Traon, B Baudry
Testing: Academic and Industrial Conference Practice and Research Techniques …, 2007
462007
Automated model-based testing of role-based access control using predicate/transition nets
D Xu, M Kent, L Thomas, T Mouelhi, Y Le Traon
IEEE Transactions on Computers 64 (9), 2490-2505, 2014
312014
Selection of regression system tests for security policy evolution
JH Hwang, T Xie, D El Kateb, T Mouelhi, Y Le Traon
Proceedings of the 27th IEEE/ACM international conference on automated …, 2012
302012
Testing obligation policy enforcement using mutation analysis
Y Elrakaiby, T Mouelhi, Y Le Traon
2012 IEEE Fifth International Conference on Software Testing, Verification …, 2012
282012
Similarity testing for access control
A Bertolino, S Daoudagh, D El Kateb, C Henard, Y Le Traon, F Lonetti, ...
Information and Software Technology 58, 355-372, 2015
272015
Refactoring access control policies for performance improvement
D El Kateb, T Mouelhi, Y Le Traon, JH Hwang, T Xie
Proceedings of the 3rd ACM/SPEC International Conference on Performance …, 2012
242012
Coverage-based test cases selection for XACML policies
A Bertolino, Y Le Traon, F Lonetti, E Marchetti, T Mouelhi
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
232014
Model driven mutation applied to adaptative systems testing
A Bartel, B Baudry, F Munoz, J Klein, T Mouelhi, Y Le Traon
2011 IEEE Fourth International Conference on Software Testing, Verification …, 2011
232011
Suspicious electric consumption detection based on multi-profiling using live machine learning
T Hartmann, A Moawad, F Fouquet, Y Reckinger, T Mouelhi, J Klein, ...
2015 IEEE International Conference on Smart Grid Communications …, 2015
212015
Inroads in Testing Access Control
T Mouelhi, D El Kateb, Y Le Traon
Advances in Computers 99, 195-222, 2015
122015
Modularity and dynamic adaptation of flexibly secure systems: Model-driven adaptive delegation in access control management
PH Nguyen, G Nain, J Klein, T Mouelhi, Y Le Traon
Transactions on Aspect-Oriented Software Development XI, 109-144, 2014
122014
Model-driven adaptive delegation
PH Nguyen, G Nain, J Klein, T Mouelhi, Y Le Traon
Proceedings of the 12th annual international conference on Aspect-oriented …, 2013
122013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20