Folgen
Dr. Tejeddine Mouelhi
Dr. Tejeddine Mouelhi
researcher in Software Engineering
Bestätigte E-Mail-Adresse bei uni.lu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A model-based framework for security policy specification, deployment and testing
T Mouelhi, F Fleurey, B Baudry, Y Le Traon
Model Driven Engineering Languages and Systems: 11th International …, 2008
1342008
Testing security policies: going beyond functional testing
Y Le Traon, T Mouelhi, B Baudry
The 18th IEEE International Symposium on Software Reliability (ISSRE'07), 93-102, 2007
1112007
Model-based tests for access control policies
A Pretschner, T Mouelhi, Y Le Traon
2008 1st International Conference on Software Testing, Verification, and …, 2008
1052008
Transforming and selecting functional test cases for security policy testing
T Mouelhi, Y Le Traon, B Baudry
2009 International Conference on Software Testing Verification and …, 2009
612009
Security-driven model-based dynamic adaptation
B Morin, T Mouelhi, F Fleurey, Y Le Traon, O Barais, JM Jézéquel
Proceedings of the 25th IEEE/ACM International Conference on Automated …, 2010
532010
A model-based approach to automated testing of access control policies
D Xu, L Thomas, M Kent, T Mouelhi, Y Le Traon
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
512012
A Generic Metamodel For Security Policies Mutation
T Mouelhiv, F Fleurey, B Baudry
Software Testing Verification and Validation Workshop, 2008. ICSTW'08. IEEE …, 2008
482008
Test-driven assessment of access control in legacy applications
Y Le Traon, T Mouelhi, A Pretschner, B Baudry
2008 1st International Conference on Software Testing, Verification, and …, 2008
462008
Mutation analysis for security tests qualification
T Mouelhi, Y Le Traon, B Baudry
Testing: Academic and Industrial Conference Practice and Research Techniques …, 2007
442007
Selection of regression system tests for security policy evolution
JH Hwang, T Xie, D El Kateb, T Mouelhi, Y Le Traon
Proceedings of the 27th IEEE/ACM international conference on automated …, 2012
302012
Automated model-based testing of role-based access control using predicate/transition nets
D Xu, M Kent, L Thomas, T Mouelhi, Y Le Traon
IEEE Transactions on Computers 64 (9), 2490-2505, 2014
282014
Similarity testing for access control
A Bertolino, S Daoudagh, D El Kateb, C Henard, Y Le Traon, F Lonetti, ...
Information and Software Technology 58, 355-372, 2015
272015
Testing obligation policy enforcement using mutation analysis
Y Elrakaiby, T Mouelhi, Y Le Traon
2012 IEEE Fifth International Conference on Software Testing, Verification …, 2012
262012
Refactoring access control policies for performance improvement
D El Kateb, T Mouelhi, Y Le Traon, JH Hwang, T Xie
Proceedings of the 3rd ACM/SPEC International Conference on Performance …, 2012
242012
Coverage-based test cases selection for XACML policies
A Bertolino, Y Le Traon, F Lonetti, E Marchetti, T Mouelhi
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
232014
Model driven mutation applied to adaptative systems testing
A Bartel, B Baudry, F Munoz, J Klein, T Mouelhi, Y Le Traon
2011 IEEE Fourth International Conference on Software Testing, Verification …, 2011
232011
Suspicious electric consumption detection based on multi-profiling using live machine learning
T Hartmann, A Moawad, F Fouquet, Y Reckinger, T Mouelhi, J Klein, ...
2015 IEEE International Conference on Smart Grid Communications …, 2015
202015
Model-driven adaptive delegation
PH Nguyen, G Nain, J Klein, T Mouelhi, Y Le Traon
Proceedings of the 12th annual international conference on Aspect-oriented …, 2013
122013
Tailored shielding and bypass testing of web applications
T Mouelhi, Y Le Traon, E Abgrall, B Baudry, S Gombault
2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011
122011
A toolchain for model-based design and testing of access control systems
S Daoudagh, D El Kateb, F Lonetti, E Marchetti, T Mouelhi
2015 3rd International Conference on Model-Driven Engineering and Software …, 2015
112015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20