Follow
Tejeddine Mouelhi
Tejeddine Mouelhi
researcher in Software Engineering
Verified email at uni.lu - Homepage
Title
Cited by
Cited by
Year
A model-based framework for security policy specification, deployment and testing
T Mouelhi, F Fleurey, B Baudry, Y Le Traon
Model Driven Engineering Languages and Systems: 11th International …, 2008
1322008
Testing security policies: going beyond functional testing
Y Le Traon, T Mouelhi, B Baudry
The 18th IEEE International Symposium on Software Reliability (ISSRE'07), 93-102, 2007
1132007
Model-based tests for access control policies
A Pretschner, T Mouelhi, Y Le Traon
2008 1st International Conference on Software Testing, Verification, and …, 2008
1022008
Transforming and selecting functional test cases for security policy testing
T Mouelhi, Y Le Traon, B Baudry
2009 International Conference on Software Testing Verification and …, 2009
612009
Security-driven model-based dynamic adaptation
B Morin, T Mouelhi, F Fleurey, Y Le Traon, O Barais, JM Jézéquel
Proceedings of the 25th IEEE/ACM International Conference on Automated …, 2010
522010
A model-based approach to automated testing of access control policies
D Xu, L Thomas, M Kent, T Mouelhi, Y Le Traon
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
502012
A Generic Metamodel For Security Policies Mutation
T Mouelhiv, F Fleurey, B Baudry
Software Testing Verification and Validation Workshop, 2008. ICSTW'08. IEEE …, 2008
462008
Test-driven assessment of access control in legacy applications
Y Le Traon, T Mouelhi, A Pretschner, B Baudry
2008 1st International Conference on Software Testing, Verification, and …, 2008
462008
Mutation analysis for security tests qualification
T Mouelhi, Y Le Traon, B Baudry
Testing: Academic and Industrial Conference Practice and Research Techniques …, 2007
442007
Selection of regression system tests for security policy evolution
JH Hwang, T Xie, D El Kateb, T Mouelhi, Y Le Traon
Proceedings of the 27th IEEE/ACM international conference on automated …, 2012
302012
Automated model-based testing of role-based access control using predicate/transition nets
D Xu, M Kent, L Thomas, T Mouelhi, Y Le Traon
IEEE Transactions on Computers 64 (9), 2490-2505, 2014
282014
Similarity testing for access control
A Bertolino, S Daoudagh, D El Kateb, C Henard, Y Le Traon, F Lonetti, ...
Information and Software Technology 58, 355-372, 2015
262015
Refactoring access control policies for performance improvement
D El Kateb, T Mouelhi, Y Le Traon, JH Hwang, T Xie
Proceedings of the 3rd ACM/SPEC International Conference on Performance …, 2012
252012
Testing obligation policy enforcement using mutation analysis
Y Elrakaiby, T Mouelhi, Y Le Traon
2012 IEEE Fifth International Conference on Software Testing, Verification …, 2012
252012
Coverage-based test cases selection for XACML policies
A Bertolino, Y Le Traon, F Lonetti, E Marchetti, T Mouelhi
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
222014
Model driven mutation applied to adaptative systems testing
A Bartel, B Baudry, F Munoz, J Klein, T Mouelhi, Y Le Traon
2011 IEEE Fourth International Conference on Software Testing, Verification …, 2011
222011
Suspicious electric consumption detection based on multi-profiling using live machine learning
T Hartmann, A Moawad, F Fouquet, Y Reckinger, T Mouelhi, J Klein, ...
2015 IEEE International Conference on Smart Grid Communications …, 2015
202015
Tailored shielding and bypass testing of web applications
T Mouelhi, Y Le Traon, E Abgrall, B Baudry, S Gombault
2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011
132011
Model-driven adaptive delegation
PH Nguyen, G Nain, J Klein, T Mouelhi, Y Le Traon
Proceedings of the 12th annual international conference on Aspect-oriented …, 2013
122013
Inroads in Testing Access Control
T Mouelhi, D El Kateb, Y Le Traon
Advances in Computers 99, 195-222, 2015
112015
The system can't perform the operation now. Try again later.
Articles 1–20