MOUELHI, T., EL KATEB, D., & LE TRAON, Y. (2015). Inroads in Testing Access Control. In Advances in Computers. ELSEVIER. Peer reviewed |
NGUYEN, P. H., NAIN, G., KLEIN, J., MOUELHI, T., & LE TRAON, Y. (2014). Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management. Transactions on Aspect-Oriented Software Development, 11, 109-144. Peer reviewed |
EL KATEB, D., ELRAKAIBY, Y., MOUELHI, T., RUBAB, I., & LE TRAON, Y. (2014). Towards a Full Support of Obligations In XACML [Paper presentation]. 9th International Conference on Risks and Security of Internet and Systems. |
EL KATEB, D., Zannone, N., MOAWAD, A., CAIRE, P., NAIN, G., MOUELHI, T., & LE TRAON, Y. (2014). Conviviality-Driven Access Control Policy. Requirements Engineering. Peer Reviewed verified by ORBi |
NGUYEN, P. H., NAIN, G., KLEIN, J., MOUELHI, T., & LE TRAON, Y. (2013). Model-Driven Adaptive Delegation. In S. Chiba, N. Ubayashi, ... H. Masuhara (Eds.), Proceedings of the 12th annual international conference companion on Aspect-oriented software development. New York, United States: ACM. doi:10.1145/2451436.2451445 Peer reviewed |
Hwang, J., Xie, T., EL KATEB, D., MOUELHI, T., & LE TRAON, Y. (September 2012). Selection of Regression System Tests for Security Policy Evolution [Paper presentation]. 27th IEEE/ACM International Conference Automated Software Engineering 2012. |
EL KATEB, D., Elrakaiby, Y., MOUELHI, T., & LE TRAON, Y. (2012). Access Control Enforcement Testing. In 8th International Workshop on Automation of Software Test (AST), 2013 (pp. 64-70). Peer reviewed |
EL KATEB, D., MOUELHI, T., LE TRAON, Y., Hwang, J., & Xie, T. (2012). Refactoring access control policies for performance improvement. In Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (pp. 323--334). New York, NY, USA, Unknown/unspecified: ACM. doi:10.1145/2188286.2188346 Peer reviewed |
Xu, D., THOMAS, L., Kent, M., MOUELHI, T., & LE TRAON, Y. (2012). A Model-Based Approach to Automated Testing of Access Control Policies. Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 100-110. doi:10.1145/2295136.2295173 Peer reviewed |
ELRAKAIBY, Y., MOUELHI, T., & LE TRAON, Y. (2012). Testing obligation policy enforcement using mutation analysis. Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012, 673-680. doi:10.1109/ICST.2012.157 Peer reviewed |
EL RAKAIBY, Y., MOUELHI, T., & LE TRAON, Y. (2012). Testing Obligation Policy Enforcement using Mutation Analysis. Proceedings of the 7th International Workshop on Mutation Analysis (associated to the Fifth International Conference on Software Testing, Verification, and Validation, ICST 2012), 100-110. Peer reviewed |
ELKATEB, D., MOUELHI, T., LE TRAON, Y., Hwang, J., & Xie, T. (2012). Refactoring Access Control Policies for Performance Improvement. Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (ICPE 2012), 100-110. Peer reviewed |
BARTEL, A., Baudry, B., Munoz, F., KLEIN, J., MOUELHI, T., & LE TRAON, Y. (2011). Model Driven Mutation Applied to Adaptative Systems Testing. 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops. doi:10.1109/ICSTW.2011.24 Peer reviewed |