Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Level Modeling with Openflexo/FML A Contribution to the Multi-Level Process Challenge., , , , , and . Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., (2022)An analysis of software design understanding & motivation of engineering students., , , , , and . MoDELS (Companion), page 123-130. ACM, (2022)Towards Access Control Models for Conversational User Interfaces., , , and . BPMDS/EMMSAD@CAiSE, volume 450 of Lecture Notes in Business Information Processing, page 310-317. Springer, (2022)Automatic reconstruction and analysis of security policies from deployed security components. (Analyse et reconstruction automatique de politiques de sécurité de composants de sécurité déployés).. École des mines de Nantes, France, (2014)Towards an Access-Control Metamodel for Web Content Management Systems., , , , and . ICWE Workshops, volume 8295 of Lecture Notes in Computer Science, page 148-155. Springer, (2013)P ORTOLAN: a Model-Driven Cartography Framework, , , , and . CoRR, (2011)Model-Driven Extraction and Analysis of Network Security Policies., , , , and . MoDELS, volume 8107 of Lecture Notes in Computer Science, page 52-68. Springer, (2013)ModelSET Component Framework: Refinando el Ciclo de Vida de MDA., , , , and . JISBD, page 174-177. (2009)Reactive model transformation with ATL., , and . Sci. Comput. Program., (2017)Management of stateful firewall misconfiguration., , , , and . Comput. Secur., (2013)