Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model-driven Engineering of Functional Security Policies., , , , , , and . ICEIS (3), page 374-379. SciTePress, (2010)A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress., , , , and . FPS, volume 6888 of Lecture Notes in Computer Science, page 218-226. Springer, (2011)Formal Requirements Modeling and Verification for Critical Systems.. ICEIS (1), page 19. SCITEPRESS, (2020)Coming and Going from UML to B: A Proposal to Support Traceability in Rigorous IS Development., and . ZB, volume 2272 of Lecture Notes in Computer Science, page 517-534. Springer, (2002)A Rigorous Metamodel for UML Static Conceptual Modelling of Information Systems., and . CAiSE, volume 2068 of Lecture Notes in Computer Science, page 402-416. Springer, (2001)Design of an Automatic Prover Dedicated to the Refinement of Database Applications., and . FME, volume 2805 of Lecture Notes in Computer Science, page 834-854. Springer, (2003)Génération automatique de spécifications VDM à partir d'un schéma conceptuel de données., and . INFORSID, (1995)Supporting Variability in Goal-based Requirements., , and . RCIS, page 237-246. IEEE, (2009)Using Variants in KAOS Goal Modelling., , , and . ICEIS (3-2), page 339-344. (2008)978-989-8111-38-8.From a B formal specification to an executable code: application to the relational database domain., and . Inf. Softw. Technol., 48 (4): 253-279 (2006)