The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kamel Adi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. L. Hamza, K. Adi, Karim El Guemhioui
    Automatic generation of attack scenarios for intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    AICT/ICIW, 2006, pp:205- [Conf]
  2. Kamel Adi, Mourad Debbabi, Mohamed Mejri
    A New Logic for Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP]
    AMAST, 2000, pp:499-513 [Conf]
  3. Didier Bert, Rachid Echahed, Kamel Adi
    Resolution of Goals with the Functional and Logic Programming Language LPG: Impact of Abstract Interpretation. [Citation Graph (0, 0)][DBLP]
    AMAST, 1996, pp:629-632 [Conf]
  4. Kamel Adi, L. Pene
    Secrecy Correctness for Security Protocols. [Citation Graph (0, 0)][DBLP]
    DFMA, 2005, pp:22-29 [Conf]
  5. Kamel Adi, Mourad Debbabi
    Abstract interpretation for proving secrecy properties in security protocols. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:55, n:1, pp:- [Journal]
  6. Kamel Adi, Mourad Debbabi, Mohamed Mejri
    A new logic for electronic commerce protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:291, n:3, pp:223-283 [Journal]

  7. Secrecy UML Method for Model Transformations. [Citation Graph (, )][DBLP]


  8. A Formal Approach for Security Policy Enforcement in Concurrent Programs. [Citation Graph (, )][DBLP]


  9. Using Edit Automata for Rewriting-Based Security Enforcement. [Citation Graph (, )][DBLP]


  10. Temporalised Epistemic Logic for Reasoning about Agent-Based Systems. [Citation Graph (, )][DBLP]


  11. Robust Key Management scheme for certification in mobile ad-hoc networks. [Citation Graph (, )][DBLP]


  12. Honeyd Detection Via Abnormal Behaviors Generated by the ARPD Daemon. [Citation Graph (, )][DBLP]


  13. Formal Specification and Analysis of Firewalls. [Citation Graph (, )][DBLP]


  14. Formal Reasoning for Security Protocol Correctness. [Citation Graph (, )][DBLP]


  15. Formal Technique for Discovering Complex Attacks in Computer Systems. [Citation Graph (, )][DBLP]


  16. A Calculus for Distributed Firewall Specification and Verification. [Citation Graph (, )][DBLP]


  17. Enforcing Security Policies on Programs. [Citation Graph (, )][DBLP]


  18. Typing for Conflict Detection in Access Control Policies. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002