dblp.uni-trier.dewww.uni-trier.de

Kamel Adi

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
11 Kamel Adi, Liviu Pene: Formal Reasoning for Security Protocol Correctness. SoMeT 2008: 63-83
2007
10 Mahjoub Langar, Mohamed Mejri, Kamel Adi: A Formal Approach for Security Policy Enforcement in Concurrent Programs. Security and Management 2007: 165-171
9 Lamia Hamza, Kamel Adi: Formal Technique for Discovering Complex Attacks in Computer Systems. SoMeT 2007: 185-199
2006
8EELamia Hamza, Kamel Adi, Karim El Guemhioui: Automatic generation of attack scenarios for intrusion detection systems. AICT/ICIW 2006: 205
7 Hakima Ould-Slimane, Mohamed Mejri, Kamel Adi: Enforcing Security Policies on Programs. SoMeT 2006: 195-207
6 Liviu Pene, Kamel Adi: A Calculus for Distributed Firewall Specification and Verification. SoMeT 2006: 301-315
2005
5EEKamel Adi, Liviu Pene: Secrecy Correctness for Security Protocols. DFMA 2005: 22-29
2003
4 Kamel Adi, Mourad Debbabi, Mohamed Mejri: A new logic for electronic commerce protocols. Theor. Comput. Sci. 291(3): 223-283 (2003)
2001
3EEKamel Adi, Mourad Debbabi: Abstract interpretation for proving secrecy properties in security protocols. Electr. Notes Theor. Comput. Sci. 55(1): (2001)
2000
2EEKamel Adi, Mourad Debbabi, Mohamed Mejri: A New Logic for Electronic Commerce Protocols. AMAST 2000: 499-513
1996
1 Didier Bert, Rachid Echahed, Kamel Adi: Resolution of Goals with the Functional and Logic Programming Language LPG: Impact of Abstract Interpretation. AMAST 1996: 629-632

Coauthor Index

1Didier Bert [1]
2Mourad Debbabi [2] [3] [4]
3Rachid Echahed [1]
4Karim El Guemhioui [8]
5Lamia Hamza [8] [9]
6Mahjoub Langar [10]
7Mohamed Mejri [2] [4] [7] [10]
8Hakima Ould-Slimane [7]
9Liviu Pene [5] [6] [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)