Directory of Experts

You are here

Publications by type

Journal article (18) Conference paper (52) Book Book chapter (3) Patent Report (3) Thesis

John Mullins (76)

  • Journal articles (18)
    • 2021
      • Journal article
        Ammar, I., El Touati, Y., Mullins, J. & Yeddes, M. (2021). Timed Bounded Verification of Inclusion Based on Timed Bounded Discretized Language. International Journal of Foundations of Computer Science, 32(2), 175-202. Retrieved from https://doi.org/10.1142/s0129054121500106
    • 2018
      • Journal article
        Bérard, B., Kouchnarenko, O., Mullins, J. & Sassolas, M. (2018). Opacity for linear constraint Markov chains. Discrete Event Dynamic Systems: Theory and Applications, 28(1), 83-108. Retrieved from https://doi.org/10.1007/s10626-017-0259-4
    • 2017
      • Journal article
        Robati, T., Gherbi, A., El Kouhen, A. & Mullins, J. (2017). Design and simulation of distributed IMA architectures using TTEthernet: a model-driven approach. Journal of Ambient Intelligence and Humanized Computing, 8(3), 345-355. Retrieved from https://doi.org/10.1007/s12652-017-0449-9
    • 2016
      • Journal article
        Berard, B., Helouet, L. & Mullins, J. (2016). Non-interference in partial order models. ACM Transactions on Embedded Computing Systems, 16(2), 34 pages. Retrieved from https://doi.org/10.1145/2984639
      • Journal article
        Robati, T., El Kouhen, A., Gherbi, A. & Mullinsi, J. (2016). Time-Triggered Ethernet Metamodel: Design and Application. Journal of Software, 11(10), 1040-1053. Retrieved from https://doi.org/10.17706/jsw.11.10.1040-1053
    • 2015
    • 2010
      • Journal article
        Hamadou, S. & Mullins, J. (2010). Calibrating the power of schedulers for probabilistic polynomial-time calculus. Journal of Computer Security, 18(2), 265-316. Retrieved from https://doi.org/10.3233/JCS-2010-0362
    • 2006
      • Journal article
        Brlek, S., Hamadou, S. & Mullins, J. (2006). A Flaw in the Electronic Commerce Protocol Set. Information Processing Letters, 97(3), 104-108. Retrieved from https://doi.org/10.1016/j.ipl.2005.10.002
    • 2005
      • Journal article
        Brlek, S., Hamadou, S. & Mullins, J. (2005). Anonymous and Secure Electronic Transaction Protocol. Annales des télécommunications, 60(5-6), 530-557. Retrieved from https://doi.org/10.1007/BF03219936
      • Journal article
        Hadj-Alouane Nejib, B.E.N., Lafrance, S., Feng, L.I.N., Mullins, J. & Yeddes, M. (2005). Characterizing intransitive noninterference for 3-domain security policies with observability. IEEE Transactions on Automatic Control, 50(6), 920-925. Retrieved from https://doi.org/10.1109/TAC.2005.850643
      • Journal article
        Hadj-Alouane, N.B.L., S., Lin, F., Mullins, J. & Yeddes, M.M. (2005). On the Verification of Intransitive Noninterference in Mulitlevel Security. IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics, 35(5), 948-958. Retrieved from https://doi.org/10.1109/TSMCB.2005.847749
    • 2003
      • Journal article
        Boucheneb, H. & Mullins, J. (2003). Analyse des reseaux temporels : Calcul des classes en O(n2) et des temps de chemin en O(mxn). Technique et science informatiques, 22(4), 435-459.
      • Journal article
        Lafrance, S. & Mullins, J. (2003). An Information Flow Method to Detect Denial of Service Vulnerabilities. Journal of Universal Computer Science, 9(11), 1350-1369. Retrieved from https://doi.org/10.3217/jucs-009-11-1350
      • Journal article
        Mullins, J. & Lafrance, S. (2003). Bisimulation-Based Non-Deterministic Admissible Interference and Its Application to the Analysis of Cryptographic Protocols. Information and Software Technology, 45(11), 779-790. Retrieved from https://doi.org/10.1016/S0950-5849(03)00072-7
    • 2002
      • Journal article
        Yeddes, M., Alla, H. & Mullins, J. (2002). Analyse structurelle d'un fonctionnement séquentiel. Journal européen des systèmes automatisés, 36(8), 1101-1118.
    • 2001
      • Journal article
        Hains, G., Loulergue, F. & Mullins, J. (2001). Concrete Data Structures and Functional Parallel Programming. Theoretical Computer Science, 258(1-2), 233-267. Retrieved from https://doi.org/10.1016/S0304-3975(00)00010-4
    • 2000
    • 1997
      • Journal article
        Mullins, J. (1997). On an effective hierarchy of communicating processes : separation principle and testing. Theoretical Computer Science, 174(1-2), 231-246. Retrieved from https://doi.org/10.1016/S0304-3975(96)00027-8
  • Conference papers (52)
    • 2018
      • Conference paper
        Helouet, L., Marchand, H. & Mullins, J. (2018). Concurrent Secrets with Quantified Suspicion. Paper presented at the 18th International Conference on Application of Concurrency to System Design (ACSD 2018), Bratislava, Slovakia (pp. 75-84). Retrieved from https://doi.org/10.1109/ACSD.2018.00011
    • 2016
      • Conference paper
        Robati, T., Gherbi, A. & Mullins, J. (2016). A modeling and verification approach to the design of distributed ima architectures using TTEthernet. Paper presented at the 7th International Conference on Ambient Systems, Networks and Technologies (ANT2016) and 6th International Conference on Sustainable Energy Information Technology (SEIT2016), Madrid, Spain (pp. 229-236). Retrieved from https://doi.org/10.1016/j.procs.2016.04.120
      • Conference paper
        Beji, S., Gherbi, A., Mullins, J. & Hladik, P.-E. (2016). Model-Driven Approach to the Optimal Configuration of Time-Triggered Flows in a TTEthernet Network. Paper presented at the 9th International Conference on System Analysis and Modeling (SAM 2016), Saint-Malo, France (pp. 164-179). Retrieved from https://doi.org/10.1007/978-3-319-46613-2_11
      • Conference paper
        Berard, B., Kouchnarenko, O., Mullins, J. & Sassolas, M. (2016). Preserving opacity on Interval Markov Chains under simulation. Paper presented at the 13th International Workshop on Discrete Event Systems (WODES 2016), Xi'an, China (pp. 319-324). Retrieved from https://doi.org/10.1109/WODES.2016.7497866
    • 2015
      • Conference paper
        Hamadou, S., Mullins, J., Gherbi, A. & Beji, S. (2015). A time-triggered constraint-based calculus for avionic systems. Paper presented at the 18th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW 2015), Auckland , New Zealand (pp. 58-65). Retrieved from https://doi.org/10.1109/ISORCW.2015.53
      • Conference paper
        Berard, B., Helouet, L. & Mullins, J. (2015). Non-interference in Partial Order Models. Paper presented at the 15th International Conference on Application of Concurrency to System Design (ACSD 2015), Brussels, Belgium (pp. 80-89). Retrieved from https://doi.org/10.1109/ACSD.2015.11
      • Conference paper
        Robati, T., El Kouhen, A., Gherbi, A. & Mullins, J. (2015). Simulation-based verification of avionic systems deployed on IMA architectures. Paper presented at the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems : Demo and Poster Session (MoDELS P&D 2015), Ottawa, ON, Canada (pp. 56-59).
      • Conference paper
        Hamadou, S., Mullins, J., Chareton, C. & Gherbi, A. (2015). Specifying avionic embedded systems by denotations of the time-triggered constraint-based calculus. Paper presented at the 16th IEEE International Conference on Information Reuse and Integration (IRI 2015), San Francisco, CA (pp. 303-310). Retrieved from https://doi.org/10.1109/IRI.2015.56
    • 2014
      • Conference paper
        Robati, T., El Kouhen, A., Gherbi, A., Hamadou, S. & Mullins, J. (2014). An extension for AADL to model mixed-criticality avionic systems deployed on IMA architectures with TTEthernet. Paper presented at the 1st International Workshop on Architecture Centric Virtual Integration (ACVI 2014), Valencia, Spain.
      • Conference paper
        Mullins, J. & Yeddes, M. (2014). Opacity with Orwellian observers and intransitive non-interference. Paper presented at the 12th IFAC/IEEE Workshop on Discrete Event Systems (WODES 2014), Cachan, France (pp. 344-349). Retrieved from https://doi.org/10.3182/20140514-3-FR-4046.00016
      • Conference paper
        Beji, S., Hamadou, S., Gherbi, A. & Mullins, J. (2014). SMT-based cost optimization approach for the integration of avionic functions in IMA and TTEthernet architectures. Paper presented at the 18th IEEE/ACM International Symposium on Distributed Simulations and Real Time Applications (DS-RT 2014), Toulouse, France (pp. 165-174). Retrieved from https://doi.org/10.1109/DS-RT.2014.28
    • 2013
      • Conference paper
        Lauer, M., Mullins, J. & Yeddes, M. (2013). Cost optimization strategy for iterative integration of multi-critical functions in IMA and TTethernet architecture. Paper presented at the 37th IEEE Annual Computer Software and Applications Conference Workshops (COMPSACW 2013), Kyoto, Japan (pp. 139-144).
      • Conference paper
        Cassez, F., Mullins, J. & Roux, O.H. (2013). Synthesis of non-interferent distributed systems. Paper presented at the 15th International Conference on Human-Computer Interaction (HCI International 2013), Las Vegas, NV, United states (pp. 159-170). Retrieved from https://doi.org/10.1007/978-3-540-73986-9_14
    • 2012
      • Conference paper
        Benattar, G., Berard, B., Lime, D., Mullins, J., Roux, O.H. & Sassolas, M. (2012). Channel synthesis for finite transducers. Paper presented at the 13th International Conference on Automata and Format Languages (AFL'2011), Debrecen, Hungary. (Published in International Journal of Foundations of Computer Science, 23(6), 1241-1260). Retrieved from https://doi.org/10.1142/S0129054112400503
      • Conference paper
        Abouzaid, F., Mullins, J., Mazzara, M. & Dragoni, N. (2012). Modelling and analysis of dynamic reconfiguration in BP-calculus. Paper presented at the 6th KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2012), Dubrovnik, Croatia (pp. 534-543).
    • 2011
      • Conference paper
        Kiraga, A.F. & Mullins, J. (2011). Admissible adversaries in PRISM for probabilistic security analysis. Paper presented at the 9th Workshop on Quantitative Aspects of Programming Languages (QAPL 2011), Saarbrücken, Germany.
      • Conference paper
        Kiraga, A.F. & Mullins, J. (2011). Admissible adversaries in PRISM for probabilistic security analysis. Paper presented at the 5th International Workshop on Harnessing Theories for Tool Support in Software (TTSS 2011), Oslo, Norvège.
    • 2010
      • Conference paper
        Abouzaid, F. & Mullins, J. (2010). Formal Specification of Correlation in WS Orchestrations Using BP-calculus. Paper presented at the 5th International Workshop on Formal Aspects of Component Software (FACS 2008), Malaga, Spain. (Published in Electronic Notes in Theoretical Computer Science, 260, 3-24). Retrieved from https://doi.org/10.1016/j.entcs.2009.12.029
      • Conference paper
        Berard, B., Mullins, J. & Sassolas, M. (2010). Quantifying opacity. Paper presented at the 7th International Conference on the Quantitative Evaluation of Systems (QEST 2010), Williamsburg, VA, USA (pp. 263-272).
    • 2009
      • Conference paper
        Benattar, G., Bérard, B., Lime, D., Mullins, J., Roux, O.H. & Sassolas, M. (2009). Covert channels with sequential transducers. Paper presented at the 24th Annual IEEE Symposium on Logic in Computer Science (LICS 2009) and Satellite Workshop on Foundations of Computer Security (CFS 2009), Los Angeles, CA.
      • Conference paper
        Abouzaid, F. & Mullins, J. (2009). Formal Specification of Correlation patterns for WS-BPEL. Paper presented at the 9e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2009), Montréal, Québec.
      • Conference paper
        Abouzaid, F. & Mullins, J. (2009). Model-checking Web Services Orchestrations using BP-calculus. Paper presented at the 8th International Workshop on the Foundations of Coordination Languages and Software Architectures (FOCLASA 2009), Rhodes, Greece. (Published in Electronic Notes in Theoretical Computer Science, 255, 3-21). Retrieved from https://doi.org/10.1016/j.entcs.2009.10.022
      • Conference paper
        Debbabi, M., Fellah, A. & Mullins, J. (2009). Secrecy in temporary secret based cryptographic protocols. Paper presented at the 9e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2009), Montréal, Québec.
    • 2008
      • Conference paper
        Abouzaid, F. & Mullins, J. (2008). A Calculus for Generation, Verification and Refinement of BPEL Specifications. Paper presented at the 3rd International Workshop on Automated Specification and Verification of Web Systems (WWV 2007), Venice, Italy. (Published in Electronic Notes in Theoretical Computer Science, 200(3), 43-65). Retrieved from https://doi.org/10.1016/j.entcs.2008.04.092
    • 2007
      • Conference paper
        Brlek, S., Hamadou, S. & Mullins, J. (2007). A probabilistic scheduler for the analysis of cryptographic protocols. Paper presented at the 5th International Workshop on Security Issues in Concurrency (SecCo 2007), Lisbonne, Portugal.
      • Conference paper
        Mullins, J. & Oarga, R. (2007). Model checking of extended OCL constraints over UML models with SOCLe. Paper presented at the 9th IFIP International Conference on Formal Methods for Open Object-based distributed Systems (FMOODS 2007), Paphos, Chypre.
      • Conference paper
        Gardey, G., Mullins, J. & Roux, O.H. (2007). Non-interference control synthesis for security timed automata. Paper presented at the 4th Workshop on Security Issues in Concurrency (SecCO 2005), San Francisco, CA. (Published in Electronic Notes in Theoretical Computer Science, 180(1), 35-53). Retrieved from https://doi.org/10.1016/j.entcs.2005.05.046
      • Conference paper
        Boteanu, D., Fernandez, J.M., McHugh, J. & Mullins, J. (2007). Queue management as a DoS counter-measure? Paper presented at the 10th Information Security Conference (ISC 2007), Valparaiso, Chile (pp. 263-280).
      • Conference paper
        Cassez, F., Mullins, J. & Roux, O.H. (2007). Synthesis of non-interferent systems. Paper presented at the 4th International Conference on Mathematical Methods, Models and Architectire for Computer Networks Security (MMM-ACNS07), St-Petersburg, Russie.
    • 2006
      • Conference paper
        Minier, M., Galice, S., Mullins, J. & Ubeda, S. (2006). Cryptographic protocol to establish trusted history of interactions. Paper presented at the 3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS 2006), Hambourg, Allemagne.
      • Conference paper
        Brlek, S., Hamadou, S. & Mullins, J. (2006). Some remarks on the certificates registration of the electronic commerce protocol SET. Paper presented at the International Conference on Internet and Web Applications and Services/Advanced International Conference on Telecommunications (AICT-ICIW 2006), San Jose, Ca.
    • 2005
      • Conference paper
        Fellah, A. & Mullins, J. (2005). Admissible Interference by Typing for Cryptographic Protocols. Paper presented at the Information and Communications Security (pp. 123-135).
      • Conference paper
        Bastien, G. & Mullins, J. (2005). ASPIC : A tool for symbolic analysis of cryptographic protocols. Paper presented at the 5e Colloque international sur les nouvelles technologies de la répartition (NOTERE 2005), Gatineau, Qc, Canada.
      • Conference paper
        Bergeron, M., Azambre, D. & Mullins, J. (2005). SOCLe : An OCL model-checker for UML models. Paper presented at the 2nd International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES 2005), Rennes, France.
      • Conference paper
        Painchaud, F., Azambre, D., Bergeron, M., Mullins, J. & Oarga, R. (2005). Socle : Integrated design of software applications and security. Paper presented at the 10th International Command and Control Research and TEchnology Symposium (ICCRTS 2005), McLean, VA.
      • Conference paper
        Azambre, D., Bergeron, M. & Mullins, J. (2005). Validating UML and OCL models in SOCLe by simulation and model-checking. Paper presented at the 2nd International Workshop on Model-Based Methodologies for Pervasive and Embedded Software (MOMPES 2005), Rennes, France (pp. 57-75).
    • 2004
      • Conference paper
        Hadj-Alouane, N.B., Lafrance, S., Lin, F., Mullins, J. & Yeddes, M. (2004). An algorithmic approach to verification of intransitive non-interference in security policies. Paper presented at the 43rd IEEE Conference on Decision and Control (CDC 2004), Atlantis, Paradise Island, Bahamas.
      • Conference paper
        Hadj-Alouane, N.B., Lafrance, S., Lin, F., Mullins, J. & Yeddes, M. (2004). Discrete event systems approach to the verification of the information flow properties in secure protocols. Paper presented at the 7th Workshop on Discrete Event System (WODES 2004), Reims, France.
    • 2003
      • Conference paper
        Lafrance, S. & Mullins, J. (2003). An information flow method to detect denial of service nulnerabilities. Paper presented at the IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Huntsville, AL, US.
      • Conference paper
        Brlek, S., Hamadou, S. & Mullins, J. (2003). ASET-Un protocole anonyme et sécuritaire pour les transactions électroniques. Paper presented at the 2e conférence francophone sur sécurité et architecture réseaux (SAR 2003), Nancy, France.
      • Conference paper
        Lafrance, S. & Mullins, J. (2003). A symbolic approach to the analysis of security protocols. Paper presented at the LICS 2003 Satellite Workshop on Foundations of Computer Security (FCS 2003), Ottawa, Ont. Canada.
      • Conference paper
        Lafrance, S. & Mullins, J. (2003). Using admissible interference to detect denial of service vulnerabilities. Paper presented at the 6th International Workshop in Formal Methods (IWFM 2003) and Electronic Workshops in Computing by British Computer Society (BCSeWiC 2003), Dublin, Irlande.
    • 2002
      • Conference paper
        Lafrance, S. & Mullins, J. (2002). A generic enemy process for the analysis of cryptographic protocols. Paper presented at the IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Lund, Suède.
      • Conference paper
        Lafrance, S. & Mullins, J. (2002). Bisimulation-based non-deterministic admissible interference and its applications to the analysis of cryptographic protocols. Paper presented at the Computing: The Australasian Theory Symposium (CATS 2002), Melbourne, Victoria, Australia. (Published in Electronic Notes in Theoretical Computer Science, 61, 154-177). Retrieved from https://doi.org/10.1016/S1571-0661(04)00311-1
      • Conference paper
        Lafrance, S. & Mullins, J. (2002). Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols. Paper presented at the Computing: the Australasian Theory Symposium (CATS 2002), Monash University, Melbourne, Australia (pp. 154-177). Retrieved from https://doi.org/10.1016/s1571-0661(04)00311-1
    • 2001
      • Conference paper
        Yeddes, M. & Mullins, J. (2001). Quasi-synchronous approach for distributed control in synchronous systems. Paper presented at the IEEE International Symposium on Intelligent Control (ISIC 2001), Mexico City, Mexico (pp. 231-235).
      • Conference paper
        Mullins, J. & Yeddes, M. (2001). Two proof methods for bisimulation-based non-deterministic admissible interference. Paper presented at the IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Washington, D.C.
    • 2000
      • Conference paper
        Mullins, J. (2000). Non-deterministic admissible interference. Paper presented at the IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Edinburgh, Scotland.
    • 1996
      • Conference paper
        Hains, G. & Mullins, J. (1996). A categorical model of array domains. Paper presented at the 2nd International Euro-Par Conference on Parallel Processing (Euro-Par 1996), Lyon, France.
      • Conference paper
        Argon, P., Mullins, J. & Roux, O. (1996). A correct compiler construction using Coq. Paper presented at the Workshop on Proof Search in Type-Theoretic Languages (CADE 1996), New Brunswick, USA.
    • 1995
      • Conference paper
        Hains, G. & Mullins, J. (1995). A metacircular data-parallel functional language. Paper presented at the 1st International Euro-Par Conference on Parallel Processing (Euro-Par 1995), Stockholm, Suède.
      • Conference paper
        Mullins, J. (1995). On guaranteed recursively defined processes : limit and logical definability of testing. Paper presented at the 5th Italian Conference on Theoretical Computer Science (ICTCS 1995), Ravello, Italie.
  • Book chapters (3)
    • 2016
      • Book chapter
        Hamadou, S., Mullins, J. & Gherbi, A. (2016). A real-time concurrent constraint calculus for analyzing avionic systems embedded in the IMA connected through TTethernet. In Theoretical Information Reuse and Integration (Vol. 446, pp. 85-111). Retrieved from https://doi.org/10.1007/978-3-319-31311-5_4
    • 1997
      • Book chapter
        Desharnais, J., Hodgson, B. & Mullins, J. (1997). Relation algebras are models of noncommutative propositional linear logic. In C. Brink & G. Schmidt (Eds.), Relational methods in computer science (pp. 106-115). Berlin: Springer.
    • 1995
      • Book chapter
        Desharnais, J., Mili, A., Mullins, J. & Slimani, Y. (1995). Semantics of concurrency. In A. Somaya (Ed.), Parallel and distributed computing handbook (pp. 24-74). New-Yorkl: McGraw-Hill.
  • Reports (3)
    • 2015
      • Report
        Bérard, B., Kouchnarenko, O., Mullins, J. & Sassolas, M. (2015). Probabilistic Opacity in Refinement-Based Modeling. Retrieved from https://arxiv.org/abs/1510.04316
    • 2006
      • Report
        Boteanu, D., Fernandez, J.M. & Mullins, J. (2006). On the efficiency of timeout-based DoS attack protections (Report No EPM-RT-2006-07). École Polytechnique de Montréal.
    • 2002
      • Report
        Lafrance, S. & Mullins, J. (2002). Using admissible interference to detect denial of service attacks (Report No 02-01).