default search action
Mohamed Moez Yeddes
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j7]Ikhlass Ammar, Yamen El Touati, John Mullins, Moez Yeddes:
Timed Bounded Verification of Inclusion Based on Timed Bounded Discretized Language. Int. J. Found. Comput. Sci. 32(2): 175-202 (2021) - [j6]Ikhlass Ammar, Yamen El Touati, Moez Yeddes, John Mullins:
Bounded opacity for timed systems. J. Inf. Secur. Appl. 61: 102926 (2021)
2010 – 2019
- 2017
- [c14]Rym Zrelli, Moez Yeddes, Nejib Ben Hadj-Alouane:
Checking and Enforcing Security Through Opacity in Healthcare Applications. ICSOC Workshops 2017: 161-173 - [i2]Rym Zrelli, Moez Yeddes, Nejib Ben Hadj-Alouane:
Checking and Enforcing Security through Opacity in Healthcare Applications. CoRR abs/1710.00011 (2017) - 2016
- [c13]Moez Yeddes:
Enforcing opacity with Orwellian observation. WODES 2016: 306-312 - 2014
- [c12]John Mullins, Moez Yeddes:
Opacity with Orwellian Observers and Intransitive Non-Interference. WODES 2014: 344-349 - 2013
- [c11]Michaël Lauer, John Mullins, Moez Yeddes:
Cost Optimization Strategy for Iterative Integration of Multi-critical Functions in IMA and TTEthernet Architecture. COMPSAC Workshops 2013: 139-144 - [i1]John Mullins, Moez Yeddes:
Opacity with Orwellian Observers and Intransitive Non-interference. CoRR abs/1312.6426 (2013) - 2012
- [c10]Mohamed Anis Zemni, Nejib Ben Hadj-Alouane, Moez Yeddes:
A Semantics-Based Privacy-Aware Approach for Fragmenting Business Processes. COMPSAC Workshops 2012: 254-259 - [c9]Mohamed Anis Zemni, Nejib Ben Hadj-Alouane, Moez Yeddes:
An Approach for Producing Privacy-Aware Reusable Business Process Fragments. ICWS 2012: 659-661 - 2011
- [j5]Amine Belhaj Seboui, Nejib Ben Hadj-Alouane, Gwenaël Delaval, Éric Rutten, Mohamed Moez Yeddes:
An approach for the synthesis of decentralised supervisors for distributed adaptive systems. Int. J. Crit. Comput. Based Syst. 2(3/4): 246-265 (2011) - [c8]Mouna Makni, Nejib Ben Hadj-Alouane, Samir Tata, Moez Yeddes:
Negotiating Deadline Constraints in Inter-organizational Logistic Systems: A Healthcare Case Study. Business Process Management Workshops (2) 2011: 108-118 - 2010
- [c7]Imen Benzarti, Samir Tata, Zakaria Maamar, Nejib Ben Hadj-Alouane, Mohamed Moez Yeddes:
Engineering Process for Capacity-driven Web Services. ICEIS (1) 2010: 84-95 - [c6]Mouna Makni, Nejib Ben Hadj-Alouane, Mohamed Moez Yeddes, Samir Tata:
Modeling Time Constraints in Inter-organizational Workflows. ICEIS (3) 2010: 221-229 - [c5]Mouna Makni, Samir Tata, Mohamed Moez Yeddes, Nejib Ben Hadj-Alouane:
Satisfaction and Coherence of Deadline Constraints in Inter-Organizational Workflows. OTM Conferences (1) 2010: 523-539
2000 – 2009
- 2009
- [j4]Moez Yeddes, Feng Lin, Nejib Ben Hadj-Alouane:
Modifying Security Policies for the Satisfaction of Intransitive Non-Interference. IEEE Trans. Autom. Control. 54(8): 1961-1966 (2009) - [c4]Haithem Derbel, Nejib Ben Hadj-Alouane, Moez Yeddes, Hassane Alla:
Limited-Time Lookahead Diagnosability of Rectangular Hybrid Automata. ADHS 2009: 280-285 - 2006
- [j3]Nejib Ben Hadj-Alouane, Mohamed Moez Yeddes, Atidel B. Hadj-Alouane, Feng Lin:
A Mixed Integer Dynamic Programming Approach to a Class of Optimal Control Problems in Hybrid Systems. Cybern. Syst. 37(5): 481-504 (2006) - 2005
- [j2]Nejib Ben Hadj-Alouane, Stéphane Lafrance, Feng Lin, John Mullins, Moez Yeddes:
Characterizing intransitive noninterference for 3-domain security policies with observability. IEEE Trans. Autom. Control. 50(6): 920-925 (2005) - [j1]Nejib Ben Hadj-Alouane, Stéphane Lafrance, Feng Lin, John Mullins, Mohamed Moez Yeddes:
On the verification of intransitive noninterference in multilevel security. IEEE Trans. Syst. Man Cybern. Part B 35(5): 948-958 (2005) - 2004
- [c3]Nejib Ben Hadj-Alouane, Stéphane Lafrance, Feng Lin, John Mullins, Moez Yeddes:
An algorithmic approach to verification of intransitive non-interference in security policies. CDC 2004: 51-56 - 2000
- [c2]Moez Yeddes, Hassane Alla, René David:
The Partition Method for the Order - Insensitivity in a Synchronous Distributed Systems. ISCC 2000: 635-640 - [c1]Moez Yeddes, Hassane Alla:
Checking order-insensitivity using ternary simulation in synchronous programs. ISPASS 2000: 52-57
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint