Clean publication items

This commit is contained in:
Quentin Rouland 2024-11-29 10:12:44 +01:00
parent d02084eb95
commit c6faa4ba29

View File

@ -274,16 +274,16 @@
<strong data-i18n="publications.journal"></strong>
</h3>
<p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1016/j.jss.2024.112219">A model-driven formal methods approach to software architectural security vulnerabilities specification and verification</a>.<br>
<span class="pl-3"></span>Journal of Systems Architecture (JSA), 2021.
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1016/j.jss.2024.112219">A model-driven formal methods approach to software architectural security vulnerabilities specification and verification</a>.
Journal of Systems Architecture (JSA), 2021.
</p>
<p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1016/j.sysarc.2021.102073">Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support</a>.<br>
<span class="pl-3"></span>Journal of Systems Architecture (JSA), 2021.
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1016/j.sysarc.2021.102073">Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support</a>.
Journal of Systems Architecture (JSA), 2021.
</p>
<p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1016/j.future.2020.02.033">Formal Specification and Verification of Reusable Communication Models for Distributed Systems Architecture</a>.<br>
<span class="pl-3"></span>Future Generation Computer Systems (FGCS), 2020.
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1016/j.future.2020.02.033">Formal Specification and Verification of Reusable Communication Models for Distributed Systems Architecture</a>.
Future Generation Computer Systems (FGCS), 2020.
</p>
</div>
<!--Grid column-->
@ -299,44 +299,44 @@
<strong data-i18n="publications.conference"></strong>
</h3>
<p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Kamel Adi, Omer Nguena Timo, Luigi Logrippo. <span class="text-primary" href="#">Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy (accepted)</span>.<br>
<span class="pl-3">17th International Symposium on Foundations & Practice of Security (QRS), Montreal, Canada, 2024.</span>
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Kamel Adi, Omer Nguena Timo, Luigi Logrippo. <span class="text-primary" href="#">Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy (accepted)</span>.
17th International Symposium on Foundations & Practice of Security (QRS), Montreal, Canada, 2024.
</p>
<p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Kamel Adi, Omer Nguena Timo, Luigi Logrippo. <span class="text-primary" href="#">Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy (accepted)</span>.<br>
<span class="pl-3">19th International Conference on Risks and Security of Internet and Systems (CRiSIS), Aix-En-Provence, France, 2024.</span>
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Kamel Adi, Omer Nguena Timo, Luigi Logrippo. <span class="text-primary" href="#">Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy (accepted)</span>.
19th International Conference on Risks and Security of Internet and Systems (CRiSIS), Aix-En-Provence, France, 2024.
</p>
<p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Stojanche Gjorcheski, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1109/QRS-C60940.2023.00054">A Security Compliance-by-Design Framework Utilizing Reusable Formal Model</a>.<br>
<span class="pl-3">23rd IEE International Conference on Software Quality, Reliability, and Security Companion (QRS), Chiang Mai, Thailand, 2023.</span>
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Stojanche Gjorcheski, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1109/QRS-C60940.2023.00054">A Security Compliance-by-Design Framework Utilizing Reusable Formal Model</a>.
23rd IEE International Conference on Software Quality, Reliability, and Security Companion (QRS), Chiang Mai, Thailand, 2023.
</p>
<p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i>James Baak, <strong>Quentin Rouland</strong>, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1007/978-3-031-49333-1_2">A Formal Metamodel for Software Architectures with Composite Components.</a>.<br>
<span class="pl-3">12th International Conference on Model and Data Engineering (MEDI), Sousse, Tunisia, 2023.</span>
<i class="fas fa-angle-right mr-2"></i>James Baak, <strong>Quentin Rouland</strong>, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1007/978-3-031-49333-1_2">A Formal Metamodel for Software Architectures with Composite Components.</a>.
12th International Conference on Model and Data Engineering (MEDI), Sousse, Tunisia, 2023.
</p>
<p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Stojanche Gjorcheski, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1109/REW57809.2023.00045">Eliciting a Security Architecture Requirements Baseline from Standards and Regulations</a>.<br>
<span class="pl-3">10th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering (ESPRE), Hannover, Germany, 2023.</span>
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Stojanche Gjorcheski, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1109/REW57809.2023.00045">Eliciting a Security Architecture Requirements Baseline from Standards and Regulations</a>.
10th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering (ESPRE), Hannover, Germany, 2023.
</p>
<p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jean-Paul Bodeveix, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1109/ICSA-C57050.2023.00042 ">Formalizing the Relationship between Security Policies and Objectives in Software Architectures</a>.<br>
<span class="pl-3">20th IEEE International Conference on Software Architecture Companion (ICSA), L'Aquila, Italy, 2023.</span>
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jean-Paul Bodeveix, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1109/ICSA-C57050.2023.00042 ">Formalizing the Relationship between Security Policies and Objectives in Software Architectures</a>.
20th IEEE International Conference on Software Architecture Companion (ICSA), L'Aquila, Italy, 2023.
</p>
<p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1007/978-3-030-64694-3_4">Reusable Formal Models for Threat Specification, Detection, and Treatment</a>.<br>
<span class="pl-3">19th International Conference on Software and Systems Reuse (ICSR), Hammamet, Tunisia, 2020.</span>
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1007/978-3-030-64694-3_4">Reusable Formal Models for Threat Specification, Detection, and Treatment</a>.
19th International Conference on Software and Systems Reuse (ICSR), Hammamet, Tunisia, 2020.
</p>
<p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i>Brahim Hamid, <strong>Quentin Rouland</strong>, Jason Jaskolka. <a class="text-primary" href="https://dx.doi.org/10.1109/PRDC47002.2019.00052">Distributed Maintenance of a Spanning Tree of K-Connected Graphs</a>.<br>
<span class="pl-3">24th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Kyoto, Japan, 2019.</span>
<i class="fas fa-angle-right mr-2"></i>Brahim Hamid, <strong>Quentin Rouland</strong>, Jason Jaskolka. <a class="text-primary" href="https://dx.doi.org/10.1109/PRDC47002.2019.00052">Distributed Maintenance of a Spanning Tree of K-Connected Graphs</a>.
24th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Kyoto, Japan, 2019.
</p>
<p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jean-Paul Bodeveix, Mamoun Filali. <a class="text-primary" href="https://doi.org/10.1109/ICECCS.2019.00033">A Formal Methods Approach to Security Requirements Specification and Verification</a>.<br>
<span class="pl-3">24th International Conference on Engineering of Complex Computer Systems (ICECCS), Guangzhou, China, 2019.</span>
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jean-Paul Bodeveix, Mamoun Filali. <a class="text-primary" href="https://doi.org/10.1109/ICECCS.2019.00033">A Formal Methods Approach to Security Requirements Specification and Verification</a>.
24th International Conference on Engineering of Complex Computer Systems (ICECCS), Guangzhou, China, 2019.
</p>
<p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1007/978-3-030-00856-7_13">Formalizing Reusable Communication Models for Distributed Systems Architecture</a>.<br>
<span class="pl-3">8th International Conference on Model and Data Engineering (MEDI), Marrakesh, Morocco, 2018.</span>
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1007/978-3-030-00856-7_13">Formalizing Reusable Communication Models for Distributed Systems Architecture</a>.
8th International Conference on Model and Data Engineering (MEDI), Marrakesh, Morocco, 2018.
</p>
</div>
<!--Grid column-->
@ -353,8 +353,8 @@
</h3>
</h3>
<p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>. <a class="text-primary" href="/assets/Manuscript.pdf">Rigorous development of secure architecture within the negative and positive statements: properties, models, analysis and tool support</a>.<br>
<span class="pl-3">PhD Thesis, Université Toulouse 3 Paul Sabatier, 2021.</span>
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>. <a class="text-primary" href="/assets/Manuscript.pdf">Rigorous development of secure architecture within the negative and positive statements: properties, models, analysis and tool support</a>.
PhD Thesis, Université Toulouse 3 Paul Sabatier, 2021.
</p>
</div>
<!--Grid column-->