Clean publication items

This commit is contained in:
Quentin Rouland 2024-11-29 10:12:44 +01:00
parent d02084eb95
commit c6faa4ba29

View File

@ -274,16 +274,16 @@
<strong data-i18n="publications.journal"></strong> <strong data-i18n="publications.journal"></strong>
</h3> </h3>
<p class="mb-2 text-justify"> <p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1016/j.jss.2024.112219">A model-driven formal methods approach to software architectural security vulnerabilities specification and verification</a>.<br> <i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1016/j.jss.2024.112219">A model-driven formal methods approach to software architectural security vulnerabilities specification and verification</a>.
<span class="pl-3"></span>Journal of Systems Architecture (JSA), 2021. Journal of Systems Architecture (JSA), 2021.
</p> </p>
<p class="mb-2 text-justify"> <p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1016/j.sysarc.2021.102073">Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support</a>.<br> <i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1016/j.sysarc.2021.102073">Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support</a>.
<span class="pl-3"></span>Journal of Systems Architecture (JSA), 2021. Journal of Systems Architecture (JSA), 2021.
</p> </p>
<p class="mb-2 text-justify"> <p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1016/j.future.2020.02.033">Formal Specification and Verification of Reusable Communication Models for Distributed Systems Architecture</a>.<br> <i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1016/j.future.2020.02.033">Formal Specification and Verification of Reusable Communication Models for Distributed Systems Architecture</a>.
<span class="pl-3"></span>Future Generation Computer Systems (FGCS), 2020. Future Generation Computer Systems (FGCS), 2020.
</p> </p>
</div> </div>
<!--Grid column--> <!--Grid column-->
@ -299,44 +299,44 @@
<strong data-i18n="publications.conference"></strong> <strong data-i18n="publications.conference"></strong>
</h3> </h3>
<p class="mb-2 text-justify"> <p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Kamel Adi, Omer Nguena Timo, Luigi Logrippo. <span class="text-primary" href="#">Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy (accepted)</span>.<br> <i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Kamel Adi, Omer Nguena Timo, Luigi Logrippo. <span class="text-primary" href="#">Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy (accepted)</span>.
<span class="pl-3">17th International Symposium on Foundations & Practice of Security (QRS), Montreal, Canada, 2024.</span> 17th International Symposium on Foundations & Practice of Security (QRS), Montreal, Canada, 2024.
</p> </p>
<p class="mb-2 text-justify"> <p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Kamel Adi, Omer Nguena Timo, Luigi Logrippo. <span class="text-primary" href="#">Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy (accepted)</span>.<br> <i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Kamel Adi, Omer Nguena Timo, Luigi Logrippo. <span class="text-primary" href="#">Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy (accepted)</span>.
<span class="pl-3">19th International Conference on Risks and Security of Internet and Systems (CRiSIS), Aix-En-Provence, France, 2024.</span> 19th International Conference on Risks and Security of Internet and Systems (CRiSIS), Aix-En-Provence, France, 2024.
</p> </p>
<p class="mb-2 text-justify"> <p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Stojanche Gjorcheski, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1109/QRS-C60940.2023.00054">A Security Compliance-by-Design Framework Utilizing Reusable Formal Model</a>.<br> <i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Stojanche Gjorcheski, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1109/QRS-C60940.2023.00054">A Security Compliance-by-Design Framework Utilizing Reusable Formal Model</a>.
<span class="pl-3">23rd IEE International Conference on Software Quality, Reliability, and Security Companion (QRS), Chiang Mai, Thailand, 2023.</span> 23rd IEE International Conference on Software Quality, Reliability, and Security Companion (QRS), Chiang Mai, Thailand, 2023.
</p> </p>
<p class="mb-2 text-justify"> <p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i>James Baak, <strong>Quentin Rouland</strong>, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1007/978-3-031-49333-1_2">A Formal Metamodel for Software Architectures with Composite Components.</a>.<br> <i class="fas fa-angle-right mr-2"></i>James Baak, <strong>Quentin Rouland</strong>, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1007/978-3-031-49333-1_2">A Formal Metamodel for Software Architectures with Composite Components.</a>.
<span class="pl-3">12th International Conference on Model and Data Engineering (MEDI), Sousse, Tunisia, 2023.</span> 12th International Conference on Model and Data Engineering (MEDI), Sousse, Tunisia, 2023.
</p> </p>
<p class="mb-2 text-justify"> <p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Stojanche Gjorcheski, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1109/REW57809.2023.00045">Eliciting a Security Architecture Requirements Baseline from Standards and Regulations</a>.<br> <i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Stojanche Gjorcheski, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1109/REW57809.2023.00045">Eliciting a Security Architecture Requirements Baseline from Standards and Regulations</a>.
<span class="pl-3">10th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering (ESPRE), Hannover, Germany, 2023.</span> 10th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering (ESPRE), Hannover, Germany, 2023.
</p> </p>
<p class="mb-2 text-justify"> <p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jean-Paul Bodeveix, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1109/ICSA-C57050.2023.00042 ">Formalizing the Relationship between Security Policies and Objectives in Software Architectures</a>.<br> <i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jean-Paul Bodeveix, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1109/ICSA-C57050.2023.00042 ">Formalizing the Relationship between Security Policies and Objectives in Software Architectures</a>.
<span class="pl-3">20th IEEE International Conference on Software Architecture Companion (ICSA), L'Aquila, Italy, 2023.</span> 20th IEEE International Conference on Software Architecture Companion (ICSA), L'Aquila, Italy, 2023.
</p> </p>
<p class="mb-2 text-justify"> <p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1007/978-3-030-64694-3_4">Reusable Formal Models for Threat Specification, Detection, and Treatment</a>.<br> <i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1007/978-3-030-64694-3_4">Reusable Formal Models for Threat Specification, Detection, and Treatment</a>.
<span class="pl-3">19th International Conference on Software and Systems Reuse (ICSR), Hammamet, Tunisia, 2020.</span> 19th International Conference on Software and Systems Reuse (ICSR), Hammamet, Tunisia, 2020.
</p> </p>
<p class="mb-2 text-justify"> <p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i>Brahim Hamid, <strong>Quentin Rouland</strong>, Jason Jaskolka. <a class="text-primary" href="https://dx.doi.org/10.1109/PRDC47002.2019.00052">Distributed Maintenance of a Spanning Tree of K-Connected Graphs</a>.<br> <i class="fas fa-angle-right mr-2"></i>Brahim Hamid, <strong>Quentin Rouland</strong>, Jason Jaskolka. <a class="text-primary" href="https://dx.doi.org/10.1109/PRDC47002.2019.00052">Distributed Maintenance of a Spanning Tree of K-Connected Graphs</a>.
<span class="pl-3">24th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Kyoto, Japan, 2019.</span> 24th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Kyoto, Japan, 2019.
</p> </p>
<p class="mb-2 text-justify"> <p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jean-Paul Bodeveix, Mamoun Filali. <a class="text-primary" href="https://doi.org/10.1109/ICECCS.2019.00033">A Formal Methods Approach to Security Requirements Specification and Verification</a>.<br> <i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jean-Paul Bodeveix, Mamoun Filali. <a class="text-primary" href="https://doi.org/10.1109/ICECCS.2019.00033">A Formal Methods Approach to Security Requirements Specification and Verification</a>.
<span class="pl-3">24th International Conference on Engineering of Complex Computer Systems (ICECCS), Guangzhou, China, 2019.</span> 24th International Conference on Engineering of Complex Computer Systems (ICECCS), Guangzhou, China, 2019.
</p> </p>
<p class="mb-2 text-justify"> <p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1007/978-3-030-00856-7_13">Formalizing Reusable Communication Models for Distributed Systems Architecture</a>.<br> <i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>, Brahim Hamid, Jason Jaskolka. <a class="text-primary" href="https://doi.org/10.1007/978-3-030-00856-7_13">Formalizing Reusable Communication Models for Distributed Systems Architecture</a>.
<span class="pl-3">8th International Conference on Model and Data Engineering (MEDI), Marrakesh, Morocco, 2018.</span> 8th International Conference on Model and Data Engineering (MEDI), Marrakesh, Morocco, 2018.
</p> </p>
</div> </div>
<!--Grid column--> <!--Grid column-->
@ -353,8 +353,8 @@
</h3> </h3>
</h3> </h3>
<p class="mb-2 text-justify"> <p class="mb-2 text-justify">
<i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>. <a class="text-primary" href="/assets/Manuscript.pdf">Rigorous development of secure architecture within the negative and positive statements: properties, models, analysis and tool support</a>.<br> <i class="fas fa-angle-right mr-2"></i><strong>Quentin Rouland</strong>. <a class="text-primary" href="/assets/Manuscript.pdf">Rigorous development of secure architecture within the negative and positive statements: properties, models, analysis and tool support</a>.
<span class="pl-3">PhD Thesis, Université Toulouse 3 Paul Sabatier, 2021.</span> PhD Thesis, Université Toulouse 3 Paul Sabatier, 2021.
</p> </p>
</div> </div>
<!--Grid column--> <!--Grid column-->