From d02084eb95dd9db2fe056dedd02c4170051118c8 Mon Sep 17 00:00:00 2001
From: Quentin Rouland
-
@@ -251,11 +251,11 @@
-
-
- Quentin Rouland, Brahim Hamid, Jason Jaskolka. Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support.
+ Quentin Rouland, Brahim Hamid, Jason Jaskolka. A model-driven formal methods approach to software architectural security vulnerabilities specification and verification.
Journal of Systems Architecture (JSA), 2021.
-
- Quentin Rouland, Brahim Hamid, Jason Jaskolka. Formal Specification and Verification of Reusable Communication Models for Distributed Systems Architecture.
+ Quentin Rouland, Brahim Hamid, Jason Jaskolka. Specification, detection, and treatment of STRIDE threats for software components: Modeling, formal methods, and tool support.
+ Journal of Systems Architecture (JSA), 2021.
+
+ Quentin Rouland, Brahim Hamid, Jason Jaskolka. Formal Specification and Verification of Reusable Communication Models for Distributed Systems Architecture.
Future Generation Computer Systems (FGCS), 2020.
-
- Quentin Rouland, Stojanche Gjorcheski, Jason Jaskolka. A Security Compliance-by-Design Framework Utilizing Reusable Formal Model (In Press).
- 23rd IEE International Conference on Software Quality, Reliability, and Security Companion (QRS) , Chiang Mai, Thailand, 2023.
+ Quentin Rouland, Kamel Adi, Omer Nguena Timo, Luigi Logrippo. Toward Automatic Enforcement of Security Patterns in Software Architecture Using Alloy (accepted).
+ 17th International Symposium on Foundations & Practice of Security (QRS), Montreal, Canada, 2024.
- James Baak, Quentin Rouland, Jason Jaskolka. A Formal Metamodel with Composite Components (In Press).
- 12th International Conference on Model and Data Engineering (MEDI), Sousse, Tunisia, 2023.
+ Quentin Rouland, Kamel Adi, Omer Nguena Timo, Luigi Logrippo. Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy (accepted).
+ 19th International Conference on Risks and Security of Internet and Systems (CRiSIS), Aix-En-Provence, France, 2024.
- Quentin Rouland, Stojanche Gjorcheski, Jason Jaskolka. Eliciting a Security Architecture Requirements Baseline from Standards and Regulations.
+ Quentin Rouland, Stojanche Gjorcheski, Jason Jaskolka. A Security Compliance-by-Design Framework Utilizing Reusable Formal Model.
+ 23rd IEE International Conference on Software Quality, Reliability, and Security Companion (QRS), Chiang Mai, Thailand, 2023.
+
+ James Baak, Quentin Rouland, Jason Jaskolka. A Formal Metamodel for Software Architectures with Composite Components..
+ 12th International Conference on Model and Data Engineering (MEDI), Sousse, Tunisia, 2023.
+
+ Quentin Rouland, Stojanche Gjorcheski, Jason Jaskolka. Eliciting a Security Architecture Requirements Baseline from Standards and Regulations.
10th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering (ESPRE), Hannover, Germany, 2023.
@@ -323,9 +335,9 @@ 24th International Conference on Engineering of Complex Computer Systems (ICECCS), Guangzhou, China, 2019.
- Quentin Rouland, Brahim Hamid, Jason Jaskolka. Formalizing Reusable Communication Models for Distributed Systems Architecture.
+ Quentin Rouland, Brahim Hamid, Jason Jaskolka. Formalizing Reusable Communication Models for Distributed Systems Architecture.
8th International Conference on Model and Data Engineering (MEDI), Marrakesh, Morocco, 2018.
-
Quentin Rouland. Rigorous development of secure architecture within the negative and positive statements: properties, models, analysis and tool support.
PhD Thesis, Université Toulouse 3 Paul Sabatier, 2021.
-
Architecture orientée service - Master 2 (8h Cours) -
+Ouverture à la recherche, veille - Master 2 (2h Cours) -
+Modélisation et conception objet - Master 1 (16h TD/TP) -
+Conception et développement orientés objets - Licence 3 (10h TD/TP, 12h Projet)
@@ -379,13 +391,13 @@Projet S3 - Licence 2 (12h Projet) -
+Pix - Licence 2 (48h TD/TP) -
+Algorithmique et Programmation - Licence 1 (17h Cours, 31h TD/TP) -
+Algorithmique S1 - Licence 1 (28h TD/TP)
@@ -394,10 +406,10 @@Projet S2 - Licence 1 (12h Projet) -
+Théorie de l’information - Licence 1 (12h TD/TP) -
+ @@ -411,16 +423,16 @@Modélisation et conception objet - Master 1 (16h TP) -
+Génie logiciel - Licence 3 (20h TP) -
+Algo - Licence 1 (28h TP)
Projet S2 - Licence 1 (12h Projet) -
+ @@ -436,19 +448,19 @@Modélisation et conception objet - Master 1 (16h TP) -
+Génie logiciel - Licence 3 (20h TP) -
+Algo - Licence 1 (28h TP)
Projet S2 - Licence 1 (12h Projet) -
+Théorie de l'information - Licence 1 (12h TP) -
+ @@ -464,19 +476,19 @@Modélisation et conception objet - Master 1 (16h TP) -
+Génie logiciel - Licence 3 (20h TP) -
+Projet S3 - Licence 2 (11h Projet)
Projet S2 - Licence 1 (12h Projet) -
+Théorie de l'information - Licence 1 (12h TP) -
+ @@ -581,7 +593,7 @@ // Animations initialization new WOW().init(); - +