@inproceedings{MechriLMFF07, title = {Automatic Enforcement of Security in Computer Networks}, author = {T. Mechri and Mahjoub Langar and Mohamed Mejri and Hamido Fujita and Yutaka Funyu}, year = {2007}, tags = {security}, researchr = {https://researchr.org/publication/MechriLMFF07}, cites = {0}, citedby = {0}, pages = {200-222}, booktitle = {somet}, } @article{MejriKFE03, title = {Static analysis of Lyee requirements}, author = {Mohamed Mejri and Béchir Ktari and Hamido Fujita and M. M. Erhioui}, year = {2003}, doi = {10.1016/j.knosys.2003.08.002}, url = {http://dx.doi.org/10.1016/j.knosys.2003.08.002}, tags = {analysis, static analysis}, researchr = {https://researchr.org/publication/MejriKFE03}, cites = {0}, citedby = {0}, journal = {kbs}, volume = {16}, number = {7-8}, pages = {361-382}, } @inproceedings{MejriF08, title = {Enforcing Security Policies Using Algebraic Approach}, author = {Mohamed Mejri and Hamido Fujita}, year = {2008}, tags = {security, algebra, systematic-approach}, researchr = {https://researchr.org/publication/MejriF08}, cites = {0}, citedby = {0}, pages = {84-98}, booktitle = {somet}, } @article{FujitaKM06, title = {Implementing Lyee-Calculus in Java}, author = {Hamido Fujita and Béchir Ktari and Mohamed Mejri}, year = {2006}, doi = {10.1016/j.knosys.2005.10.004}, url = {http://dx.doi.org/10.1016/j.knosys.2005.10.004}, tags = {Java}, researchr = {https://researchr.org/publication/FujitaKM06}, cites = {0}, citedby = {0}, journal = {kbs}, volume = {19}, number = {2}, pages = {116-129}, } @inproceedings{MejriAF09, title = {Formal Specification and Analysis of Firewalls}, author = {Mohamed Mejri and Kamel Adi and Hamido Fujita}, year = {2009}, doi = {10.3233/978-1-60750-049-0-284}, url = {http://dx.doi.org/10.3233/978-1-60750-049-0-284}, tags = {analysis}, researchr = {https://researchr.org/publication/MejriAF09}, cites = {0}, citedby = {0}, pages = {284-293}, booktitle = {somet}, } @article{FujitaMK04, title = {A process algebra to formalize the Lyee methodology}, author = {Hamido Fujita and Mohamed Mejri and Béchir Ktari}, year = {2004}, doi = {10.1016/j.knosys.2004.07.006}, url = {http://dx.doi.org/10.1016/j.knosys.2004.07.006}, tags = {process algebra, algebra}, researchr = {https://researchr.org/publication/FujitaMK04}, cites = {0}, citedby = {0}, journal = {kbs}, volume = {17}, number = {5-6}, pages = {263-281}, } @inproceedings{KtariMGF05, title = {LyeeBuilder}, author = {Béchir Ktari and Mohamed Mejri and Daniel Godbout and Hamido Fujita}, year = {2005}, researchr = {https://researchr.org/publication/KtariMGF05}, cites = {0}, citedby = {0}, pages = {83-99}, booktitle = {somet}, } @article{HoumaniMF09, title = {Secrecy of cryptographic protocols under equational theory}, author = {Hanane Houmani and Mohamed Mejri and Hamido Fujita}, year = {2009}, doi = {10.1016/j.knosys.2008.11.004}, url = {http://dx.doi.org/10.1016/j.knosys.2008.11.004}, tags = {protocol}, researchr = {https://researchr.org/publication/HoumaniMF09}, cites = {0}, citedby = {0}, journal = {kbs}, volume = {22}, number = {3}, pages = {160-173}, } @article{KtariFMG07, title = {Toward a new software development environment}, author = {Béchir Ktari and Hamido Fujita and Mohamed Mejri and Daniel Godbout}, year = {2007}, doi = {10.1016/j.knosys.2007.05.006}, url = {http://dx.doi.org/10.1016/j.knosys.2007.05.006}, tags = {meta-model, model-driven development, Meta-Environment, meta-objects}, researchr = {https://researchr.org/publication/KtariFMG07}, cites = {0}, citedby = {0}, journal = {kbs}, volume = {20}, number = {7}, pages = {683-693}, } @proceedings{somet:2006, title = {New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2006, October 25-27, 2006, Quebec, Canada}, year = {2006}, researchr = {https://researchr.org/publication/somet%3A2006}, cites = {0}, citedby = {0}, booktitle = {New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2006, October 25-27, 2006, Quebec, Canada}, conference = {somet}, editor = {Hamido Fujita and Mohamed Mejri}, volume = {147}, series = {Frontiers in Artificial Intelligence and Applications}, publisher = {IOS Press}, isbn = {978-1-58603-673-7}, } @proceedings{somet:2005, title = {New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2005, September 28-30, 2005, Tokyo, Japan}, year = {2005}, researchr = {https://researchr.org/publication/somet%3A2005}, cites = {0}, citedby = {0}, booktitle = {New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2005, September 28-30, 2005, Tokyo, Japan}, conference = {somet}, editor = {Hamido Fujita and Mohamed Mejri}, volume = {129}, series = {Frontiers in Artificial Intelligence and Applications}, publisher = {IOS Press}, }