default search action
Jean-Luc Richier
Person information
- affiliation: IMAG, Grenoble, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j3]Yves Ledru, Akram Idani, Jérémy Milhau, Nafees Qamar, Régine Laleau, Jean-Luc Richier, Mohamed-Amine Labiadh:
Validation of IS Security Policies Featuring Authorisation Constraints. Int. J. Inf. Syst. Model. Des. 6(1): 24-46 (2015) - [c30]Yves Ledru, Akram Idani, Jean-Luc Richier:
Validation of a Security Policy by the Test of Its Formal B Specification - A Case Study. FormaliSE@ICSE 2015: 6-12 - 2014
- [c29]Fabien Duchene, Sanjay Rawat, Jean-Luc Richier, Roland Groz:
KameleonFuzz: evolutionary fuzzing for black-box XSS detection. CODASPY 2014: 37-48 - [c28]Karim Hossen, Roland Groz, Catherine Oriat, Jean-Luc Richier:
Automatic Model Inference of Web Applications for Security Testing. ICST Workshops 2014: 22-23 - 2013
- [c27]Sanjay Rawat, Fabien Duchene, Roland Groz, Jean-Luc Richier:
Evolving indigestible codes: Fuzzing interpreters with genetic programming. CICS 2013: 37-39 - [c26]Karim Hossen, Roland Groz, Catherine Oriat, Jean-Luc Richier:
Automatic Generation of Test Drivers for Model Inference of Web Applications. ICST Workshops 2013: 441-444 - [c25]Fabien Duchene, Sanjay Rawat, Jean-Luc Richier, Roland Groz:
LigRE: Reverse-engineering of control and data flow models for black-box XSS detection. WCRE 2013: 252-261 - 2012
- [c24]Fabien Duchene, Roland Groz, Sanjay Rawat, Jean-Luc Richier:
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing. ICST 2012: 815-817 - 2011
- [j2]Yliès Falcone, Laurent Mounier, Jean-Claude Fernandez, Jean-Luc Richier:
Runtime enforcement monitors: composition, synthesis, and enforcement abilities. Formal Methods Syst. Des. 38(3): 223-262 (2011) - [c23]Yves Ledru, Akram Idani, Jérémy Milhau, Nafees Qamar, Régine Laleau, Jean-Luc Richier, Mohamed-Amine Labiadh:
Taking into Account Functional Models in the Validation of IS Security Policies. CAiSE Workshops 2011: 592-606 - [c22]Karim Hossen, Roland Groz, Jean-Luc Richier:
Security Vulnerabilities Detection Using Model Inference for Applications and Security Protocols. ICST Workshops 2011: 534-536 - [c21]Yves Ledru, Nafees Qamar, Akram Idani, Jean-Luc Richier, Mohamed-Amine Labiadh:
Validation of security policies by the animation of Z specifications. SACMAT 2011: 155-164 - 2010
- [c20]Ajitha Rajan, Lydie du Bousquet, Yves Ledru, Germán Vega, Jean-Luc Richier:
Assertion-based test oracles for home automation systems. MOMPES 2010: 45-52
2000 – 2009
- 2009
- [c19]Lydie du Bousquet, Ajitha Rajan, Catherine Oriat, Jean-Luc Richier, Germán Vega:
Service specification and validation in the context of the home. ICFI 2009: 207-219 - 2008
- [c18]Vianney Darmaillacq, Jean-Luc Richier, Roland Groz:
Test generation and execution for security rules in temporal logic. ICST Workshops 2008: 252-259 - [c17]Yliès Falcone, Laurent Mounier, Jean-Claude Fernandez, Jean-Luc Richier:
j-POST: a Java Toolchain for Property-Oriented Software Testing. MBT@ETAPS 2008: 29-41 - 2007
- [c16]Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier, Jean-Luc Richier:
A Compositional Testing Framework Driven by Partial Specifications. TestCom/FATES 2007: 107-122 - [e1]Lydie du Bousquet, Jean-Luc Richier:
Feature Interactions in Software and Communication Systems IX, International Co nference on Feature Interactions in Software and Communication Systems, ICFI 2007, 3-5 September 2007, Grenoble, France. IOS Press 2007, ISBN 978-1-58603-845-8 [contents] - 2006
- [c15]Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier, Jean-Luc Richier:
A Test Calculus Framework Applied to Network Security Policies. FATES/RV 2006: 55-69 - [c14]Vianney Darmaillacq, Jean-Claude Fernandez, Roland Groz, Laurent Mounier, Jean-Luc Richier:
Test Generation for Network Security Rules. TestCom 2006: 341-356 - 2003
- [c13]Karim Berkani, Rémy Cave, Sophie Coudert, Francis Klay, Pascale Le Gall, Farid Ouabdesselam, Jean-Luc Richier:
An Environment for Interactive Service Specification. FIW 2003: 25-41 - [c12]Lydie du Bousquet, Farid Ouabdesselam, Jean-Luc Richier, Nicolas Zuanon:
Testing Against Some Eventuality Properties of Synchronous Software: A Case Study. SLAP 2003: 105-121 - 2000
- [j1]Lydie du Bousquet, Farid Ouabdesselam, Jean-Luc Richier, Nicolas Zuanon:
Feature interaction detection using a synchronous approach and testing. Comput. Networks 32(4): 419-431 (2000)
1990 – 1999
- 1999
- [c11]Lydie du Bousquet, Farid Ouabdesselam, Jean-Luc Richier, Nicolas Zuanon:
Lutess: A Specification-Driven Testing Environment for Synchronous Software. ICSE 1999: 267-276 - 1998
- [c10]Lydie du Bousquet, Farid Ouabdesselam, Jean-Luc Richier, Nicolas Zuanon:
Incremental Feature Validation: a Synchronous Point of View. FIW 1998: 262-275 - [c9]Lydie du Bousquet, Farid Ouabdesselam, Jean-Luc Richier:
Expressing and implementing operational profiles for reactive software validation. ISSRE 1998: 222-230 - [c8]Lydie du Bousquet, Farid Ouabdesselam, Ioannis Parissis, Jean-Luc Richier, Nicolas Zuanon:
Lutess: a testing environment for synchronous software. Tool Support for System Specification, Development and Verification 1998: 48-61 - 1992
- [c7]Marc Chérèque, David Powell, Philippe Reynier, Jean-Luc Richier, Jacques Voiron:
Active Replication in Delta-4. FTCS 1992: 28-37 - 1990
- [c6]Mário Baptista, Susanne Graf, Jean-Luc Richier, Luís E. T. Rodrigues, Carlos Rodriguez, Paulo Veríssimo, Jacques Voiron:
Formal Specification and Verification of a Network Independent Atomic Multicast Protocol. FORTE 1990: 345-352 - [c5]Xavier Nicollin, Jean-Luc Richier, Joseph Sifakis, Jacques Voiron:
ATP: an Algebra for Timed Processes. Programming Concepts and Methods 1990: 415-442
1980 – 1989
- 1989
- [c4]Susanne Graf, Jean-Luc Richier, Carlos Rodriguez, Jacques Voiron:
What are the Limits of Model Checking Methods for the Verification of Real Life Protocols? Automatic Verification Methods for Finite State Systems 1989: 275-285 - 1987
- [c3]Jean-Luc Richier, Carlos Rodríguez, Joseph Sifakis, Jacques Voiron:
Verification in XESAR of the Sliding Window Protocol. PSTV 1987: 235-248 - 1985
- [c2]Jean-Claude Fernandez, Jean-Luc Richier, Jacques Voiron:
Verification of protocol specificaitons using the CESAR system. PSTV 1985: 71-90 - [c1]Jean-Luc Richier:
Distributed Termination in CSP: Symmetric Solutions with Minimal Storage. STACS 1985: 267-278
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-23 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint