var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=http%3A%2F%2Fwww.cas.mcmaster.ca%2F%7Ekhedri%2Fwp-content%2Fuploads%2FBIBLIOGRAPHY%2Fcvbib.bib&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=http%3A%2F%2Fwww.cas.mcmaster.ca%2F%7Ekhedri%2Fwp-content%2Fuploads%2FBIBLIOGRAPHY%2Fcvbib.bib&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=http%3A%2F%2Fwww.cas.mcmaster.ca%2F%7Ekhedri%2Fwp-content%2Fuploads%2FBIBLIOGRAPHY%2Fcvbib.bib&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2016\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Conto: A protege plugin for configuring ontologies.\n \n \n \n\n\n \n Leclair, A.; and Khedri, R.\n\n\n \n\n\n\n In Proceedings of the 7th International Conference on Ambient Systems, Networks and Technologies (ANT-2016), of Procedia Computer Science, pages 15, Madrid, Spain, May 23 – 26 2016. Elsevier\n (Submitted on January 31, 2016) \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LeclairKhedri2016,\n\tAuthor = {Andrew Leclair and Ridha Khedri },\n\tTitle = {Conto: A protege plugin for configuring ontologies},\n\tBooktitle = {Proceedings of the 7th International Conference on Ambient Systems, Networks and Technologies (ANT-2016)},\n\tAddress = {Madrid, Spain},\n\tOPTEditor = {},\n\tMonth = {May 23 -- 26},\n\tPages = {15},\n\tSeries = {Procedia Computer Science},\n\tOPTVolume = {},\n\tPublisher = {Elsevier},\n\tNote = {(Submitted on January 31, 2016) },\n\tYear = {2016}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Towards an Architectural Framework for Systematically Designing Ontologies.\n \n \n \n\n\n \n Jaskolka, J.; Maccaull, W.; and Khedri, R.\n\n\n \n\n\n\n Journal of Knowledge and Information Systems,1–27. 2016.\n (Submitted on November 10, 2015)\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{JaskolkaMaccaullKhedri2016,\n  author = {Jason Jaskolka and Wendy Maccaull and Ridha Khedri},\n  title = {Towards an Architectural Framework for Systematically Designing Ontologies},\n  journal = {Journal of Knowledge and Information Systems},\n  pages = {1--27},\n  Publisher = {Springer},\n  Note= {(Submitted on November 10, 2015)},\n  year = {2016}\n}\n\n%------------------------------------------------------\n%---------------------- Published 2015 -------\n%------------------------------------------------------\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On the Weaving Process of Aspect-Oriented Product Family Algebra.\n \n \n \n \n\n\n \n Zhang, Q.; and Khedri, R.\n\n\n \n\n\n\n Journal of Logical and Algebraic Methods in Programming, 85(1, Part 2): 146 – 172. January 2016.\n Special Issue on Formal Methods for Software Product Line Engineering\n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ZhangKhedri2014,\n  author = {Qinglei Zhang and Ridha Khedri},\n  title = {On the Weaving Process of Aspect-Oriented Product Family Algebra},\n  journal = {Journal of Logical and Algebraic Methods in Programming},\n  pages = {146 -- 172},\n  volume = {85},\n  number = {1, Part 2},\n  Publisher = {Elsevier},\n  url = {http://dx.doi.org/10.1016/j.jlamp.2015.08.004},\n  OPTNote= {\\url{http://dx.doi.org/10.1016/j.jlamp.2015.08.004} (Submitted on July 16, 2014. Accepted on January 16, 2015)},\n  Note= {Special Issue on Formal Methods for Software Product Line Engineering},\n  Month = {January},\n  year = {2016}\n}\n%-------\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Mitigating Covert Channels Based on Analysis of the Potential for Communication.\n \n \n \n\n\n \n Jaskolka, J.; and Khedri, R.\n\n\n \n\n\n\n Theoretical Computer Science,1-40. 2016.\n (Submitted on December 10, 2014. Revised on March 18, 2015. Accepted in January 2016. To Appear.)\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{JaskolkaKhedriTCS2014,\n\tAbstract = {The existence and usage of covert channels in systems of communicating agents poses a significant threat to the confidentiality of information. It is difficult to fully prevent the possibility of covert channels in a system without limiting the communication between its components or negatively affecting its behaviour. However, by developing an understanding of when a covert channel may exist in a given system and which agents are more prone to covert channels than others, approaches for mitigating covert channels can be developed in such a way that they are able to preserve overall system behaviours and the communication between its components and with its environment. In this paper, we propose an approach for mitigating covert channels in systems of communicating agents based on an analysis of the potential for communication amongst system agents. First, we propose a mathematical framework for communication and concurrency called Communicating Concurrent Kleene Algebra (C2KA). We use the proposed mathematical framework of C2KA to present a formulation of the potential for communication condition for covert channel existence. Then, we show how to use the proposed formulation and its mathematical background to analyse systems of communicating agents in order to devise an approach for modifying the behaviours of agents in a system of communicating agents in order to eliminate the potential for communication, thus eliminating the potential for a covert channel, while still preserving the overall system behaviour. Using an illustrative example, we show how to specify a system of communicating agents using the mathematical framework on C2KA and we demonstrate and discuss the proposed mitigation approach. We also report on the use of a prototype tool that supports the automated verification and analysis of the potential for communication condition for covert channel existence.},\n\tOPTAnnote = {\\\\ Submitted: Revision 1696 (\\textit{Submitted: December 10, 2014})},\n\tAuthor = {Jason Jaskolka and Ridha Khedri},\n\tJournal = {Theoretical Computer Science},\n\tPages = {1-40},\n\tTitle = {Mitigating Covert Channels Based on Analysis of the Potential for Communication},\n  Note= {(Submitted on December 10, 2014. Revised on March 18, 2015.  Accepted in January 2016. To Appear.)},\n\tYear = {2016}\n}\n\n%-------\n
\n
\n\n\n
\n The existence and usage of covert channels in systems of communicating agents poses a significant threat to the confidentiality of information. It is difficult to fully prevent the possibility of covert channels in a system without limiting the communication between its components or negatively affecting its behaviour. However, by developing an understanding of when a covert channel may exist in a given system and which agents are more prone to covert channels than others, approaches for mitigating covert channels can be developed in such a way that they are able to preserve overall system behaviours and the communication between its components and with its environment. In this paper, we propose an approach for mitigating covert channels in systems of communicating agents based on an analysis of the potential for communication amongst system agents. First, we propose a mathematical framework for communication and concurrency called Communicating Concurrent Kleene Algebra (C2KA). We use the proposed mathematical framework of C2KA to present a formulation of the potential for communication condition for covert channel existence. Then, we show how to use the proposed formulation and its mathematical background to analyse systems of communicating agents in order to devise an approach for modifying the behaviours of agents in a system of communicating agents in order to eliminate the potential for communication, thus eliminating the potential for a covert channel, while still preserving the overall system behaviour. Using an illustrative example, we show how to specify a system of communicating agents using the mathematical framework on C2KA and we demonstrate and discuss the proposed mitigation approach. We also report on the use of a prototype tool that supports the automated verification and analysis of the potential for communication condition for covert channel existence.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Towards an Architectural Framework for Systematically Designing Ontologies.\n \n \n \n\n\n \n Jaskolka, J.; Maccaull, W.; and Khedri, R.\n\n\n \n\n\n\n Technical Report CAS-15-09-RK, McMaster University, November 2015.\n Available: http://www.cas.mcmaster.ca/cas/0reports/CAS-15-09-RK.pdf\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{JaskolkaMaccaullKhedri2015TR,\n  \tAuthor = {Jason Jaskolka and Wendy Maccaull and Ridha Khedri},\n  \tTitle = {Towards an Architectural Framework for Systematically Designing Ontologies},\n\tInstitution = {McMaster University},\n\tMonth = {November},\n\tNote = {Available: http://www.cas.mcmaster.ca/cas/0reports/CAS-15-09-RK.pdf},\n\tNumber = {CAS-15-09-RK},\n\tPages ={1--27},\n  \tYear = {2015}\n}\n\n%-----\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n The Interchange Format of Tabular Expressions Using XML.\n \n \n \n\n\n \n Huang, M.; Chen, Y.; Khedri, R.; and Miao, H.\n\n\n \n\n\n\n In Proceedings of the 5th International Workshop on SOFL + MSVL , of Lecture Notes in Computer Science, pages 14, Las Vegas, USA, 2015. Springer Berlin / Heidelberg\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{HuangChenKhedriMiao2015,\n\tAddress = {Las Vegas, USA},\n\tAuthor = {Mao Huang and  Yihai Chen and Ridha Khedri and Huaikou Miao },\n\tTitle = {The Interchange Format of Tabular Expressions Using XML},\n\tBooktitle = {Proceedings of the  5th International Workshop on {SOFL + MSVL} },\n\tSeries = {Lecture Notes in Computer Science},\n   \tOPTeditor = {}, \n   \tPublisher = {Springer Berlin / Heidelberg},\n   \tPages = {14},\n   \tVolume = {},\n\tOPTNote = {To appear},\n   \tYear = {2015}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Towards an Ontology Design Architecture.\n \n \n \n\n\n \n Jaskolka, J.; MacCaull, W.; and Khedri, R.\n\n\n \n\n\n\n In Proceedings of the 2015 International Conference on Computational Science and Computational Intelligence (CSCI'15), pages 4, Las Vegas, USA, December 7–9 2015. IEEE Computer Society Conference Publishing Services\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{JaskolkaMaccaullKhedri2015,\n\tAddress = {Las Vegas, USA},\n\tAuthor = {Jason Jaskolka and Wendy MacCaull and Ridha Khedri },\n\tBooktitle = {Proceedings of the 2015 International Conference on Computational Science and Computational Intelligence (CSCI'15)},\n\tOPTEditor = {},\n\tMonth = {December 7--9},\n\tPages = {4},\n\tOPTSeries = {},\n\tTitle = {Towards an Ontology Design Architecture},\n\tOPTVolume = {},\n\tPublisher = {IEEE Computer Society Conference Publishing  Services},\n\tYear = {2015}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Towards the Certification of Covert Channel Freeness in Cloud-Based Systems.\n \n \n \n\n\n \n Jaskolka, J.; and Khedri, R.\n\n\n \n\n\n\n In Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies, volume 52, of Procedia Computer Science, pages 318–325, London, United Kingdom, June 2-5 2015. Elsevier\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{JaskolkaKhedri2015,\n\tAddress = {London, United Kingdom},\n\tAuthor = {Jason Jaskolka and Ridha Khedri },\n\tBooktitle = {Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies},\n\tOPTEditor = {},\n\tMonth = {June 2-5},\n\tPages = {318--325},\n\tSeries = {Procedia Computer Science},\n\tTitle = {Towards the Certification of Covert Channel Freeness in Cloud-Based Systems},\n\tVolume = {52},\n\tPublisher = {Elsevier},\n\tYear = {2015}\n}\n\n%-------------\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Multidimensional Approach Towards a Quantitative Assessment of Security Threats.\n \n \n \n\n\n \n Jouini, M.; Ben~Arfa~Rabai, L.; and Khedri, R.\n\n\n \n\n\n\n In Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies, volume 52, of Procedia Computer Science, pages 507– 514, London, United Kingdom, June 2-5 2015. Elsevier\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{JouiniBenArfaRabaiKhedri2015,\n\tAddress = {London, United Kingdom},\n\tAuthor = {Mouna Jouini and Latifa Ben~Arfa~Rabai and Ridha Khedri},\n\tBooktitle = {Proceedings of the 6th International Conference on Ambient Systems, Networks and Technologies},\n\tOPTEditor = {},\n\tMonth = {June 2-5},\n\tPages = {507-- 514},\n\tSeries = {Procedia Computer Science},\n\tTitle = {Multidimensional Approach Towards a Quantitative Assessment of Security Threats},\n\tVolume = {52},\n\tPublisher = {Elsevier},\n\tYear = {2015}\n}\n\n%-------------\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Investigative Support for Information Confidentiality.\n \n \n \n\n\n \n Jaskolka, J.; Khedri, R.; and Sabri, K. E.\n\n\n \n\n\n\n Journal of Ambient Intelligence and Humanized Computing, 6(4): 425 – 451. August 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{JaskolkaKhedriJAIHC2014,\n\tAbstract = {With the emergence of computers in daily activities and with the ever-growing complexity of communication networks and protocols, covert channels are becoming an eminent threat to the confidentiality of information. In light of this threat, we propose a technique to detect confidential information leakage via protocol-based covert channels. Although several works examine covert channel detection and analysis from the perspective of information theory by, for instance, analysing channel capacities, we propose a different technique that tackles the problem from a different perspective. The proposed technique takes an algebraic approach using relations. It provides tests to verify the existence of a leakage of information via a monitored covert channel. It also provides computations which show how the information was leaked if a leakage exists. We also report on a prototype tool that allows for the automation of the proposed technique.\n\nWe limit our focus to protocol-based covert channels and instances where the users of covert channels modulate the information that is being sent; either by encryption, or some other form of encoding. We also discuss possible applications of the proposed technique in digital forensics and cryptanalysis.},\n\tOPTAnnote = {\\\\ Submitted: Revision 1690 (\\textit{Submitted: December 8, 2014})},\n\tAuthor = {Jason Jaskolka and Ridha Khedri and Khair Eddin Sabri},\n\tTitle = {Investigative Support for Information Confidentiality},\n\tJournal = {Journal of Ambient Intelligence and Humanized Computing},\n\tPages = {425 -- 451},\n\tPublisher = {Elsevier},\n\tvolume = {6},\n\tnumber= {4},\n\tmonth = {August},\n        OPTNote= {(Submitted on December 08, 2014. Accepted on April 26, 2015. To Appear. This paper is an extended version of~[12] and~[13] that has been invited for submission in a Special Issue of the journal.)},\n\tYear = {2015}\n}\n\n\n\n%------------------------------------------------------\n%---------------------- Published 2014 -------\n%------------------------------------------------------\n\n
\n
\n\n\n
\n With the emergence of computers in daily activities and with the ever-growing complexity of communication networks and protocols, covert channels are becoming an eminent threat to the confidentiality of information. In light of this threat, we propose a technique to detect confidential information leakage via protocol-based covert channels. Although several works examine covert channel detection and analysis from the perspective of information theory by, for instance, analysing channel capacities, we propose a different technique that tackles the problem from a different perspective. The proposed technique takes an algebraic approach using relations. It provides tests to verify the existence of a leakage of information via a monitored covert channel. It also provides computations which show how the information was leaked if a leakage exists. We also report on a prototype tool that allows for the automation of the proposed technique. We limit our focus to protocol-based covert channels and instances where the users of covert channels modulate the information that is being sent; either by encryption, or some other form of encoding. We also discuss possible applications of the proposed technique in digital forensics and cryptanalysis.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Envisioning a Requirements Specification Template for Medical Device Software.\n \n \n \n\n\n \n Wang, H.; Chen, Y.; Khedri, R.; and Wassyng, A.\n\n\n \n\n\n\n In et al. , A. J., editor(s), The 15th International Conference of Product Focused Software Development and Process Improvement (PROFES 2014) , volume 8892, of Lecture Notes in Computer Science, pages 209 – 223, 2014. Springer International Publishing Switzerland\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{WangChenKhedriWassyng2014,\n\tAbstract = {In many health jurisdictions, software is considered to be {\\it medical device software\\/} (MDS), when it is used to analyze patient data in order to render a diagnosis or monitor the patient's health; when it is to be used by a patient to diagnose an ailment; or when it is used to deliver functionality for a medical device. Flaws in MDS  can result in patient harm, including death.\nLegislators and regulatory agencies publish guidelines and regulatory standards that are aimed at ensuring the safety, security and dependability of MDS. These guidelines and standards universally agree that a complete and consistent requirement specification is vital to the success of medical device software. Moreover, we observe that regulators are shifting from being {\\it process focused} to being {\\it product focused} in their approval guidance.  In this paper, we review challenges associated with requirements used in the development of MDS, current standards and guidelines relevant to MDS, and existing templates for requirement specifications. We then propose a set of design objectives for a `good' MDS requirements template and propose a template structure for MDS requirement specification fulfilling all the design objectives. Our template is, by design, tailored to facilitate the gathering and documenting of high quality requirements for MDS. \n},\n\tAuthor = {Hao Wang and Yihai Chen and Ridha Khedri and Alan Wassyng},\n\tBooktitle = {The 15th International Conference of Product Focused Software Development and Process Improvement (PROFES 2014) },\n\tTitle = {Envisioning a Requirements Specification Template for Medical Device Software},\n  \tSeries = {Lecture Notes in Computer Science},\n   \tEditor = {A. Jedlitschka et al.}, \n   \tPublisher = {Springer International Publishing Switzerland},\n   \tPages = {209 -- 223},\n   \tVolume = {8892},\n   \tYear = {2014}\n}\n\n\n%-------\n
\n
\n\n\n
\n In many health jurisdictions, software is considered to be ıt medical device software\\/ (MDS), when it is used to analyze patient data in order to render a diagnosis or monitor the patient's health; when it is to be used by a patient to diagnose an ailment; or when it is used to deliver functionality for a medical device. Flaws in MDS can result in patient harm, including death. Legislators and regulatory agencies publish guidelines and regulatory standards that are aimed at ensuring the safety, security and dependability of MDS. These guidelines and standards universally agree that a complete and consistent requirement specification is vital to the success of medical device software. Moreover, we observe that regulators are shifting from being ıt process focused to being ıt product focused in their approval guidance. In this paper, we review challenges associated with requirements used in the development of MDS, current standards and guidelines relevant to MDS, and existing templates for requirement specifications. We then propose a set of design objectives for a `good' MDS requirements template and propose a template structure for MDS requirement specification fulfilling all the design objectives. Our template is, by design, tailored to facilitate the gathering and documenting of high quality requirements for MDS. \n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Formulation of the Potential for Communication Condition using C$^2$KA.\n \n \n \n\n\n \n Jaskolka, J.; and Khedri, R.\n\n\n \n\n\n\n In Peron, A.; and Piazza, C., editor(s), Proceedings of the 5th International Symposium on Games, Automata, Logics and Formal Verification, volume 161, of Electronic Proceedings in Theoretical Computer Science, pages 161-174. Open Publishing Association, Verona, Italy, September 2014.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{Jaskolka2014ac,\n\tAbstract = {An integral part of safeguarding systems of communicating agents from covert channel communication is having the ability to identify when a covert channel may exist in a given system and which agents are more prone to covert channels than others. In this paper, we propose a formulation of one of the necessary conditions for the existence of covert channels: the potential for communication condition. Then, we discuss when the potential for communication is preserved after the modification of system agents in a potential communication path. Our approach is based on the mathematical framework of Communicating Concurrent Kleene Algebra (C2KA). While existing approaches only consider the potential for communication via shared environments, the approach proposed in this paper also considers the potential for communication via external stimuli.},\n\tAddress = {Verona, Italy},\n\tAuthor = {Jason Jaskolka and Ridha Khedri},\n\tBooktitle = {Proceedings of the 5th International Symposium on Games, Automata, Logics and Formal Verification},\n\tEditor = {Adriano Peron and Carla Piazza},\n\tMonth = {September},\n\tPages = {161-174},\n\tPublisher = {Open Publishing Association},\n\tSeries = {Electronic Proceedings in Theoretical Computer Science},\n\tTitle = {A Formulation of the Potential for Communication Condition using {C$^2$KA}},\n\tVolume = {161},\n\tYear = {2014}\n}\n\n%-------\n
\n
\n\n\n
\n An integral part of safeguarding systems of communicating agents from covert channel communication is having the ability to identify when a covert channel may exist in a given system and which agents are more prone to covert channels than others. In this paper, we propose a formulation of one of the necessary conditions for the existence of covert channels: the potential for communication condition. Then, we discuss when the potential for communication is preserved after the modification of system agents in a potential communication path. Our approach is based on the mathematical framework of Communicating Concurrent Kleene Algebra (C2KA). While existing approaches only consider the potential for communication via shared environments, the approach proposed in this paper also considers the potential for communication via external stimuli.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Investigative Support for Information Confidentiality Part I: Detecting Confidential Information Leakage via Protocol-Based Covert Channels.\n \n \n \n\n\n \n Jaskolka, J.; Khedri, R.; and Sabri, K. E.\n\n\n \n\n\n\n In Proceedings of the 9th International Conference on Future Networks and Communications, volume 34, of Procedia Computer Science, FNC 2014 and MobiSPC 2014, pages 276 - 285, Niagara Falls, ON, Canada, August 2014. \n \\textbf(Invited Paper)\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{Jaskolka2014ad,\n\tAbstract = {This is Part I in a two-part series discussing the development of investigative support for information confidentiality. In this paper, we propose a technique to detect confidential information leakage via protocol-based covert channels based on relation algebra. It provides tests to verify the existence of an information leakage via a monitored covert channel as well as computations which show how the information was leaked if a leakage exists. We also report on a prototype tool that allows for the automation of the proposed technique. Our focus is limited to protocol-based covert channels and instances where covert channel users modulate the sent information by some form of encoding such as encryption.},\n\tAddress = {Niagara Falls, ON, Canada},\n\tAuthor = {Jason Jaskolka and Ridha Khedri and Khair Eddin Sabri},\n\tBooktitle = {Proceedings of the 9th International Conference on Future Networks and Communications},\n\tMonth = {August},\n\tNote = {\\textbf{\\textit{(Invited Paper)}}},\n\tPages = {276 - 285},\n\tSeries = {Procedia Computer Science, FNC 2014 and MobiSPC 2014},\n\tTitle = {Investigative Support for Information Confidentiality Part {I}: Detecting Confidential Information Leakage via Protocol-Based Covert Channels},\n\tVolume = {34},\n\tYear = {2014}\n}\n\n%-------\n
\n
\n\n\n
\n This is Part I in a two-part series discussing the development of investigative support for information confidentiality. In this paper, we propose a technique to detect confidential information leakage via protocol-based covert channels based on relation algebra. It provides tests to verify the existence of an information leakage via a monitored covert channel as well as computations which show how the information was leaked if a leakage exists. We also report on a prototype tool that allows for the automation of the proposed technique. Our focus is limited to protocol-based covert channels and instances where covert channel users modulate the sent information by some form of encoding such as encryption.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Investigative Support for Information Confidentiality Part II: Applications in Cryptanalysis and Digital Forensics.\n \n \n \n\n\n \n Jaskolka, J.; Khedri, R.; and Sabri, K. E.\n\n\n \n\n\n\n In Proceedings of the 9th International Conference on Future Networks and Communications, volume 34, of Procedia Computer Science, FNC 2014 and MobiSPC 2014, pages 266 - 275, Niagara Falls, ON, Canada, August 2014. \n \\textbf(Invited Paper)\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{Jaskolka2014ae,\n\tAbstract = {This is Part II in a two-part series discussing the development of investigative support for information confidentiality. In Part I, we proposed a technique based on relation algebra to detect confidential information leakage via protocol-based covert channels. In this paper, we continue developing investigative support for information confidentiality. We examine the application of the technique for detecting confidential information leakage proposed in Part I in cryptanalysis and digital forensics to highlight its usefulness beyond the scope of covert channel analysis. By way of a short case study, we show the automation of the cryptanalysis application of the technique for detecting confidential information leakage using a prototype tool and a known-plaintext attack.},\n\tAddress = {Niagara Falls, ON, Canada},\n\tAuthor = {Jason Jaskolka and Ridha Khedri and Khair Eddin Sabri},\n\tBooktitle = {Proceedings of the 9th International Conference on Future Networks and Communications},\n\tMonth = {August},\n\tNote = {\\textbf{\\textit{(Invited Paper)}}},\n\tPages = {266 - 275},\n\tSeries = {Procedia Computer Science, FNC 2014 and MobiSPC 2014},\n\tTitle = {Investigative Support for Information Confidentiality Part {II}: Applications in Cryptanalysis and Digital Forensics},\n\tVolume = {34},\n\tYear = {2014}\n}\n\n  \n\n%-------\n
\n
\n\n\n
\n This is Part II in a two-part series discussing the development of investigative support for information confidentiality. In Part I, we proposed a technique based on relation algebra to detect confidential information leakage via protocol-based covert channels. In this paper, we continue developing investigative support for information confidentiality. We examine the application of the technique for detecting confidential information leakage proposed in Part I in cryptanalysis and digital forensics to highlight its usefulness beyond the scope of covert channel analysis. By way of a short case study, we show the automation of the cryptanalysis application of the technique for detecting confidential information leakage using a prototype tool and a known-plaintext attack.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Endowing Concurrent Kleene Algebra with Communication Actions.\n \n \n \n\n\n \n Jaskolka, J.; Khedri, R.; and Zhang, Q.\n\n\n \n\n\n\n In et al. , P. H., editor(s), 14th International Conference on Relational and Algebraic Methods in Computer Science (RAMiCS 2014), volume 8428, of Lecture Notes in Computer Science, pages 19 – 36, 2014. Springer International Publishing Switzerland\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{JaskolkaKhedriZhang2014,\n\tAuthor = {Jason Jaskolka and Ridha Khedri and Qinglei Zhang},\n\tBooktitle = {14th International Conference on Relational and Algebraic Methods in Computer Science (RAMiCS 2014)},\n\tTitle = {Endowing Concurrent {Kleene} Algebra with Communication Actions},\n   series = {Lecture Notes in Computer Science},\n   editor = {P. H�fner et al.}, \n   publisher = {Springer International Publishing Switzerland},\n   pages = {19 -- 36},\n   volume = {8428},\n   year = {2014}\n}\n%RAMICS Month = {27 April -- 1 May},\n\n\n%------------------------------------------------------\n%---------------------- Published 2013 -------\n%------------------------------------------------------\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An Aspect-Oriented Language for Feature-Modeling.\n \n \n \n\n\n \n Zhang, Q.; Khedri, R.; and Jaskolka, J.\n\n\n \n\n\n\n Journal of Ambient Intelligence and Humanized Computing, 5: 343 – 356. 2014.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ZhangKhedriJaskolka2013,\n  author = {Qinglei Zhang and Ridha Khedri and Jason Jaskolka},\n  title = {An Aspect-Oriented Language for Feature-Modeling},\n  journal = {Journal of Ambient Intelligence and Humanized Computing},\n  pages = {343 -- 356},\n  volume = 5,\n  Publisher = {Springer},\n  ORTNote= {(Published online: 23 July 2013)},\n  year = {2014}\n}\n\n%-------\n\n%------------------------------------------------------\n%---------------------- Published 2012 -------\n%------------------------------------------------------\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Foundations of Communicating Concurrent Kleene Algebra.\n \n \n \n\n\n \n Jaskolka, J.; Khedri, R.; and Zhang, Q.\n\n\n \n\n\n\n Technical Report CAS-13-07-RK, McMaster University, November 2013.\n Available: http://www.cas.mcmaster.ca/cas/0reports/CAS-13-01-RK.pdf\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{JaskolkaKhedriZhang2013TR,\n\tAuthor = {Jason Jaskolka and Ridha Khedri and Qinglei Zhang},\n\tInstitution = {McMaster University},\n\tMonth = {November},\n\tNote = {Available: http://www.cas.mcmaster.ca/cas/0reports/CAS-13-01-RK.pdf},\n\tNumber = {CAS-13-07-RK},\n\tTitle = {Foundations of Communicating Concurrent Kleene Algebra},\n\tPages ={32},\n\tYear = {2013}}\n\n\n%-------\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Preface.\n \n \n \n\n\n \n Khedri, R.; and Djouani, K.\n\n\n \n\n\n\n In the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, volume 21, of Procedia Computer Science, pages 7 – 8, October 2013. Elsevier\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{KhedriDjouani2013,\n\tAuthor = {Ridha Khedri and Karim Djouani},\n\tBooktitle = {the  4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks},\n\tSeries = {Procedia Computer Science},\n\tMonth = {October},\n\tPages = {7 -- 8},\n\tTitle = {Preface},\n        Publisher = {Elsevier},\n\tvolume = {21},\n\tYear = {2013}\n}\n\n%-------\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An Algebraic Approach for Data Cleansing.\n \n \n \n\n\n \n Khedri, R.; Chiang, F.; and Sabri, K. E.\n\n\n \n\n\n\n In the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, volume 21, of Procedia Computer Science, pages 50 – 59, October 2013. Procedia Computer Science\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{KhedriChiangSabri2013,\n\tAuthor = {Ridha Khedri and Fei Chiang and Khair Eddin Sabri},\n\tBooktitle = {the  4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks},\n\tSeries = {Procedia Computer Science},\n\tMonth = {October},\n\tPages = {50 -- 59},\n\tTitle = {An Algebraic Approach for Data Cleansing},\n\tPublisher = {Procedia Computer Science},\n\tvolume = {21},\n\tYear = {2013}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Proofs of the convergence of the rewriting system for the weaving of aspects in the AO-PFA language.\n \n \n \n\n\n \n Zhang, Q.; and Khedri, R.\n\n\n \n\n\n\n Technical Report CAS-13-01-RK, McMaster University, April 2013.\n Available: http://www.cas.mcmaster.ca/cas/0reports/CAS-13-01-RK.pdf\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{ZhangKhedri2013TR,\n\tAuthor = {Qinglei Zhang and Ridha Khedri},\n\tInstitution = {McMaster University},\n\tMonth = {April},\n\tNote = {Available: http://www.cas.mcmaster.ca/cas/0reports/CAS-13-01-RK.pdf},\n\tNumber = {CAS-13-01-RK},\n\tTitle = {Proofs of the convergence of the rewriting system for the weaving of aspects in the AO-PFA language},\n\tPages ={32},\n\tYear = {2013}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes.\n \n \n \n\n\n \n Sabri, K. E.; and Khedri, R.\n\n\n \n\n\n\n In et al. , J. G., editor(s), Foundations and Practice of Security Symposium, volume 7743, of Lecture Notes in Computer Science, pages 62 – 77. Springer Berlin / Heidelberg, 2013.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{SabriKhedri2013,\n    author = {Khair Eddin Sabri and Ridha Khedri},\n   title = {A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes},\n   booktitle = {Foundations and Practice of Security Symposium},\n   series = {Lecture Notes in Computer Science},\n   editor = {J. Garcia-Alfaro et al.}, \n   publisher = {Springer Berlin / Heidelberg},\n   pages = {62 -- 77},\n   volume = {7743},\n   year = {2013}\n}\n\n%-------------\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n An Aspect-Oriented Language for Product Family Specification.\n \n \n \n\n\n \n Zhang, Q.; Khedri, R.; and Jaskolka, J.\n\n\n \n\n\n\n In Shakshuki, E.; and Younas, M., editor(s), Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies, volume 10, of Procedia Computer Science, pages 482 – 489, Niagara Falls, Ontario, Canada, August 2012. Elsevier\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ZhangKhedriJaskolka2012a,\n\tAddress = {Niagara Falls, Ontario, Canada},\n\tAuthor = {Qinglei Zhang and Ridha Khedri and Jason Jaskolka},\n\tBooktitle = {Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies},\n\tEditor = {E. Shakshuki and M. Younas},\n\tMonth = {August},\n\tPages = {482 -- 489},\n\tSeries = {Procedia Computer Science},\n\tTitle = {An Aspect-Oriented Language for Product Family Specification},\n\tVolume = {10},\n\tPublisher = {Elsevier},\n\tYear = {2012}\n}\n\n%-------------\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Verification of Aspectual Composition in Feature-Modeling.\n \n \n \n\n\n \n Zhang, Q.; Khedri, R.; and Jaskolka, J.\n\n\n \n\n\n\n In Eleftherakis, G.; Hinchey, M.; and Holcombe, M., editor(s), Software Engineering and Formal Methods, volume 7504, of Lecture Notes in Computer Science, pages 109 – 125. Springer Berlin / Heidelberg, 2012.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{ZhangKhedriJaskolka2012b,\n   author = {Qinglei Zhang and Ridha Khedri and Jason Jaskolka}, \n   title = {Verification of Aspectual Composition in Feature-Modeling},\n   booktitle = {Software Engineering and Formal Methods},\n   series = {Lecture Notes in Computer Science},\n   editor = {George Eleftherakis and Mike Hinchey and Mike Holcombe},\n   publisher = {Springer Berlin / Heidelberg},\n   isbn = {978-3-642-33825-0},\n   OPTkeyword = {Computer Science},\n   pages = {109 -- 125},\n   volume = {7504},\n   OPTurl = {http://dx.doi.org/10.1007/978-3-642-33826-7_8},\n   OPTnote = {10.1007/978-3-642-33826-7_8},\n   year = {2012}\n}\n\n%-------------\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n On the Necessary Conditions for Covert Channel Existence: A State-of-the-Art Survey.\n \n \n \n\n\n \n Jaskolka, J.; Khedri, R.; and Zhang, Q.\n\n\n \n\n\n\n In Shakshuki, E.; and Younas, M., editor(s), Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies, volume 10, of Procedia Computer Science, pages 458 – 465, Niagara Falls, Ontario, Canada, August 2012. Elsevier\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{JaskolkaKhedriZhang2012a,\n\tAddress = {Niagara Falls, Ontario, Canada},\n\tAuthor = {Jason Jaskolka and Ridha Khedri and Qinglei Zhang},\n\tBooktitle = {Proceedings of the 3rd International Conference on Ambient Systems, Networks and Technologies},\n\tEditor = {E. Shakshuki and M. Younas},\n\tMonth = {August},\n\tPages = {458 -- 465},\n\tSeries = {Procedia Computer Science},\n\tTitle = {On the Necessary Conditions for Covert Channel Existence: A State-of-the-Art Survey},\n\tPublisher = {Elsevier},\n\tVolume = {10},\n\tYear = {2012}\n}\n\n%-------------\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Optimization in Computer Engineering–Theory and Applications: Book Review of Chapter 8 – Applying Graph Coloring to Frequency Assignment.\n \n \n \n\n\n \n Khedri, R.\n\n\n \n\n\n\n Journal of Software Engineering and Applications, 5(3): 109 – 109. May 2012.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Khedri2012,\n\tAuthor = {Ridha Khedri},\n\tDate-Modified = {2012-05-07 21:58:46 +0000},\n\tJournal = {Journal of Software Engineering and Applications},\n\tMonth = {May},\n\tNumber = {3},\n\tPages = {109 -- 109},\n\tTitle = {{Optimization in Computer Engineering--Theory and Applications: Book Review of Chapter 8 -- Applying Graph Coloring to Frequency Assignment}},\n\tVolume = {5},\n\tYear = {2012}}\n\n\n%------------------------------------------------------\n%---------------------- Published 2011 -------\n%------------------------------------------------------\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Relational Technique for Detecting Information Leakage via Protocol-Based Covert Channels.\n \n \n \n\n\n \n Jaskolka, J.; Khedri, R.; and Sabri, K. E.\n\n\n \n\n\n\n ACM Transactions on Information and System Security (TISSEC),1 – 30. 2012.\n Submitted: December 16, 2011\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{JaskolkaKhedriSabri2011J,\n\tAuthor = {Jason Jaskolka and Ridha Khedri and Khair Eddin Sabri},\n\tDate-Added = {2012-01-02 08:00:45 -0500},\n\tDate-Modified = {2012-01-02 08:03:46 -0500},\n\tJournal = {ACM Transactions on Information and System Security (TISSEC)},\n\tNote = {Submitted: December 16, 2011},\n\tPages = {1 -- 30},\n\tTitle = {A Relational Technique for Detecting Information Leakage via Protocol-Based Covert Channels},\n\tYear = {2012}}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Aspect-Oriented Language Based on Product Family Algebra: Aspects Specification and Verification.\n \n \n \n\n\n \n Zhang, Q.; Khedri, R.; and Jaskolka, J.\n\n\n \n\n\n\n Technical Report CAS-11-08-RK, McMaster University, August 2011.\n Available: http://www.cas.mcmaster.ca/cas/0reports/CAS-11-08-RK.pdf\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{ZhangKhedriJaskolka2011TR,\n\tAuthor = {Qinglei Zhang and Ridha Khedri and Jason Jaskolka},\n\tInstitution = {McMaster University},\n\tMonth = {August},\n\tNote = {Available: http://www.cas.mcmaster.ca/cas/0reports/CAS-11-08-RK.pdf},\n\tNumber = {CAS-11-08-RK},\n\tTitle = {Aspect-Oriented Language Based on Product Family Algebra: Aspects Specification and Verification},\n\tPages ={50},\n\tYear = {2011}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Formal Test for Detecting Information Leakage via Covert Channels.\n \n \n \n\n\n \n Jaskolka, J.; Khedri, R.; and Sabri, K. E.\n\n\n \n\n\n\n In Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, of CSIIRW7, pages 1 – 4, Oak Ridge, TN, USA, October 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{JaskolkaKhedriSabri2011,\n\tAddress = {Oak Ridge, TN, USA},\n\tAuthor = {Jason Jaskolka and Ridha Khedri and Khair Eddin Sabri},\n\tBooktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop},\n\tMonth = {October},\n\tPages = {1 -- 4},\n\tSeries = {CSIIRW7},\n\tTitle = {A Formal Test for Detecting Information Leakage via Covert Channels},\n\tYear = {2011}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Supplementing Product Families with Behaviour.\n \n \n \n\n\n \n Höfner, P.; Khedri, R.; and Möller, B.\n\n\n \n\n\n\n Technical Report 2010-13, Institute of Computer Science, University of Augsburg, September 11, 2011.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{HofnerKhedriMoeller2011TR,\n\tAuthor = {Peter H\\"{o}fner and Ridha Khedri and Bernhard M\\"{o}ller},\n\tInstitution = {Institute of Computer Science, University of Augsburg},\n\tMonth = {September 11,},\n\tNumber = {2010-13},\n\tTitle = {Supplementing Product Families with Behaviour},\n\tType = {Universit\\"at Augsburg Technical Report},\n\tYear = {2011}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Information Leakage via Protocol-Based Covert Channels: Detection, Automation, and Applications.\n \n \n \n\n\n \n Jaskolka, J.; Khedri, R.; and Sabri, K. E.\n\n\n \n\n\n\n Technical Report CAS-11-05-RK, Department of Computing and Software, Faculty of Engineering, McMaster University, January 2011.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{JaskolkaKhedriSabri2011TR,\n\tAuthor = {Jason Jaskolka and Ridha Khedri and Khair Eddin Sabri},\n\tInstitution = {Department of Computing and Software, Faculty of Engineering, McMaster University},\n\tMonth = {January},\n\tOPTNote = {\\url{http://docs.google.com/gview?url=http://www.cas.mcmaster.ca/cas/0reports/CAS-11-05-RK.pdf} (accessed on September 30, 2011)},\n\tNumber = {CAS-11-05-RK},\n\tTitle = {Information Leakage via Protocol-Based Covert Channels: Detection, Automation, and Applications},\n\tPages ={1 -- 52},\n\tYear = {2011}}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Supplementing Product Families with Behaviour.\n \n \n \n\n\n \n Höfner, P.; Khedri, R.; and Möller, B.\n\n\n \n\n\n\n International Journal of Informatics, 5(1 – 2 Part 2): \\hbox245–266. 2011.\n Special Issue II: Foundations and Practice of Systems and Software Engineering Festschrift in Honor of Manfred Broy\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{HofnerKhedriMoeller2011,\n\tAuthor = {Peter H\\"{o}fner and Ridha Khedri and Bernhard M\\"{o}ller},\n\tJournal = {International Journal of Informatics},\n\tNote = {Special Issue II: Foundations and Practice of Systems and Software Engineering Festschrift in Honor of Manfred Broy},\n\tNumber = {1 -- 2 Part 2},\n\tPages = {\\hbox{245--266}},\n\tTitle = {Supplementing Product Families with Behaviour},\n\tVolume = {5},\n\tYear = {2011}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution.\n \n \n \n\n\n \n Sabri, K. E.; and Khedri, R.\n\n\n \n\n\n\n Fundamenta Informaticae, 112(4): \\hbox305–335. 2011.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{SabriKhedri2011,\n\tAuthor = {Khair Eddin Sabri and Ridha Khedri},\n\tJournal = {Fundamenta Informaticae},\n\tNumber = {4},\n\tPages = {\\hbox{305--335}},\n\tTitle = {Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution},\n\tVolume = {112},\n\tYear = {2011}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Exploring Covert Channels.\n \n \n \n\n\n \n Jaskolka, J.; and Khedri, R.\n\n\n \n\n\n\n January 4 –7 2011.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@conference{JaskolkaKhedri2011,\n\tAuthor = {Jason Jaskolka and Ridha Khedri},\n\tBooktitle = {44th Hawaii International Conference on System Sciences (HICSS), Minitrack on Information Security and Cyber Crime},\n\tDate-Added = {2010-06-29 15:59:11 -0400},\n\tDate-Modified = {2010-06-29 16:22:19 -0400},\n\tMonth = {January 4 --7},\n\tPages = {1  -- 10},\n\tTitle = {Exploring Covert Channels},\n\tYear = {2011}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An Algebra of Product Families.\n \n \n \n\n\n \n Höfner, P.; Khedri, R.; and Möller, B.\n\n\n \n\n\n\n Software and Systems Modeling, 10(2): 161 – 182. 2011.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{HofnerKhedriMoeller2009,\n\tAuthor = {Peter H\\"{o}fner and Ridha Khedri and Bernhard M\\"{o}ller},\n\tDate-Modified = {2011-04-28 09:34:32 -0400},\n\tJournal = {Software and Systems Modeling},\n\tOPTNote = {{\\bf Special section paper}/ Received: March 3, 2009/ Revised: July 16, 2009/ Accepted: July 23, 2009/ Published online: August 27, 2009},\n\tNumber = {2},\n\tPages = {161 -- 182},\n\tPublisher = {Springer-Verlag},\n\tTitle = {An Algebra of Product Families},\n\tVolume = {10},\n\tYear = {2011}}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n A Literature Survey of Feature Modeling.\n \n \n \n\n\n \n Alturki, F.; and Khedri, R.\n\n\n \n\n\n\n May 19 – 21 2010.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@conference{AlturkiKhedri2010b,\n\tAuthor = {Fadil Alturki and Ridha Khedri},\n\tBooktitle = {The International Computing Conference in Arabic (ICCA 2010)},\n\tDate-Added = {2010-06-29 15:37:20 -0400},\n\tDate-Modified = {2010-06-29 15:46:18 -0400},\n\tMonth = {May 19 -- 21},\n\tPages = {45 -- 464},\n\tPublisher = {Hammamet, Tunisia},\n\tTitle = {A Literature Survey of Feature Modeling},\n\tYear = {2010}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An Algebraic Framework for the Analysis of Information Confidentiality.\n \n \n \n\n\n \n Sabri, K. E.; and Khedri, R.\n\n\n \n\n\n\n May 19 – 21 2010.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@conference{SabriKhedri2010,\n\tAuthor = {Khair Eddin Sabri and Ridha Khedri},\n\tBooktitle = {The International Computing Conference in Arabic (ICCA 2010)},\n\tDate-Added = {2010-06-29 15:37:20 -0400},\n\tDate-Modified = {2010-06-29 15:46:18 -0400},\n\tMonth = {May 19 -- 21},\n\tPages = {103--119},\n\tPublisher = {Hammamet, Tunisia},\n\tTitle = {An Algebraic Framework for the Analysis of Information Confidentiality},\n\tYear = {2010}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Tool for Formal Feature Modeling Based on BDDs and Product Families Algebra.\n \n \n \n\n\n \n Alturki, F.; and Khedri, R.\n\n\n \n\n\n\n April 12 – 16 2010.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@conference{AlturkiKhedri2010,\n\tAuthor = {Fadil Alturki and Ridha Khedri},\n\tBooktitle = {13th Workshop on Requirements Engineering (WER 2010)},\n\tDate-Added = {2010-06-29 15:37:20 -0400},\n\tDate-Modified = {2010-06-29 15:46:18 -0400},\n\tEditor = {Graciela Hadad and Oscar Dieste and Juan Pablo},\n\tMonth = {April 12 -- 16},\n\tPages = {109 -- 120},\n\tPublisher = {Universidad del Azuay, Ecuador},\n\tTitle = {A Tool for Formal Feature Modeling Based on {BDD}s and Product Families Algebra},\n\tYear = {2010}}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n 1: Algebraic Model for Agent Explicit Knowledge in Multi-agent Systems.\n \n \n \n\n\n \n Sabri, K. E.; Khedri, R.; and Jaskolka, J.\n\n\n \n\n\n\n Advance Technologies, pages 225 – 250. IN-TECH, August 2009.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{SabriKhedriJaskolka2009c,\n\tAuthor = {Khair Eddin Sabri and Ridha Khedri and Jason Jaskolka},\n\tChapter = {1: Algebraic Model for Agent Explicit Knowledge in Multi-agent Systems},\n\tMonth = {August},\n\tPages = {225 -- 250},\n\tPublisher = {{IN-TECH}},\n\tTitle = {Advance Technologies},\n\tYear = {2009}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Automated Verification of Information Flow in Agent-Based Systems.\n \n \n \n\n\n \n Sabri, K. E.; Khedri, R.; and Jaskolka, J.\n\n\n \n\n\n\n Technical Report CAS-09-01-RK, Department of Computing and Software, Faculty of Engineering, McMaster University, January 2009.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{SabriKhedriJaskolka2009,\n\tOPTAddress = {Department of Computing and Software, McMaster University},\n\tAuthor = {Khair Eddin Sabri and Ridha Khedri and Jason Jaskolka},\n\tInstitution = {Department of Computing and Software, Faculty of Engineering, McMaster University},\n\tMonth = {January},\n\tOPTNote = {\\url{http://www.cas.mcmaster.ca/cas/0template1.php?601} (accessed on January 19, 2009)},\n\tNumber = {CAS-09-01-RK},\n\tTitle = {Automated Verification of Information Flow in Agent-Based Systems},\n\tYear = {2009}}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Verification of Information Flow in Agent-Based Systems.\n \n \n \n\n\n \n Sabri, K. E.; Khedri, R.; and Jaskolka, J.\n\n\n \n\n\n\n In Babin, G.; Kropf, P.; and Weiss, M., editor(s), 4th International MCETECH Conference on e-Technologies, volume 26, of Lecture Notes in Business Information Processing, pages 252 – 266, Ottawa, Ontario, Canada, May 4 – 6, 2009. Springer-Verlag Berlin Heidelberg\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{SabriKhedri2008d,\n\t\tAddress = {Ottawa, Ontario, Canada},\n\t\tAuthor = {Khair Eddin Sabri and Ridha Khedri and Jason Jaskolka},\n\t\tBooktitle = {4th International MCETECH Conference on e-Technologies},\n\t\tEditor = {G. Babin and P. Kropf and M. Weiss},\n\t\tMonth = {May 4 -- 6,},\n\t\tPages = {252 -- 266},\n\t\tPublisher = {Springer-Verlag Berlin Heidelberg},\n\t\tSeries = {Lecture Notes in Business Information Processing},\n\t\tTitle = {Verification of Information Flow in Agent-Based Systems},\n\t\tVolume = {26},\n\t\tYear = {2009}}\n\n\n\t
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2008\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Formal Model Driven Approach to Deal with Requirements Volatility.\n \n \n \n\n\n \n Khedri, R.\n\n\n \n\n\n\n Technical Report CAS-08-03-RK, Department of Computing and Software, Faculty of Engineering, McMaster University, January 2008.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{Khedri2008TR1,\n\tAuthor = {Ridha Khedri},\n\tInstitution = {Department of Computing and Software, Faculty of Engineering, McMaster University},\n\tMonth = {January},\n\tNumber = {CAS-08-03-RK},\n\tTitle = {Formal Model Driven Approach to Deal with Requirements Volatility},\n\tType = {Computing and Software Technical Reports},\n\tYear = {2008}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Agent Explicit Knowledge: Survey of the Literature and Elements of a Suitable Representation.\n \n \n \n\n\n \n Sabri, K. E.; and Khedri, R.\n\n\n \n\n\n\n In Practice and Theory of IT Security, Satellite workshop of the Montreal Conference on e-Technologies, Montreal, Quebec, Canada, January 23, 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{SabriKhedri2008,\n\tAddress = {Montreal, Quebec, Canada},\n\tAuthor = {Khair Eddin Sabri and Ridha Khedri},\n\tBooktitle = {Practice and Theory of IT Security, Satellite workshop of the Montreal Conference on e-Technologies},\n\tMonth = {January 23,},\n\tTitle = {Agent Explicit Knowledge: Survey of the Literature and Elements of a Suitable Representation},\n\tYear = 2008}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Specification of Agent Explicit Knowledge in Cryptographic Protocols.\n \n \n \n\n\n \n Sabri, K. E.; Khedri, R.; and Jaskolka, J.\n\n\n \n\n\n\n In World Academy of Science, Engineering and Technology (WASET), and presented at the International Conference on Computer, Electrical, and Systems Science, and Engineering (CESSE 2008), volume 35, pages 447 – 454, October 29-31 2008. Venice, Italy\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{SabriKhedri2008c,\n\t\tAuthor = {Khair Eddin Sabri and Ridha Khedri and Jason Jaskolka},\n\t\tBooktitle = {World Academy of Science, Engineering and Technology (WASET), and presented at the International Conference on Computer, Electrical, and Systems Science, and Engineering (CESSE 2008)},\n\t\tMonth = {October 29-31},\n\t\tOrganization = {Venice, Italy},\n\t\tPages = {447 -- 454},\n\t\tTitle = {Specification of Agent Explicit Knowledge in Cryptographic Protocols},\n\t\tVolume = {35},\n\t\tYear = {2008}}\n\n\t
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Algebraic View Reconciliation.\n \n \n \n\n\n \n Höfner, P.; Khedri, R.; and Möller, B.\n\n\n \n\n\n\n In 6th IEEE International Conferences on Software Engineering and Formal Methods, pages 85 – 94, November 10 – 14, 2008. Cape Town, South Africa\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{HofnerKhedriMoeller2008,\n\t\tAuthor = {Peter H\\"{o}fner and Ridha Khedri and Bernhard M\\"{o}ller},\n\tBooktitle = {6th IEEE International Conferences on Software Engineering and Formal Methods},\n\tMonth = {November 10 -- 14,},\n\tOrganization = {Cape Town, South Africa},\n\tPages = {85 -- 94},\n\tTitle = {Algebraic View Reconciliation},\n\tYear = {2008}}\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2007\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n A Mathematical Framework to Capture Agent Explicit Knowledge in Cryptographic Protocols.\n \n \n \n\n\n \n Sabri, K. E.; and Khedri, R.\n\n\n \n\n\n\n Technical Report CAS-07-04-RK, Department of Computing and Software, Faculty of Engineering, McMaster University, October 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{SabriKhedri2007TR1,\n\tAuthor = {Khair Eddin Sabri and Ridha Khedri},\n\tInstitution = {Department of Computing and Software, Faculty of Engineering,  McMaster University},\n\tMonth = {October},\n\tNumber = {CAS-07-04-RK},\n\tTitle = {A Mathematical Framework to Capture Agent Explicit Knowledge in Cryptographic Protocols},\n\tType = {Computing and Software Technical Reports},\n\tYear = {2007}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Multi-View Framework for the Analysis of Cryptographic Protocols.\n \n \n \n\n\n \n Sabri, K. E.; and Khedri, R.\n\n\n \n\n\n\n Technical Report CAS-07-04-RK, Department of Computing and Software, Faculty of Engineering, McMaster University, November 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{SabriKhedri2007TR2,\n\tAuthor = {Khair Eddin Sabri and Ridha Khedri},\n\tInstitution = {Department of Computing and Software, Faculty of Engineering, McMaster University},\n\tMonth = {November},\n\tNumber = {CAS-07-04-RK},\n\tTitle = {Multi-View Framework for the Analysis of Cryptographic Protocols},\n\tType = {Computing and Software Technical Reports},\n\tYear = {2007}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Algebraic View Reconciliation.\n \n \n \n\n\n \n Höfner, P.; Khedri, R.; and Möller, B.\n\n\n \n\n\n\n Technical Report 2007-13, Institute of Computer Science, University of Augsburg, December 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{HofnerKhedriMoeller2007TR,\n\tAuthor = {Peter H\\"{o}fner and Ridha Khedri and Bernhard M\\"{o}ller},\n\tInstitution = {Institute of Computer Science, University of Augsburg},\n\tMonth = {December},\n\tNumber = {2007-13},\n\tTitle = {Algebraic View Reconciliation},\n\tType = {Universit\\"at Augsburg Technical Report},\n\tYear = {2007}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Requirements Analysis for Engineering Computation: A Systematic Approach for Improving Reliability.\n \n \n \n\n\n \n Smith, S.; Lai, L.; and Khedri, R.\n\n\n \n\n\n\n Reliable Computing, 13(1): 83 – 107. February 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{SmithLaiKhedri2005,\n\t\tAuthor = {Spencer Smith and Lei Lai and Ridha Khedri},\n\t\tJournal = {Reliable Computing},\n\t\tMonth = {February},\n\t\tNumber = {1},\n\t\tPages = {83 -- 107},\n\t\tPublisher = {Springer Science+Business Media B.V.},\n\t\tTitle = {Requirements Analysis for Engineering Computation: A Systematic Approach for Improving Reliability},\n\t\tVolume = {13},\n\t\tYear = 2007}\n\n\n\t
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2006\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Feature Algebra.\n \n \n \n\n\n \n Höfner, P.; Khedri, R.; and Möller, B.\n\n\n \n\n\n\n Technical Report 2006-04, Institute of Computer Science, University of Augsburg, June 2006.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{HofnerKhedriMoeller2006TR,\n\tAuthor = {Peter H\\"{o}fner and Ridha Khedri and Bernhard M\\"{o}ller},\n\tInstitution = {Institute of Computer Science, University of Augsburg},\n\tMonth = {June},\n\tNumber = {2006-04},\n\tTitle = {Feature Algebra},\n\tType = {Universit\\"at Augsburg Technical Report},\n\tYear = {2006}}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Feature Algebras.\n \n \n \n\n\n \n Höfner, P.; Khedri, R.; and Möller, B.\n\n\n \n\n\n\n In Misra, J.; Nipkow, T.; and Sekerinski, E., editor(s), FM 2006: Formal Methods, volume 4085, of Lecture Notes in Computer Science series, pages 300 – 315, 14th International Symposium on Formal Methods, McMaster University, Hamilton, Ontario, Canada, August 21 – 27 2006. Springer\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{HofnerKhedriMoeller2006,\n\tAddress = {14th International Symposium on Formal Methods, McMaster University, Hamilton, Ontario, Canada},\n\tAuthor = {Peter H\\"{o}fner and Ridha Khedri and Bernhard M\\"{o}ller},\n\tBooktitle = {F{M} 2006: {F}ormal {M}ethods},\n\tEditor = {Jayadev Misra and Tobias Nipkow and Emil Sekerinski},\n\tMonth = {August 21 -- 27},\n\tPages = {300 -- 315},\n\tPublisher = {Springer},\n\tSeries = {Lecture Notes in Computer Science series},\n\tTitle = {Feature Algebras},\n\tVolume = {4085},\n\tYear = 2006}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n A Multi-view Approach for the Analysis of Cryptographic Protocols.\n \n \n \n\n\n \n Sabri, K. E.; and Khedri, R.\n\n\n \n\n\n\n In Practice and Theory of IT Security, Satellite workshop of the Montreal Conference on e-Technologies, pages 21 – 27, Montreal, Quebec, Canada, May 17 – 19 2006. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{SabriKhedri2006,\n\tAddress = {Montreal, Quebec, Canada},\n\tAuthor = {Khair Eddin Sabri and Ridha Khedri},\n\tBooktitle = {Practice and Theory of IT Security, Satellite workshop of the Montreal Conference on e-Technologies},\n\tMonth = {May 17 -- 19},\n\tPages = {21 -- 27},\n\tTitle = {A Multi-view Approach for the Analysis of Cryptographic Protocols},\n\tYear = 2006}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2005\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Representation, Validation and Integration of Scenarios Using Tabular Expressions.\n \n \n \n\n\n \n Desharnais, J.; Khedri, R.; and Mili, A.\n\n\n \n\n\n\n Formal Methods in System Design,40. 2005.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DesharnaisKhedriMili2005,\n\t\tAuthor = {Jules Desharnais and Ridha Khedri and Ali Mili},\n\t\tJournal = {Formal Methods in System Design},\n\t\tPages = {40},\n\t\tTitle = {Representation, Validation and Integration of Scenarios Using Tabular Expressions},\n\t\tYear = 2005}\n\n\t
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Modeling and Verification of Cryptographic Protocols Using Coloured Petri Nets and Design/CPN.\n \n \n \n\n\n \n Al-Azzoni, I.; Down, D. G.; and Khedri, R.\n\n\n \n\n\n\n Nordic Journal of Computing, 12(3): 201 – 228. June 2005.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{AlAzouniDownKhedri2005b,\n\t\tAuthor = {Issam Al-Azzoni and Douglas G. Down and Ridha Khedri},\n\t\tJournal = {Nordic Journal of Computing},\n\t\tPublisher = {Publishing Association Nordic Journal of Computing},\n\t\tMonth = {June},\n\t\tNumber = {3},\n\t\tOptnote = {Extended version of~\\cite{AlAzouniDownKhedri2005}},\n\t\tPages = {201 -- 228},\n\t\tTitle = {Modeling and Verification of Cryptographic Protocols Using Coloured Petri Nets and Design/{CPN}},\n\t\tVolume = {12},\n\t\tYear = 2005}\n\n\n\t
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Modeling and Verification of Cryptographic Protocols Using Coloured Petri Nets and Design/CPN.\n \n \n \n\n\n \n Al-Azzoni, I.; Down, D. G.; and Khedri, R.\n\n\n \n\n\n\n In Lilius, J.; Machado, R. J.; Truscan, D.; and Fernandes, J. M., editor(s), 2nd International Workshop on Model-based Methodologies for Pervasive and Embedded Software (MOMPES 2005), volume 39, of TUCS General Publication, pages 1 – 19, Rennes, France, June 2005. Turku Centre for Computer Science\n ISBN 952-12-1556-9, ISSN 1239-1905\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{AlAzouniDownKhedri2005,\n\t\tAddress = {Rennes, France},\n\t\tAuthor = {Issam Al-Azzoni and Douglas G. Down and Ridha Khedri},\n\t\tBooktitle = {2nd International Workshop on Model-based Methodologies for Pervasive and Embedded Software (MOMPES 2005)},\n\t\tEditor = {Johan Lilius and Ricardo J. Machado and Dragos Truscan and Jo{a}o M. Fernandes},\n\t\tMonth = {June},\n\t\tNote = {ISBN 952-12-1556-9, ISSN 1239-1905},\n\t\tPages = {1 -- 19},\n\t\tPublisher = {Turku Centre for Computer Science},\n\t\tSeries = {{TUCS} General Publication},\n\t\tTitle = {Modeling and Verification of Cryptographic Protocols Using Coloured Petri Nets and Design/{CPN}},\n\t\tVolume = {39},\n\t\tYear = 2005}\n\n\n\t
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2004\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Requirements Scenaros Based System-Testing.\n \n \n \n\n\n \n Khedri, R.; and Bourguiba, I.\n\n\n \n\n\n\n In Sixteenth International Conference on Software Engineering and Knowledge Engineering (SEKE'04), pages 252 – 257, Banff, Alberta, Canada, June 20 – 24 2004. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{KhedriBourguiba2004a,\n\tAddress = {Banff, Alberta, Canada},\n\tAuthor = {Ridha Khedri and Imen Bourguiba},\n\tBooktitle = {Sixteenth International Conference on Software Engineering and Knowledge Engineering (SEKE'04)},\n\tMonth = {June 20 -- 24},\n\tOptnote = {ISBN 1-891706-14-4},\n\tOptpublisher = {Knowledge Systems Institute Graduate School},\n\tPages = {252 -- 257},\n\tTitle = {Requirements Scenaros Based System-Testing},\n\tYear = 2004}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Formal Derivation of Functional Architectural Design.\n \n \n \n\n\n \n Khedri, R.; and Bourguiba, I.\n\n\n \n\n\n\n In 2nd IEEE International Conference on Software Engineering and Formal Methods, pages 356 – 365, Beijing, China, September 26 – 30 2004. IEEE Computer Society Press\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{KhedriBourguiba2004b,\n\tAddress = {Beijing, China},\n\tAuthor = {Ridha Khedri and Imen Bourguiba},\n\tBooktitle = {2nd IEEE International Conference on Software Engineering and Formal Methods},\n\tMonth = {September 26 -- 30},\n\tPages = {356 -- 365},\n\tPublisher = {IEEE Computer Society Press},\n\tTitle = {Formal Derivation of Functional Architectural Design},\n\tYear = 2004}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Requirements Analysis for Engineering Computation.\n \n \n \n\n\n \n Smith, S.; Lai, L.; and Khedri, R.\n\n\n \n\n\n\n In National Science Foundation Workshop on Reliable Engineering Computing, pages 29 – 51, Savannah, Georgia, USA, September 15 – 17 2004. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{SmithLaiKhedri2004,\n\tAddress = {Savannah, Georgia, USA},\n\tAuthor = {Spencer Smith and Lei Lai and Ridha Khedri},\n\tBooktitle = {National Science Foundation Workshop on Reliable Engineering Computing},\n\tMonth = {September 15 -- 17},\n\tOpteditor = {????},\n\tPages = {29 -- 51},\n\tTitle = {Requirements Analysis for Engineering Computation},\n\tYear = 2004}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Computing the Demonic Meet of Relations Represented by Predicate Expression Tables.\n \n \n \n\n\n \n Desharnais, J.; Khedri, R.; and Mili, A.\n\n\n \n\n\n\n Technical Report CAS-04-03-RK, Department of Computing and Software, Faculty of Engineering, McMaster University, August 2004.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{DesharnaisKhedriMili2004b,\n\t\tOPTAddress = {1280 Main Street West, Hamilton, Ontario, Canada},\n\t\tAuthor = {Jules Desharnais and Ridha Khedri and Ali Mili},\n\t\tInstitution = {Department of Computing and Software, Faculty of Engineering, McMaster University},\n\t\tMonth = {August},\n\t\tNumber = {{CAS-04-03-RK}},\n\t\tTitle = {Computing the Demonic Meet of Relations Represented by Predicate Expression Tables},\n\t\tType = {{C.A.S.} Report Series},\n\t\tYear = 2004}\n\n\n\t
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2003\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Requirements Scenarios Formalization Technique: $N$ Versions Towards One Good Version.\n \n \n \n\n\n \n Khedri, ł. R.\n\n\n \n\n\n\n Electronic Notes in Theoretical Computer Science, 44(3): 24 pages. 2003.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{khedri2003a,\n\t\tAuthor = {\\label{khedri2003a} Ridha Khedri},\n\t\tEditor = {Wolfram Kahl and David L. Parnas and Gunther Schmidt},\n\t\tJournal = {Electronic Notes in Theoretical Computer Science},\n\t\tNumber = {3},\n\t\tOptnote = {(Updated version of paper \\#~\\ref{Khedri2001a})},\n\t\tPages = {24 pages},\n\t\tPublisher = {Elsevier Science},\n\t\tTitle = {Requirements Scenarios Formalization Technique: {$N$} Versions Towards One Good Version},\n\t\tVolume = {44},\n\t\tYear = 2003}\n\n\t
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Requirements Specification Decomposition: A System-Testing Driven Approach.\n \n \n \n\n\n \n Khedri, ł. R.; Wang, L.; and Lei, S.\n\n\n \n\n\n\n In Proceedings of the 7th International Seminar On Relational Methods in Computer Science, pages 97 – 104, Bad Melente, Germany, May 12 – 17 2003. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{KhedriWangLei2003,\n\t\tAddress = {Bad Melente, Germany},\n\t\tAuthor = {\\label{KhedriWangLei2003} Ridha Khedri and Ling Wang and Situ Lei},\n\t\tBooktitle = {Proceedings of the 7th International Seminar On Relational Methods in Computer Science},\n\t\tMonth = {May 12 -- 17},\n\t\tPages = {97 -- 104},\n\t\tTitle = {Requirements Specification Decomposition: A System-Testing Driven Approach},\n\t\tYear = 2003}\n\n\t
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n SCENATOR: A Prototype Tool for Requirements Inconsistency Detection.\n \n \n \n\n\n \n Khedri, R.; Wu, R.; and Sanga, B.\n\n\n \n\n\n\n In Wang, F.; and Lee, I., editor(s), Proceedings of the 1st International Workshop on Automated Technology for Verification and Analysis, pages 75 – 86, Taiwan, Republic of China, December 10 – 13 2003. National Taiwan University\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{KhedriWuSanga2003,\n\t\tAddress = {Taiwan, Republic of China},\n\t\tAuthor = {Ridha Khedri and Rong Wu and Bahati Sanga},\n\t\tBooktitle = {Proceedings of the 1st International Workshop on Automated Technology for Verification and Analysis},\n\t\tEditor = {Farn Wang and Insup Lee},\n\t\tMonth = {December 10 -- 13},\n\t\tOrganization = {National Taiwan University},\n\t\tPages = {75 -- 86},\n\t\tTitle = {{SCENATOR}: A Prototype Tool for Requirements Inconsistency Detection},\n\t\tYear = 2003}\n\n\n\t
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2001\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Requirements Scenarios Formalization Technique: $N$ Versions Towards One Good Version.\n \n \n \n\n\n \n Khedri, R.\n\n\n \n\n\n\n In Kahl, W.; Parnas, D. L.; and Schmidt, G., editor(s), Proceedings of the Relational Methods in Software. RelMiS 2001. A satellite event of ETAPS 2001, Genova, Italy, April 7 – 8 2001, pages 1 – 24, 2001. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{Khedri2001b,\n\tAuthor = {Ridha Khedri},\n\tBooktitle = {Proceedings of the Relational Methods in Software. RelMiS 2001. A satellite event of ETAPS 2001, Genova, Italy, April 7 -- 8 2001},\n\tEditor = {Wolfram Kahl and David L. Parnas and Gunther Schmidt},\n\tPages = {1 -- 24},\n\tTitle = {Requirements Scenarios Formalization Technique: {$N$} Versions Towards One Good Version},\n\tYear = 2001}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n 1: Interpretation of Tabular Expressions Using Arrays of Relations.\n \n \n \n\n\n \n Desharnais, J.; Khedri, R.; and Mili, A.\n\n\n \n\n\n\n of Studies in Fuzziness and Soft Computing. Relational Methods for Computer Science Applications, pages 3 – 14. Springer-Physica Verlag, 2001.\n Edited by Ewa Orłowska and Andrzej Szałas\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{DesharnaisKhedriMili2001,\n\tAlteditor = {Ewa Or{\\l}owska and Andrzej Sza{\\l}as},\n\tAuthor = {Jules Desharnais and Ridha Khedri and Ali Mili},\n\tChapter = {1: Interpretation of Tabular Expressions Using Arrays of Relations},\n\tIsbn = {3-7908-1365-6},\n\tIssn = {1434-9922},\n\tNote = {Edited by Ewa Or{\\l}owska and Andrzej Sza{\\l}as},\n\tPages = {3 -- 14},\n\tPublisher = {Springer-Physica Verlag},\n\tSeries = {Studies in Fuzziness and Soft Computing},\n\tTitle = {Relational Methods for Computer Science Applications},\n\tYear = 2001}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Requirements Scenarios Formalization Technique: $N$ Versions Towards One Good Version.\n \n \n \n\n\n \n Khedri, ł. R.\n\n\n \n\n\n\n In Kahl, W.; Parnas, D. L.; and Schmidt, G., editor(s), Proceedings of the Relational Methods in Software. RelMiS 2001. A satellite event of ETAPS 2001, pages 19 – 35, Genova, Italy, April 7 – 8 2001. Universität der Bundeswehr München, Fakultät für Informatik \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{Khedri2001a,\n\tAddress = {Genova, Italy},\n\tAuthor = {\\label{Khedri2001a} Ridha Khedri},\n\tBooktitle = {Proceedings of the Relational Methods in Software. RelMiS 2001. A satellite event of ETAPS 2001},\n\tEditor = {Wolfram Kahl and David L. Parnas and Gunther Schmidt},\n\tMonth = {April 7 -- 8},\n\tOptnote = {(Preliminary version of paper \\#~\\ref{khedri2003a})},\n\tPages = {19 -- 35},\n\t\tPublisher = {Universit\\"at der Bundeswehr M\\"unchen, Fakult\\"at f\\"ur Informatik\t},\n\t\tTitle = {Requirements Scenarios Formalization Technique: {$N$} Versions Towards One Good Version},\n\t\tYear = {2001}\n\t\t}\n\n\n\t
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n On a Formal Semantics of Tabular Expressions.\n \n \n \n\n\n \n Janicki, R.; and Khedri, R.\n\n\n \n\n\n\n Science of Computer Programming, 39(1-2): \\hbox189-213. March 2001.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{JanickKhedri2001,\n\t\tAuthor = {Ryszard Janicki and Ridha Khedri},\n\t\tJournal = {Science of Computer Programming},\n\t\tMonth = {March},\n\t\tNumber = {1-2},\n\t\tPages = {\\hbox{189-213}},\n\t\tTitle = {On a Formal Semantics of Tabular Expressions},\n\t\tVolume = {39},\n\t\tYear = 2001}\n\n\n\t
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2000\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Remarks on Mereology of Relations.\n \n \n \n\n\n \n Janicki, R.; and Khedri, R.\n\n\n \n\n\n\n In Desharnais, J., editor(s), 5th International Seminar On Relational Methods in Computer Science, pages 133 – 140, Valcartier, Quebec, Canada, January 9 – 14 2000. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{JanickiKhedri2000,\n\tAddress = {Valcartier, Quebec, Canada},\n\tAuthor = {Ryszard Janicki and Ridha Khedri},\n\tBooktitle = {5th International Seminar On Relational Methods in Computer Science},\n\tEditor = {Jules Desharnais},\n\tMonth = {January 9 -- 14},\n\tPages = {133 -- 140},\n\tTitle = {Remarks on Mereology of Relations},\n\tYear = 2000}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1999\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Concurrency: A Relational Approach.\n \n \n \n\n\n \n Khedri, R.; and Desharnais, J.\n\n\n \n\n\n\n Technical Report 382, Software Engineering Research Group, Department of Computing and Software, McMaster University, October 1999.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{KhedriDesharnais1999,\n\tAuthor = {Ridha Khedri and Jules Desharnais},\n\tInstitution = {Software Engineering Research Group, Department of Computing and Software, McMaster University},\n\tMonth = {October},\n\tNumber = {382},\n\tTitle = {Concurrency: A Relational Approach},\n\tType = {Technical Report},\n\tYear = 1999}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n On a Formal Semantics of Tabular Expressions.\n \n \n \n\n\n \n Janicki, R.; and Khedri, R.\n\n\n \n\n\n\n Technical Report 379, Software Engineering Research Group, Department of Computing And Software, Faculty of Engineering, McMaster University, September 1999.\n http://www.crl.mcmaster.ca/SERG/serg.publications.html\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{khedri99b,\n\tAuthor = {Ryszard Janicki and Ridha Khedri},\n\tInstitution = {Software Engineering Research Group, Department of Computing And Software, Faculty of Engineering, McMaster University},\n\tMonth = {September},\n\tNote = {http://www.crl.mcmaster.ca/SERG/serg.publications.html},\n\tNumber = {379},\n\tTitle = {On a Formal Semantics of Tabular Expressions},\n\tType = {SERG Report},\n\tYear = 1999}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Maintenance.\n \n \n \n\n\n \n Bredereke, J.; Frühauf, K.; Khedri, R.; Krauss, S.; and Zeller, A.\n\n\n \n\n\n\n In Denert, E.; Hoffman, D.; Ludewig, J.; and Parnas, D., editor(s), Software Engineering Research and Education: Seeeking a new Agenda, of Dagstuhl-Seminar-Report 230, pages 41 – 53. Internationales Begegnungs-und Forschungszentrum für Informatik, February 14 – 19 1999.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{BrederekeFruhaufKhedriKraussZeller1999,\n\tAuthor = {Jan Bredereke and Karol Fr\\"uhauf and Ridha Khedri and Stefan Krauss and Andreas Zeller},\n\tBooktitle = {Software Engineering Research and Education: Seeeking a new Agenda},\n\tEditor = {Ernst Denert and Daniel Hoffman and Jochen Ludewig and David Parnas},\n\tMonth = {February 14 -- 19},\n\tPages = {41 -- 53},\n\tPublisher = {Internationales Begegnungs-und Forschungszentrum f\\"ur Informatik},\n\tSeries = {Dagstuhl-Seminar-Report 230},\n\tTitle = {Maintenance},\n\tYear = 1999}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Requirements.\n \n \n \n\n\n \n Atlee, J.; Bartussek, W.; Bredereke, J.; Glinz, M.; Khedri, R.; Prechelt, L.; and Weiss, D.\n\n\n \n\n\n\n In Denert, E.; Hoffman, D.; Ludewig, J.; and Parnas, D., editor(s), Software Engineering Research and Education: Seeeking a new Agenda, pages 9 – 16. Internationales Begegnungs-und Forschungszentrum für Informatik, February 14 – 19 1999.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{AtleeBartussekBrederekeGlinzKhedriPrecheltWeiss1999,\n\tAuthor = {Joanne Atlee and Wolfram Bartussek and Jan Bredereke and Martin Glinz and Ridha Khedri and Lutz Prechelt and David Weiss},\n\tBooktitle = {Software Engineering Research and Education: Seeeking a new Agenda},\n\tEditor = {Ernst Denert and Daniel Hoffman and Jochen Ludewig and David Parnas},\n\tMonth = {February 14 -- 19},\n\tOptseries = {Dagstuhl-Seminar-Report 230},\n\tPages = {9 -- 16},\n\tPublisher = {Internationales Begegnungs-und Forschungszentrum f\\"ur Informatik},\n\tTitle = {Requirements},\n\tYear = 1999}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Relational Methods in Software Engineering: Connecting Theory with Practice.\n \n \n \n\n\n \n Khedri, R.\n\n\n \n\n\n\n In Proceedings, Symposium on Relational Methods in Software Engineering, Hamilton, Ontario, Canada, March 22 – 24, 1999. \n Position paper\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{khedri1999a,\n\t\tAddress = {Hamilton, Ontario, Canada},\n\t\tAuthor = {Ridha Khedri},\n\t\tBooktitle = {Proceedings, Symposium on Relational Methods in Software Engineering},\n\t\tMonth = {March 22 -- 24,},\n\t\tNote = {Position paper},\n\t\tOptorganization = {McMaster University,},\n\t\tTitle = {Relational Methods in Software Engineering: Connecting Theory with Practice},\n\t\tYear = 1999}\n\n\n\t
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Sequential Scenarios Verification And Integration Using Tabular Expressions.\n \n \n \n\n\n \n Khedri, R.\n\n\n \n\n\n\n Technical Report 374, Communications Research Laboratory, Faculty of Engineering, McMaster University, June 1999.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{khedri99,\n\t\tAuthor = {Ridha Khedri},\n\t\tInstitution = {Communications Research Laboratory, Faculty of Engineering, McMaster University},\n\t\tMonth = {June},\n\t\tNumber = {374},\n\t\tTitle = {Sequential Scenarios Verification And Integration Using Tabular Expressions},\n\t\tType = {CRL Report},\n\t\tYear = 1999}\n\n\n\t
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1998\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Integration of Sequential Scenarios.\n \n \n \n\n\n \n Desharnais, ł.; Frappier, M.; Khedri, R.; and Mili, A.\n\n\n \n\n\n\n IEEE Transactions on Software Engineering, 24(9): \\hbox695 – 708. September 1998.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DesharnaisFrappierKhedriMili98,\n\tAuthor = {\\label{ESEC}Jules Desharnais and Marc Frappier and Ridha Khedri and Ali Mili},\n\tJournal = {IEEE Transactions on Software Engineering},\n\tMonth = {September},\n\tNumber = {9},\n\tPages = {\\hbox{695 -- 708}},\n\tTitle = {Integration of Sequential Scenarios},\n\tVolume = {24},\n\tYear = 1998}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Relational Semantics to Tabular Expressions.\n \n \n \n\n\n \n Desharnais, J.; Khedri, R.; and Mili, A.\n\n\n \n\n\n\n Talk abstract, Invited talk, ıt Proceedings, 5th Maghrebine Conference on Software Engineering and Artificial Intelligence, Tunis, Tunisia, December 8 – 10, 1998.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{AbstractDesharnaisKhedriMili1998,\n\tAuthor = {Jules Desharnais and Ridha Khedri and Ali Mili},\n\tHowpublished = {Talk abstract, Invited talk, {\\it Proceedings, 5th Maghrebine Conference on Software Engineering and Artificial Intelligence}, Tunis, Tunisia},\n\tMonth = {December 8 -- 10,},\n\tTitle = {Relational Semantics to Tabular Expressions},\n\tYear = 1998}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Concurrence, bisimulation et équation d'interface~: une approche relationnelle.\n \n \n \n\n\n \n Khedri, R.\n\n\n \n\n\n\n Ph.D. Thesis, Fa­cul­té des études supérieures de l'Université Laval, Sainte-Foy, Québec, Canada, August 1998.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@phdthesis{khedri98,\n\t\tAddress = {Sainte-Foy, Qu\\'ebec, Canada},\n\t\tAuthor = {Ridha Khedri},\n\t\tMonth = {August},\n\t\tSchool = {Fa\\-cul\\-t\\'e des \\'etudes sup\\'erieures de l'Universit\\'e Laval},\n\t\tTitle = {Concurrence, bisimulation et \\'equation d'interface~: une approche relationnelle},\n\t\tYear = 1998}\n\n\n\t
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Towards a Uniform Relational Semantics for Tabular Expressions.\n \n \n \n\n\n \n Desharnais, J.; Khedri, R.; and Mili, A.\n\n\n \n\n\n\n In Orłowska, E.; and Szałas, A., editor(s), 4th International Seminar On Relational Methods in Computer Science, Warsaw, Poland, September 14 – 20 1998. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DesharnaisKhedriMili99,\n\t\tAddress = {Warsaw, Poland},\n\t\tAuthor = {Jules Desharnais and Ridha Khedri and Ali Mili},\n\t\tBooktitle = {4th International Seminar On Relational Methods in Computer Science},\n\t\tEditor = {Ewa Or{\\l}owska and Andrzej Sza{\\l}as},\n\t\tMonth = {September 14 -- 20},\n\t\tTitle = {Towards a Uniform Relational Semantics for Tabular Expressions},\n\t\tYear = 1998}\n\n\t
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1997\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Integration of Sequential Scenarios.\n \n \n \n\n\n \n Desharnais, ł. J.; Frappier, M.; Khedri, R.; and Mili, A.\n\n\n \n\n\n\n In Jazayeri, M.; and Schauer, H., editor(s), Lecture Notes in Computer Science~1301, pages 310 – 326, Zurich, Suisse, September 1997. Software Engineering-ESEC/FSE'97, Springer-Verlag\n (Also appeared in ACM Software Engineering Notes, 22(6):310 – 326, November 1997)\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DesharnaisFrappierKhedriMili97,\n\tAddress = {Zurich, Suisse},\n\tAuthor = {\\label{lcns1997} Jules Desharnais and Marc Frappier and Ridha Khedri and Ali Mili},\n\tBooktitle = {Lecture Notes in Computer Science~1301},\n\tEditor = {M. Jazayeri and H. Schauer},\n\tMonth = {September},\n\tNote = {(Also appeared in ACM Software Engineering Notes, 22(6):310 -- 326, November 1997)},\n\tOrganization = {Software Engineering-ESEC/FSE'97},\n\tPages = {310 -- 326},\n\tPublisher = {Springer-Verlag},\n\tTitle = {Integration of Sequential Scenarios},\n\tYear = 1997}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Integration of Sequential Scenarios.\n \n \n \n\n\n \n Desharnais, J.; Frappier, M.; Khedri, R.; and Mili, A.\n\n\n \n\n\n\n ACM Software Engineering Notes, 22(6): 310 – 326. November 1997.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DesharnaisFrappierKhedriMili1997b,\n\t\tAuthor = {Jules Desharnais and Marc Frappier and Ridha Khedri and Ali Mili},\n\t\tJournal = {ACM Software Engineering Notes},\n\t\tMonth = {November},\n\t\tOPTNote = {(This paper presents the same research result as paper \\#~\\ref{lcns1997}.)},\n\t\tNumber = {6},\n\t\tPages = {310 -- 326},\n\t\tTitle = {Integration of Sequential Scenarios},\n\t\tVolume = {22},\n\t\tYear = 1997}\n\n\n\t
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1994\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Une sémantique relationnelle démoniaque.\n \n \n \n\n\n \n Tchier, F.; Khedri, R.; and Desharnais, J.\n\n\n \n\n\n\n In $62^{\\mbox{ème}}$ congrès de l'ACFAS, pages 209 – 209, Montreal, Canada, May 1994. \n (Summary)\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TchierKhedriDesharnais1994,\n\tAddress = {Montreal, Canada},\n\tAuthor = {Fairouz Tchier and Ridha Khedri and Jules Desharnais},\n\tBooktitle = {$62^{\\mbox{\\`eme}}$ congr\\`es de l'ACFAS},\n\tMonth = {May},\n\tNote = {(Summary)},\n\tPages = {209 -- 209},\n\tTitle = {Une s\\'emantique relationnelle d\\'emoniaque},\n\tYear = 1994}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Demonic Relational Semantics of Sequential Programs.\n \n \n \n\n\n \n Desharnais, J.; Tchier, F.; and Khedri, R.\n\n\n \n\n\n\n Technical Report DIUL-RR-9406, D\\a'epartement d'Informatique, Universit\\a'e Laval, Sainte-Foy, Québec, Canada, 1994.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@techreport{DesharnaisTchierKhedri1994,\n\tAddress = {Sainte-Foy, Qu\\'ebec,  Canada},\n\tAuthor = {Jules Desharnais and Fairouz Tchier and Ridha Khedri},\n\tInstitution = {D\\a'epartement d'Informatique, Universit\\a'e Laval},\n\tNumber = {DIUL-RR-9406},\n\tOptmonth = {December},\n\tTitle = {Demonic Relational Semantics of Sequential Programs},\n\tYear = 1994}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Une approche relationnelle à la décomposition parallèle.\n \n \n \n\n\n \n Chaib-Draa, B.; Desharnais, J.; Khedri, R.; Jarras, I.; Sayadi, S.; and Tchier, F.\n\n\n \n\n\n\n In Brlek, S., editor(s), Méthodes mathématiques pour la synthèse des systèmes informatiques, of BMW-94, pages \\hbox89 – 103, UQAM, Montréal, Canada, May 1994. Laboratoire de combinatoire et d'informatique mathématique\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ChaibDesharnaisKhedri1994,\n\t\tAddress = {UQAM, Montr\\'eal, Canada},\n\t\tAuthor = {B. Chaib-Draa and J. Desharnais and R. Khedri and I. Jarras and S. Sayadi and F. Tchier},\n\t\tBooktitle = {M\\'ethodes math\\'ematiques pour la synth\\`ese des syst\\`emes informatiques},\n\t\tEditor = {S. Brlek},\n\t\tMonth = {May},\n\t\tOrganization = {Laboratoire de combinatoire et d'informatique math\\'ematique},\n\t\tPages = {\\hbox{89 -- 103}},\n\t\tSeries = {BMW-94},\n\t\tTitle = {Une approche relationnelle \\`a la d\\'ecomposition parall\\`ele},\n\t\tYear = 1994}\n\n\t
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1993\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n From abstract time to real time.\n \n \n \n\n\n \n Plaice, J.; Khedri, R.; and Lalement, R.\n\n\n \n\n\n\n In Proceedings of Sixth International Symposium on Lucid and Intensional Programming, pages 83 – 92, 1993. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PlaiceKhedriLalement1993,\n\tAuthor = {John Plaice and Ridha Khedri and Ren\\a'e Lalement},\n\tBooktitle = {Proceedings of Sixth International Symposium on Lucid and Intensional Programming},\n\tPages = {83 -- 92},\n\tTitle = {From abstract time to real time},\n\tYear = 1993}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \\a'Etude comparative des m\\a'ethodes de recouvrement avant de programmes.\n \n \n \n\n\n \n Khedri, R.\n\n\n \n\n\n\n Master's thesis, Facult\\a'e des \\a'etudes sup\\a'erieures de l'Universit\\a'e Laval, Sainte-Foy, Québec, Canada, May 1993.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@mastersthesis{khedri1993,\n\t\tAddress = {Sainte-Foy, Qu\\'ebec, Canada},\n\t\tAuthor = {Ridha Khedri},\n\t\tMonth = {May},\n\t\tOptnote = {Supervisor: Dr. Ali Jaoua},\n\t\tSchool = {Facult\\a'e des \\a'etudes sup\\a'erieures de l'Universit\\a'e Laval},\n\t\tTitle = {\\a'{E}tude comparative des m\\a'ethodes de recouvrement avant de programmes},\n\t\tYear = 1993}\n\n\t
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1991\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Augmentation automatique de la fiabilité d'un logiciel.\n \n \n \n\n\n \n Jaoua, A.; Belkhiter, N.; Desharnais, J.; and Khedri, R.\n\n\n \n\n\n\n ICO Qu\\a'ebec, 3(3): \\hbox332 – 337. Autumn 1991.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{JaouaBelkhiterDesharnaisKhedri1991,\n\tAuthor = {Ali Jaoua and Nadir Belkhiter and Jules Desharnais and Ridha Khedri},\n\tJournal = {ICO Qu\\a'ebec},\n\tMonth = {Autumn},\n\tNumber = {3},\n\tPages = {\\hbox{332 -- 337}},\n\tTitle = {Augmentation automatique de la fiabilit{\\'e} d'un logiciel},\n\tVolume = {3},\n\tYear = 1991}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);