Home Question ?

  Publications
          

Home
Enseignement
Publications
Groupe de recherche

Publications

 

Édition de livres

K. Adi, D. Amyot et L. Logrippo. Actes du 5ième colloque sur les Nouvelles Technologies de la Répartition (NOTERE 2005), Gatineau, Canada, 2005. ISBN 2-9809043-0-9.

K. Adi, L. Logrippo, M. Mejri. Actes du Workshop on Practice and Theory of Access Control

Technologies (WPTACT’2005). Montréal, Canada, 2005.

K. Adi, M. Debbabi et L. Logrippo. Actes du Workshop on Practice and Theory of IT Security (PTITS'06). Montréal, Canada, 2006.

K. Adi, D. Amyot et L. Logrippo. Nouvelles technologies des systèmes répartis. Revue Annales des télécommunications. Tome 61, n°11-12. 2006. ISBN 2-7462-1690-6

Articles dans des revues internationales

  1. K. Adi, L.Pene et L. Sullivan. Games for Non-Repudiation Protocol Correctness. International Journal of Wireless and Mobile Computing.  IJWMC, Issue 1, 2006.
  2. K. Adi, M. Debbabi et M. Mejri. A New Logic for Electronic Commerce Protocols. International journal of Theoretical Computer Science (TCS) 291. (2003) : 223-283.
  3. K. Adi et M. Debbabi. Abstract Interpretation for Proving Secrecy Properties in Security Protocols. Electronic Notes in Theoretical Computer Science (ENTCS) 55. 1 (2002) : 29-53.

Articles dans des conférences internationales

  1. L. Pene et K. Adi. Calculus for Distributed Firewall Specification and Verification. The 5th International Conference on
    Software Methodologies, Tools and Techniques. Québec. 2006.
  2. H. Ould-Slimane, M. Mejri et K. Adi. Enforcing Security Policies on Programs. The 5th International Conference on
    Software Methodologies, Tools and Techniques. Québec. 2006.
  3. M. Langar, M. Mejri et K. Adi. Formal Monitor For Concurrent Programs. Workshop on Practice and Theory of IT Security. 2006
  4. L. Hamza, K. Adi et K. El Ghemhioui. Automatic generation of attack scenarios for intrusion detection systems. International Conference on Internet and Web Applications and Services. Published by the IEEE Computer Society Press. 2006.
  5. K. Adi et L.Sullivan. Access control based on dynamic monitoring for detecting software malicious behaviors. Workshop on New Challenges for Access Control. NCAC'2005. Ottawa, 2005.
  6. K. Adi, A. El-Kabbal et M. Mejri. Un Système de Types pour l'Analyse des Pare-feux. 4ème Conférence sur la Sécurité et Architectures Réseaux. Batz sur Mer (France), 2005.
  7. K. Adi et L.Sullivan. Sufficient Conditions for Ensuring Probabilistic Fairness in Exchange Protocols. 7th International Symposium on Programming and Systems, ISPS'2005. Alger, 2005.
  8. K. Adi et L. Pene. Secrecy Correctness for Security Protocols. International Conference on Distributed Frameworks for Multimedia Applications DFMA'2005. proc. publié par IEEE Computer Society. Besançon, 2005.
  9. K. Adi, A. ElKabbal et L. Pene. Distributed Firewall Verification with Mobile Ambients. Workshop on Practice and Theory of Access Control Technologies. WPTACT'05. Montréal. 2005.
  10. K. Adi, M. Debbabi et L. Pene. Abstract Interpretation for Secrecy Correctness in E-Commerce Protocols. Montreal Conference on e-technologies, MCETECH'2005. Montréal, 2005.
  11. K. Adi et L. Pene. Abstract Trace-Based Model for Security Protocol Correctness. Session Poster. Security Analysis and Modelling, SAM'04. Ottawa, 2004.
  12. K. Adi et M. Debbabi. A game semantics approach for security protocols. 6th International Symposium on Programming and Systems, ISPS'2003. Alger, 2003.
  13. K. Adi et M. Debbabi. Abstract Interpretation for Proving Secrecy Properties in Security Protocols. Workshop on Logical Aspects of Cryptographic Protocol Verification. WLACPV'2001. Paris, 2001.
  14. K. Adi, M. Debbabi et M. Mejri. A New Logic for Electronic Commerce Protocols. 8th International Conference on Algebraic Methodology and Software Technology (AMAST). Iowa City, 2000.
  15. D. Bert, R. Echahed et K. Adi. Resolution of Goals with the functional and logic programming language LPG : impact of abstract interpretation. 5th International Conference on Algebraic ethodology and Software Technology, AMAST'96. Munich, 1996.

Rapports de recherche

  1. K. Adi, A. Felty, L. Loggripo et B. Stépien. Evaluation of Current Research in Firewall Analysis. Rapport de recherche. Département de la défence nationale. Canada.
  2. K. Adi. Formal Specification and Analysis of Security Protocols. Thèse de Ph. D. Université Laval. Canada.
  3. M. Debbabi, K. Adi, F. Massicote, M. Mejri et H. Chambaz. Comparative Analysis of Security APIs. Rapport de recherche. Département de la défence nationale. Canada.
  4. K. Adi, M. Debbabi et M. Mejri. A Finite, Complete and Sound Tableau- Based system For a New Logic for E-Commerce Protocols. Rapport de recherche, Université Laval.
  5. K. Adi. An optimal Abstract Continuation Passing Style. Mémoire de DEA, Université Pierre et Marie Curie, Paris, France.
  6. K. Adi. L' évaluation partielle dans les langages logiques. Mémoire d'ingénieur. Univesité d'Alger. Algérie.
 

 

Dernière modification : 12 sept. 2006