default search action
Akram Idani
Person information
- affiliation: IMAG, Grenoble, France
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c39]Asfand Yar, Akram Idani, Yves Ledru, Simon Collart Dutilleul, Amel Mammar, Germán Vega:
An Iterative Formal Model-Driven Approach to Railway Systems Validation. ICECCS 2024: 272-289 - [c38]Akram Idani:
Transpilation of Petri-nets into B - Shallow and Deep Embeddings. ABZ 2024: 80-98 - 2023
- [b2]Akram Idani:
Formal Model Driven Engineering. (Ingénierie Formelle Dirigée par les Modèles). Grenoble Alpes University, France, 2023 - [c37]Salim Chehida, Akram Idani, Mario Cortes Cornax, Germán Vega:
A Formal MDE Framework for Inter-DSL Collaboration. COORDINATION 2023: 232-249 - [c36]Akram Idani, Yves Ledru, Germán Vega:
A Process-Centric Approach to Insider Threats Identification in Information Systems. CRiSIS 2023: 231-247 - 2022
- [j13]Akram Idani:
Formal model-driven executable DSLs. Innov. Syst. Softw. Eng. 18(4): 543-566 (2022) - [c35]Akram Idani, Rim Djedidi, Germán Vega:
Revisiting Ontology Evolution Patterns - A Formal xDSL Approach. MEDI Workshops 2022: 165-178 - [c34]Asfand Yar, Akram Idani, Yves Ledru, Simon Collart Dutilleul:
Visual animation of B specifications using executable DSLs. MoDELS (Companion) 2022: 617-626 - [c33]Akram Idani:
The B Method Meets MDE: Review, Progress and Future. RCIS 2022: 495-512 - 2021
- [c32]Akram Idani:
A Lightweight Development of Outbreak Prevention Strategies Built on Formal Methods and xDSLs. ESSE 2021: 85-93 - 2020
- [j12]Akram Idani, Yves Ledru, Germán Vega:
Alliance of model-driven engineering with a proof-based formal approach. Innov. Syst. Softw. Eng. 16(3): 289-307 (2020) - [c31]Akram Idani:
Dependability of Model-Driven Executable DSLs - Critical Review and Solutions. ECSA Companion 2020: 358-373 - [c30]Asfand Yar, Akram Idani, Simon Collart Dutilleul:
Merging Railway Standard Notations in a Formal DSL-Based Framework. ECSA Companion 2020: 411-419 - [c29]Akram Idani:
Meeduse: A Tool to Build and Run Proved DSLs. IFM 2020: 349-367 - [c28]Akram Idani, Mario Cortes Cornax:
Towards a model driven formal approach for merging data, access control and business processes. MoDELS (Companion) 2020: 57:1-57:5
2010 – 2019
- 2019
- [c27]Akram Idani, Yves Ledru, Abderrahim Ait Wakrime, Rahma Ben Ayed, Simon Collart Dutilleul:
Incremental Development of a Safety Critical System Combining formal Methods and DSMLs - - Application to a Railway System -. FMICS 2019: 93-109 - [c26]Akram Idani, Yves Ledru, Abderrahim Ait Wakrime, Rahma Ben Ayed, Philippe Bon:
Towards a Tool-Based Domain Specific Approach for Railway Systems Modeling and Validation. RSSRail 2019: 23-40 - [c25]Yves Ledru, Akram Idani, Rahma Ben Ayed, Abderrahim Ait Wakrime, Philippe Bon:
A Separation of Concerns Approach for the Verified Modelling of Railway Signalling Rules. RSSRail 2019: 173-190 - [c24]Akram Idani, Germán Vega, Michael Leuschel:
Applying Formal Reasoning to Model Transformation: The Meeduse solution. TTC@STAF 2019: 33-44 - 2018
- [c23]Abderrahim Ait Wakrime, Rahma Ben Ayed, Simon Collart Dutilleul, Yves Ledru, Akram Idani:
Formalizing Railway Signaling System ERTMS/ETCS Using UML/Event-B. MEDI 2018: 321-330 - 2017
- [c22]Akram Idani:
Model driven secure web applications: the SeWAT platform. ECBS 2017: 3:1-3:9 - 2016
- [j11]Salim Chehida, Akram Idani, Yves Ledru, Mustapha Kamel Rahmouni:
Extensions du diagramme d'activité pour la spécification de politiques RBAC. Ingénierie des Systèmes d Inf. 21(2): 11-37 (2016) - [c21]Salim Chehida, Akram Idani, Yves Ledru, Mustapha Kamel Rahmouni:
Combining UML and B for the specification and validation of RBAC policies in business process activities. RCIS 2016: 1-12 - 2015
- [j10]Yves Ledru, Akram Idani, Jérémy Milhau, Nafees Qamar, Régine Laleau, Jean-Luc Richier, Mohamed-Amine Labiadh:
Validation of IS Security Policies Featuring Authorisation Constraints. Int. J. Inf. Syst. Model. Des. 6(1): 24-46 (2015) - [j9]Amira Radhouani, Akram Idani, Yves Ledru, Narjes Ben Rajeb:
Symbolic Search of Insider Attack Scenarios from a Formal Information System Modeling. Trans. Petri Nets Other Model. Concurr. 10: 131-152 (2015) - [j8]Rahma Ben Ayed, Simon Collart Dutilleul, Philippe Bon, Yves Ledru, Akram Idani:
Formalismes basés sur les rôles pour la modélisation et la validation des règles d'exploitation ferroviaires. Tech. Sci. Informatiques 34(5): 495-521 (2015) - [c20]Akram Idani, Yves Ledru:
B for Modeling Secure Information Systems - The B4MSecure Platform. ICFEM 2015: 312-318 - [c19]Yves Ledru, Akram Idani, Jean-Luc Richier:
Validation of a Security Policy by the Test of Its Formal B Specification - A Case Study. FormaliSE@ICSE 2015: 6-12 - [c18]Salim Chehida, Akram Idani, Yves Ledru, Mustapha Kamel Rahmouni:
Extensions du diagramme d'activité pour contrôler l'accès au SI. INFORSID 2015: 151-165 - [e1]Carlos Canal, Akram Idani:
Software Engineering and Formal Methods - SEFM 2014 Collocated Workshops: HOFM, SAFOME, OpenCert, MoKMaSD, WS-FMDS, Grenoble, France, September 1-2, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8938, Springer 2015, ISBN 978-3-319-15200-4 [contents] - 2014
- [j7]Akram Idani, Yves Ledru, Amira Radhouani:
Modélisation graphique et validation formelle de politiques RBAC en systèmes d'information. Plateforme B4MSecure. Ingénierie des Systèmes d Inf. 19(6): 33-61 (2014) - [c17]Amira Radhouani, Akram Idani, Yves Ledru, Narjes Ben Rajeb:
Extraction of Insider Attack Scenarios from a Formal Information System Modeling. FMS @ Petri Nets 2014: 5-19 - [c16]Rahma Ben Ayed, Simon Collart Dutilleul, Philippe Bon, Akram Idani, Yves Ledru:
B Formal Validation of ERTMS/ETCS Railway Operating Rules. ABZ 2014: 124-129 - [c15]Akram Idani, Nicolas Stouls:
When a Formal Model Rhymes with a Graphical Notation. SEFM Workshops 2014: 54-68 - 2013
- [c14]Akram Idani, Yves Ledru, Adil Anwar:
A Rigorous Reasoning about Model Transformations Using the B Method. BMMDS/EMMSAD 2013: 426-440 - 2011
- [j6]Jérémy Milhau, Akram Idani, Régine Laleau, Mohamed-Amine Labiadh, Yves Ledru, Marc Frappier:
Combining UML, ASTD and B for the formal specification of an access control filter. Innov. Syst. Softw. Eng. 7(4): 303-313 (2011) - [c13]Nafees Qamar, Yves Ledru, Akram Idani:
Evaluating RBAC Supported Techniques and their Validation and Verification. ARES 2011: 734-739 - [c12]Yves Ledru, Akram Idani, Jérémy Milhau, Nafees Qamar, Régine Laleau, Jean-Luc Richier, Mohamed-Amine Labiadh:
Taking into Account Functional Models in the Validation of IS Security Policies. CAiSE Workshops 2011: 592-606 - [c11]Nafees Qamar, Yves Ledru, Akram Idani:
Validation of Security-Design Models Using Z. ICFEM 2011: 259-274 - [c10]Yves Ledru, Nafees Qamar, Akram Idani, Jean-Luc Richier, Mohamed-Amine Labiadh:
Validation of security policies by the animation of Z specifications. SACMAT 2011: 155-164 - 2010
- [j5]Akram Idani, Mohamed-Amine Labiadh, Yves Ledru:
Infrastructure dirigée par les modèles pour une intégration adaptable et évolutive de UML et B. Ingénierie des Systèmes d Inf. 15(3): 87-112 (2010)
2000 – 2009
- 2009
- [j4]Akram Idani, Jean-Louis Boulanger, Laurent Philippe:
Linking Paradigms in Safety Critical Systems. Int. J. Comput. Their Appl. 16(2): 111-120 (2009) - [c9]Akram Idani:
UML Models Engineering from Static and Dynamic Aspects of Formal Specifications. BMMDS/EMMSAD 2009: 237-250 - [c8]Akram Idani, Yves Ledru, Mohamed-Amine Labiadh:
Ingénierie Dirigée par les Modèles pour une intégration efficace de UML et B. INFORSID 2009: 261-276 - 2008
- [c7]Akram Idani, Bernard Coulette:
Towards Reverse-Engineering of UML Views from Structured Formal Developments. ICEIS (3-1) 2008: 94-103 - 2007
- [j3]Akram Idani, Yves Ledru:
Object oriented concepts identification from formal B specifications. Formal Methods Syst. Des. 30(3): 217-232 (2007) - [j2]Akram Idani, Yves Ledru, Didier Bert:
Approche formelle pour la dérivation de vues structurelles UML à partir de développements B. Formalisation, preuve et extension pour la prise en compte des raffinements B. Tech. Sci. Informatiques 26(7): 819-851 (2007) - [c6]Akram Idani, Jean-Louis Boulanger, Laurent Philippe:
A Generic Process and its Tool Support towards Combining UML and B for Safety Critical Systems. CAINE 2007: 185-192 - [c5]Akram Idani, Dieu Donné Okalas Ossami, Jean-Louis Boulanger:
Commandments of UML for Safety. ICSEA 2007: 58 - 2006
- [b1]Akram Idani:
B/UML : Mise en relation de spécifications B et de descriptions UML pour l'aide à la validation externe de développements formels en B. (B/UML: Bridging the gap between B specifications and UML graphical descriptions to ease external validation of formal B developments). Joseph Fourier University, Grenoble, France, 2006 - [j1]Akram Idani, Yves Ledru:
Dynamic graphical UML views from formal B specifications. Inf. Softw. Technol. 48(3): 154-169 (2006) - [c4]Akram Idani:
Couplage de spécifications B et de descriptions UML pour l'aide aux développements formels des Systèmes d'Information. INFORSID 2006: 577-593 - [c3]Akram Idani, Yves Ledru, Didier Bert:
A Reverse-Engineering Approach to Understanding B Specifications with UML Diagrams. SEW 2006: 97-106 - 2005
- [c2]Akram Idani, Yves Ledru, Didier Bert:
Derivation of UML Class Diagrams as Static Views of Formal B Developments. ICFEM 2005: 37-51 - 2004
- [c1]Akram Idani, Yves Ledru:
Object Oriented Concepts Identification from Formal B Specifications. FMICS 2004: 159-174
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint