english version Toutes les publications de l'équipe
Publications - Lilian Burdy
[Format BibTeX]

[BHP07] Lilian Burdy, Marieke Huisman, and Mariela Pavlova. Preliminary design of BML: A behavioral interface specification language for Java bytecode. In Fundamental Approaches to Software Engineering (FASE 2007), volume 4422 of Lecture Notes in Computer Science, pages 215-229. Springer-Verlag, 2007. [ bib | .pdf ]
[BBC+07] G. Barthe, L. Burdy, J. Charles, B. Grégoire, M. Huisman, J.-L. Lanet, M. Pavlova, and A. Requet. JACK: a tool for validation of security and behaviour of Java applications. In FMCO: Proceedings of 5th International Symposium on Formal Methods for Components and Objects, Lecture Notes in Computer Science. Springer-Verlag, 2007. To appear. [ bib | .pdf ]
[BP06] L. Burdy and M. Pavlova. Java bytecode specification and verification. In L.M. Liebrock, editor, proceedings of SAC'06. ACM, 2006. [ bib | .pdf ]
[BCC+05] L. Burdy, Y. Cheon, D.R. Cok, M.D. Ernst, J. Kiniry, G.T. Leavens, K.R.M. Leino, and E. Poll. An overview of JML tools and applications. International Journal on Software Tools for Technology Transfer, 2005. [ bib ]
[PBB+04] M. Pavlova, G. Barthe, L. Burdy, M. Huisman, and J.-L. Lanet. Enforcing high-level security properties for applets. In P. Paradinas and J.-J. Quisquater, editors, Proceedings of CARDIS'04, Toulouse, France, August 2004. Kluwer Academic Publishers. [ bib | .pdf ]
[BCC+03] L. Burdy, Y. Cheon, D. Cok, M. Ernst, J. Kiniry, G. T. Leavens, K. R. M. Leino, and E. Poll. An overview of jml tools and applications. In T. Arts and W. Fokkink, editors, FMICS: Eighth International Workshop on Formal Methods for Industrial Critical Systems, volume 80 of Electronic Notes in Theoretical Computer Science. Elsevier Publishing, June 5-7 2003. [ bib | .ps.gz ]
[BRL03] L. Burdy, A. Requet, and J.-L. Lanet. Java applet correctness: A developer-oriented approach. In K. Araki, S. Gnesi, and D. Mandrioli, editors, FME 2003: Formal Methods: International Symposium of Formal Methods Europe, volume 2805 of Lecture Notes in Computer Science, pages 422-439. Springer-Verlag, 2003. [ bib | .ps.gz ]
[BR03] L. Burdy and A. Requet. Extending B with control flow breaks. In D. Bert, J.P. Bowen, S. King, and M. Waldén, editors, ZB 2003: Formal Specification and Development in Z and B, volume 2651 of Lecture Notes in Computer Science, pages 513-527. Springer-Verlag, 2003. [ bib | .ps.gz ]
[BCR03] L. Burdy, L. Casset, and A. Requet. Développement d'un vérifieur de byte-code embarqué. Technique et Science Informatiques, 22(1):33-60, 2003. [ bib | .ps.gz ]
[PBB+03] M. Pavlova, G. Barthe, L. Burdy, M. Huisman, and J.-L. Lanet. Enforcing high-level security properties for applets. Technical Report RR-5061, INRIA, 2003. [ bib | .html ]

This file has been generated by bibtex2html 1.87.

on Tue, 02 Sep 2008 00:00:08 +0200