|  | 
|  | 
| | SCSS 2017: Author Index| Author | Papers | 
|---|
 | A |  | Abid, Chiheb Ameur | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems |  | Andrianarivelo, Nirina | Transforming Prefix-constrained or Controlled Rewrite Systems |  | B |  | Ben Youssef, Nihel | Automatic detection and correction of firewall misconfigurations- A formal approach |  | Bhateja, Puneet | Asynchronous testing of real-time systems |  | Bouhoula, Adel | Automatic detection and correction of firewall misconfigurations- A formal approach Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems
 A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment
 |  | Boussabbeh, Maha | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques |  | Brenas, Jon Hael | C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions |  | C |  | Cerna, David | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications |  | E |  | Echahed, Rachid | C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions |  | Evina, Pierrette Annie | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems |  | H |  | Hadj Kacem, Ahmed | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques |  | Haeri, Seyed Hossein | Integration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage |  | Hamdi, Mohamed | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors |  | I |  | Ida, Tetsuo | Origami folds in higher-dimension |  | J |  | Jaidi, Faouzi | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment
 |  | K |  | Kim, Tai-Hoon | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors |  | Klai, Kais | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems |  | L |  | Labbene Ayachi, Faten | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment
 |  | M |  | Mosbah, Mohamed | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques |  | O |  | Ouni, Hiba | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems |  | P |  | Pelletier, Vivien | Transforming Prefix-constrained or Controlled Rewrite Systems |  | R |  | Réty, Pierre | Transforming Prefix-constrained or Controlled Rewrite Systems |  | S |  | Saâdaoui, Amina | Automatic detection and correction of firewall misconfigurations- A formal approach |  | Schreiner, Wolfgang | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications |  | Schupp, Sibylle | Integration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage |  | Strecker, Martin | C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions |  | T |  | Tounsi, Mohamed | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques |  | W |  | Watt, Stephen | Origami folds in higher-dimension |  | Z |  | Zouari, Belhassen | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems |  | Zouari, Jaweher | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors | 
 | 
 | 
|