Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jérémy Milhau is active.

Publication


Featured researches published by Jérémy Milhau.


conference on advanced information systems engineering | 2011

Taking into Account Functional Models in the Validation of IS Security Policies

Yves Ledru; Akram Idani; Jérémy Milhau; Nafees Qamar; Régine Laleau; Jean-Luc Richier; Mohamed-Amine Labiadh

Designing a security policy for an information system (IS) is a non-trivial task. Variants of the RBAC model can be used to express such policies as access-control rules associated to constraints. In this paper, we advocate that currently available tools do not take sufficiently into account the functional description of the application and its impact on authorisation constraints and dynamic aspects of security. We suggest to translate both security and functional models into a formal language, such as B, whose analysis and animation tools will help validate a larger set of security scenarios. We show how various kinds of constraints can be expressed and animated in this context.


Innovations in Systems and Software Engineering | 2011

Combining UML, ASTD and B for the formal specification of an access control filter

Jérémy Milhau; Akram Idani; Régine Laleau; Mohamed-Amine Labiadh; Yves Ledru; Marc Frappier

Combination of formal and semi-formal methods is more and more required to produce specifications that can be, on the one hand, understood and thus validated by both designers and users and, on the other hand, precise enough to be verified by formal methods. This motivates our aim to use these complementary paradigms in order to deal with security aspects of information systems. This paper presents a methodology to specify access control policies starting with a set of graphical diagrams: UML for the functional model, SecureUML for static access control and ASTD for dynamic access control. These diagrams are then translated into a set of B machines. Finally, we present the formal specification of an access control filter that coordinates the different kinds of access control rules and the specification of functional operations. The goal of such B specifications is to rigorously check the access control policy of an information system taking advantage of tools from the B method.


integrated formal methods | 2010

Systematic translation rules from ASTD to event-B

Jérémy Milhau; Marc Frappier; Frédéric Gervais; Régine Laleau

This article presents a set of translation rules to generate Event-B machines from process-algebra based specification languages such as ASTD. Illustrated by a case study, it details the rules and the process of the translation. The ultimate goal of this systematic translation is to take advantage of Rodin, the Event-B platform to perform proofs, animation and model-checking over the translated specification.


Formal Aspects of Computing | 2014

Refinement patterns for ASTDs

Marc Frappier; Frédéric Gervais; Régine Laleau; Jérémy Milhau

This paper introduces three refinement patterns for algebraic state-transition diagrams (astds): state refinement, transition refinement and loop-transition refinement. These refinement patterns are derived from practice in using astds for specifying information systems and security policies in two industrial research projects. Two refinement relations used in these patterns are formally defined. For each pattern, proof obligations are proposed to ensure preservation of behaviour through refinement. The proposed refinement relations essentially consist in preserving scenarios by replacing abstract events with concrete events, or by introducing new events. Deadlocks cannot be introduced; divergence over new events is allowed in one of the refinement relation. We prove congruence-like properties for these three patterns, in order to show that they can be applied to a subpart of a specification while preserving global properties. These three refinement patterns are illustrated with a simple case study of a complaint management system.


integrated formal methods | 2009

Automatic Generation of Error Messages for the Symbolic Execution of EB3 Process Expressions

Jérémy Milhau; Benoît Fraikin; Marc Frappier

This paper describes an algorithm to automatically generate error messages for events refused by a process expression. It can be used in the context of an information system specified with the EB3 method. In this method, a process expression is used to describe the valid traces of events that the information system must accept. If a user submits an event which is rejected by this process expression, our algorithm produces an error message explaining why the event has been rejected; it also suggests which event should be submitted in order to correct the error.


ACM Sigsoft Software Engineering Notes | 2012

Refinement patterns for ASTD

Jérémy Milhau; Frédéric Gervais; Régine Laleau; Marc Frappier

astd is a formal and graphical language specifically defined for information system specification. Up to now, a specifier had to build an astd specification from scratch and there were no refinement techniques for stepwise construction. This paper aims at introducing refinement patterns for astd, which are inspired from real case studies. For each pattern, proof obligations have been identified to define the refinement semantics we want to provide. The three refinement patterns presented in the paper are illustrated by an example of a basic complaint management system.


foundations and practice of security | 2011

A metamodel of the b modeling of access-control policies: work in progress

Jérémy Milhau; Marc Frappier; Régine Laleau

Verification and validation of access-control policies for information systems is a difficult yet necessary task. In order to take advantage of the formal properties and tools of the B method, we introduce in this paper a metamodel of the B modeling of access control policies. This metamodel lead to the development of a formal prototype of an access control filter combined to the system. It allows verification and validation of policies before implementation.


international conference on enterprise information systems | 2010

MODEL-DRIVEN ENGINEERING OF FUNCTIONAL SECURITY POLICIES

Marc Frappier; Frédéric Gervais; Pierre Konopacki; Régine Laleau; Jérémy Milhau; Richard St-Denis


Archive | 2010

iASTD : un interpr'eteur pour les ASTD

Kevin Salabert; Jérémy Milhau; Benoît Fraikin; Marc Frappier; Frédéric Gervais; Régine Laleau


International Workshop on Model-Based and Policy-Based Engineering in Information Security | 2018

A FOUR-CONCERN-ORIENTED SECURE IS DEVELOPMENT APPROACH

Marc Frappier; Frédéric Gervais; Pierre Konopacki; Régine Laleau; Jérémy Milhau; Richard St-Denis

Collaboration


Dive into the Jérémy Milhau's collaboration.

Top Co-Authors

Avatar

Marc Frappier

Université de Sherbrooke

View shared research outputs
Top Co-Authors

Avatar

Régine Laleau

Université de Sherbrooke

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Benoît Fraikin

Université de Sherbrooke

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Régine Laleau

Université de Sherbrooke

View shared research outputs
Top Co-Authors

Avatar

Akram Idani

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Mohamed-Amine Labiadh

Centre national de la recherche scientifique

View shared research outputs
Researchain Logo
Decentralizing Knowledge