Cédric Bouhours

Cédric Bouhours
University of Clermont Auvergne | Univ BPC · Institut Universitaire de Technologie (IUT)

PhD

About

23
Publications
5,402
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
113
Citations
Introduction

Publications

Publications (23)
Conference Paper
Full-text available
Dans le but d'aider les concepteurs dans le choix des patrons de sécurité face aux attaques, nous présentons dans ce papier un data-store regroupant les attaques et les patrons de sécurité. Il permet également la génération automatique d'arbres d'attaques et de défenses ainsi que la génération de squelettes de cas de test. La méthodologie proposée...
Article
Dans le but de concevoir des applications ne pre ́sentant pas de vulne ́rabilite ́, la se ́curite ́ doit eˆtre prise en compte de`s les premie`res phases du cycle de vie du logiciel. Dans ce contexte, la communaute ́ du Ge ́nie Logiciel a propose ́ la notion de patron de se ́curite ́, qui repre ́sente une solution re ́utilisable pour mode ́liser de...
Conference Paper
Full-text available
Security patterns are generic solutions that can be applied since early stages of software life to overcome recurrent security weaknesses. Their generic nature and growing number make their choice difficult, even for experts in system design. To help them on the pattern choice, this paper proposes a semi- automatic methodology of classification and...
Conference Paper
Full-text available
The last decade has witnessed significant contributions in software engineering to design more secure systems and applications. Software designers can now leverage specific patterns, called security patterns as reusable solutions to model more secure applications. But, despite the advantages offered by security patterns, these are rarely used in pr...
Conference Paper
Full-text available
La sécurité des applications est critique et primordiale pour la préservation des données personnelles et elle doit donc être prise en compte dès les premières phases du cycle de vie d‟une application. P our cela, une possibilité est de profiter des patrons de sécurité, qui offrent les lignes directrices pour le développement d‟une application s...
Article
Full-text available
Design patterns were popularized by the GoF catalog in 1995. This catalog contains 23 design patterns which concern 23 design problems. Each pattern is detailed with its structure, its intent, and some information including applicability conditions and some possible variations which enable it to be re-used. In 1995, they were the cutting edge thoug...
Conference Paper
Full-text available
In order to guarantee the use of good analysis and design practices and an easier maintenance of software, analysts and designers may use patterns. To help them, we propose models inspection in order to detect instantiations of “spoiled pattern” and models reworking through the use of the design patterns. As a design pattern allows the instantiatio...
Conference Paper
Full-text available
Existing pattern detection methods generally use code information obtained during reengineering process. However, none of these methods exclusively works with design information. In this paper, we propose a novel pattern detection method based on structural properties of UML models. This technique allows the detection of any kind of generic micro-a...
Book
L'ingénierie des modèles considère les modèles comme des entités de première classe pour le développement logiciel. Les processus dirigés par les modèles se doivent d'être capables de prendre en compte le savoir-faire d'experts, généralement exprimé en termes de patrons. Choisir le bon patron et assurer sa bonne intégration au sein d'une modélisati...
Article
Models driven engineering considers models first class entities for the software development. The models driven processes must be able to take into account the know-how of experts, generally expressed in terms of analysis, architectural of design patterns. To choose the right pattern and to ensure its correct integration within a model constitute c...
Article
Full-text available
To give a consistent and more valuable property on models, model-driven processes should be able to reuse the expert knowledge generally expressed in terms of patterns. We focus our work on the design stage and on the systematically use of design patterns. Choose a good design pattern and ensure the correct integration of the chosen pattern are non...
Thesis
Full-text available
L'ingénierie des modèles considère les modèles comme des entités de première classe pour le développement logiciel. Les processus dirigés par les modèles se doivent d'être capables de prendre en compte le savoir-faire d'experts, généralement exprimé en termes de patrons, qu'ils soient d'analyse, de conception ou d'architecture. Choisir le bon patro...
Conference Paper
Full-text available
To give a consistent and more valuable feature on models, we propose that model-driven processes should be able to reuse the expert knowledge generally expressed in terms of patterns. In order to formalize and use them, some design pattern ontologies have been developed. To share them on the Web they have been implemented using the OWL language. Th...
Technical Report
Full-text available
To give a consistent and more valuable feature on models, we propose that model-driven processes should be able to reuse the expert knowledge generally expressed in terms of patterns. We focus our study on a detailed design review activity, which precedes a coding stage in an object-oriented language. We make the hypothesis that design models lack...
Conference Paper
Full-text available
In this paper, we suggest to directly take into account the know -how of experts during activities of a process development. Such a work imposes to be able to analyze and to transform models , in particular in order to inject design patterns. Our approach considers models produced by the process as potential alternative models which can be replaced...

Network

Cited By