Security Engineering for Lifelong Evolvable Systems

Publications

Export 149 results:
Sort by: Author [ Title  (Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
D
L.M.S.Tran, and F.Massacci, "Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution", 23rd International Conference on Advanced Information Systems Engineering (CAiSE'11), London, Sringer-Verlag , 2011.
Ujhelyi, Z., A. Horváth, and D. Varró, "Dynamic Backwards Slicing of Model Transformations", Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on, 04/2012.

Accepted

E
Omerovic, A., B. Solhaug, and K. Stølen, "Evaluation of experiences from applying the PREDIQT method in an industrial case study", Secure System Integration and Reliability Improvement (SSIRI), Korea, IEEE Computer Society, 06/2011.
Felderer, M., B. Agreiter, and R. Breu, "Evolution of Security Requirements Tests for Service-Centric Systems", International Symposium on Engineering Secure Software and Systems, Madrid, Spain, Springer-Verlag, 02/2011. Abstract
Felici, M., V. Meduri, B. Solhaug, and A. Tedeschi, "Evolutionary risk analysis: Expert judgement", Computer safety, reliability, and security (SAFECOMP), Italy, Springer, 09/2011.
Horváth, A., G. Bergmann, I. Ráth, and D. Varró, "Experimental Assessment of Combining Pattern Matching Strategies with VIATRA2", International Journal on Software Tools for Technology Transfer, vol. 12, pp. 211-230, 2010. Abstract
Jacobs, B., and F. Piessens, "Expressive modular fine-grained concurrency specification", Principles of Programming Languages (POPL 2011), January, 2011.
Jacobs, B., and F. Piessens, Expressive modular fine-grained concurrency specification (Extended version), , no. CW590: Department of Computer Science, K.U.Leuven, July, 2010.
Massacci, F., J. Mylopoulos, F. Paci, T. T. Tun, and Y. Yu, "An Extended Ontology for Security Requirements", Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011. Abstract

10.1007/978-3-642-22056-2_64

F
Jacobs, B., and F. Piessens, "Failboxes: Provably safe exception handling", ECOOP 2009 - Object-Oriented Programming, 23rd European Conference, Genova, Italy, July 6-10, 2009, Proceedings, vol. 5653: Springer-Verlag, pp. 470–494, 07/2009.
Pironti, A., and J. Jürjens, "Formally Based Black Box Monitoring of Security Protocols", International Symposium on Engineering Secure Software and Systems (ESSOS 2010): Springer-Verlag, 2010.
Hegedüs, A., I. Ráth, and D. Varró, From BPEL to SAL and Back: a Tool Demo on Back-Annotation with VIATRA2, : Consiglio Nazionale delle Ricerche (CNR), pp. 35-42, 09/2010.

Accepted for the SEFM'2010 "Posters and Tool Demo Session" Track

Mouratidis, H., and J. Jürjens, "From Goal-Driven Security Requirements Engineering to Secure Design", International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
G
Julliand, J., P. - A. Masson, R. Tissot, and P. - C. Bué, "Generating Tests from B Specifications and Dynamic Selection Criteria", FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.

Revised and extended version of a paper from the ABZ'08 conference

Bergmann, G., Z. Ujhelyi, I. Ráth, and D. Varró, "A Graph Query Language for EMF models", Theory and Practice of Model Transformations, Fourth International Conference, ICMT 2011, Zurich, Switzerland, June 27-28, 2011. Proceedings, vol. 6707: Springer, pp. 167-182, 2011. Abstract
Bergmann, G., D. Horváth, and A. Horváth, "Graph Transformation with Incremental Pattern Matching on a Relational Database", International Symposium on Applications of Graph Transformation With Industrial Relevance (AGTIVE 2011), Budapest, Hungary, 10/2011.

In Review for Post-proceedings.