Security Engineering for Lifelong Evolvable Systems

Publications

Export 149 results:
Sort by: Author Title Type [ Year  (Desc)]
2011
Hegedüs, A., Z. Ujhelyi, and G. Bergmann, "Solving the TTC 2011 Reengineering Case with VIATRA2", TTC 2011: Fifth Transformation Tool Contest, Zürich, Switzerland, June 29-30 2011, Post-Proceedings, vol. 74, Zürich, Switzerland, Open Publishing Association, pp. 136-148, 11/2011. Abstract
Ujhelyi, Z., A. Horváth, and D. Varró, "Towards Dynamic Backward Slicing of Model Transformations", 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, IEEE Computer Society, 11/2011.
Bergmann, G., D. Horváth, and A. Horváth, "Graph Transformation with Incremental Pattern Matching on a Relational Database", International Symposium on Applications of Graph Transformation With Industrial Relevance (AGTIVE 2011), Budapest, Hungary, 10/2011.

In Review for Post-proceedings.

Felici, M., V. Meduri, B. Solhaug, and A. Tedeschi, "Evolutionary risk analysis: Expert judgement", Computer safety, reliability, and security (SAFECOMP), Italy, Springer, 09/2011.
Hegedüs, A., A. Horváth, I. Ráth, M. C. Branco, and D. Varró, "Quick fix generation for DSMLs", IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2011, Pittsbourgh, PA, USA, IEEE Computer Society, 09/2011. Abstract

Acceptance rate: 33%

Ujhelyi, Z., A. Horváth, and D. Varró, "Static Type Checking of Model Transformation Programs", Electronic Communications of the EASST, International Conference on Graph Transformation 2010 - Doctoral Symposium, vol. 38, 09/2011. Abstract

Accepted

Hegedüs, A., A. Horváth, and D. Varró, "Towards Guided Trajectory Exploration of Graph Transformation Systems", Electronic Communications of the EASST, Petri Nets and Graph Transformations 2010, vol. 40, 08/2011. Abstract
Paci, F., M. Mecella, M. Ouzzani, and E. Bertino, "ACConv-An access control model for conversational Web services", ACM Transactions on the Web , vol. Volume 5 , issue Issue 3, 07/2011 .
Omerovic, A., B. Solhaug, and K. Stølen, "Evaluation of experiences from applying the PREDIQT method in an industrial case study", Secure System Integration and Reliability Improvement (SSIRI), Korea, IEEE Computer Society, 06/2011.
Hegedüs, A., Z. Ujhelyi, I. Ráth, and A. Horváth, "Visualization of Traceability Models with Domain-specific Layouting", Electronic Communications of the EASST, Proceedings of the Fourth International Workshop on Graph-Based Tools, vol. 32, 04/2011. Abstract
Felderer, M., B. Agreiter, and R. Breu, "Evolution of Security Requirements Tests for Service-Centric Systems", International Symposium on Engineering Secure Software and Systems, Madrid, Spain, Springer-Verlag, 02/2011. Abstract
Innerhofer-Oberperfler, F., M. Hafner, and R. Breu, "Living Security — Collaborative Security Management in a Changing World", Tenth IASTED International Conference on Software Engineering SE 2011, Innsbruck, Austria, ACTA Press, 02/2011.
Felderer, M., B. Agreiter, and R. Breu, "Managing Evolution of Service Centric Systems by Test Models", The Tenth IASTED International Conference on Software Engineering, Innsbruck, Austria, ACTA Press, 02/2011. Abstract
Vogels, F., B. Jacobs, F. Piessens, and J. Smans, "Annotation inference for separation logic based verifiers", Formal Techniques for Distributed Systems (FMOODS/FORTE 2011), vol. 6722: Springer, pp. 319–333, 2011.

Reykjavik, Iceland, 6-9 June 2011

Philippaerts, P., F. Vogels, J. Smans, B. Jacobs, and F. Piessens, "The Belgian electronic identity card: a verification case study", Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.

Newcastle (UK), 12-14 September 2011, to appear

Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120