Publications
"Run-time Security Traceability for Evolving Systems",
The Computer Journal: Oxford Univ. Press, 2010.
"Risk and argument: A risk-based argumentation method for practical security",
19th IEEE International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 239-248, August 29 2011.
Abstract
"Risk analysis of changing and evolving systems using CORAS",
Foundations of security analysis and design VI, vol. 6858: Springer, pp. 231-274, 2011.
"Requirement Evolution: Towards a Methodology and Framework",
The CaiSE’11 Doctoral Consortium, London, 2011.
A Quick Tour of the VeriFast Program Verifier,
, 2011.
Talk at a Departmental Seminar of the School of Computing, Newcastle University, UK.
"A quick tour of the VeriFast program verifier",
Programming Languages and Systems (APLAS 2010): Springer-Verlag, pp. 304–311, November, 2010.
"Quick fix generation for DSMLs",
IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2011, Pittsbourgh, PA, USA, IEEE Computer Society, 09/2011.
Abstract
Acceptance rate: 33%
"Problem Analysis of Traditional IT-Security Risk Assessment Methods – An Experience Report",
IFIP SEC 2011, 2011.
"PrimAndroid: privacy policy modelling and analysis for Android applications",
IEEE International Symposium on Policies for Distributed Systems and Networks, June, 2011.
Abstract
"Parallelization of Graph Transformation Based on Incremental Pattern Matching",
8th International Workshop on Graph Transformation and Visual Modeling Techniques, York, United Kingdom, 2009.
Paradigma "Lebendige Sicherheit".,
, vol. 11, no. 1, 2011.
pp. 38-39.
"Orchestrating Security and System Engineering for Evolving Systems",
ServiceWave, pp. 134-143, 2011.
"Optimizing IRM with Automata Modulo Theory",
In the 5th International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.
"OpenArgue: supporting argumentation to evolve secure software systems",
2011 IEEE 19th International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 351–352, August 2011.
Abstract
ISBN: 978-1-4577-0924-1
"On-Device Control Flow Verification for Java Programs",
Proc. of ESSoS’11, ACM/IEEE 3rd International Symposium on Engineering Secure Software and Systems, 2011.
"An NFR Pattern Approach to Dealing with NFRs",
IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.
"MoVEing Forward: Towards an Architecture and Processes for a Living Models Infrastructure",
International Journal On Advances in Life Sciences, vol. 3, no. 1 and 2, pp. 12–22, 2011.
"Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications (invited lecture)",
11th School on Formal Methods (SFM 2011), Bertinoro, Italy, 2011.
"Modeling and Managing System Evolution Description of EternalS Task Force 2",
Leveraging Applications of Formal Methods, Verification, and Validation 4th International Symposium on Leveraging Applications, Isola 2010, Heraklion, Greece, 10/2010.
"A Model-driven Framework for Guided Design Space Exploration",
26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, USA, IEEE Computer Society, 11/2011.
Abstract
ACM Distinguished Paper Award, Acceptance rate: 15%
"Model-Based Security Verification and Testing for Smart-cards",
6th Intl. Conf. on Availability, Reliability and Security (ARES 2011), Vienna, Austria, 2011.
"Model-based Security Engineering with UML",
26th IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010), Madrid, 21-25 Sep. 2010, 2010.