Security Engineering for Lifelong Evolvable Systems

Publications

Export 149 results:
Sort by: Author Title [ Type  (Asc)] Year
Conference Paper
Fourneret, E., M. Ochoa, F. Bouquet, J. Botella, J. Jürjens, and P. Yousefi, "Model-Based Security Verification and Testing for Smart-cards", 6th Intl. Conf. on Availability, Reliability and Security (ARES 2011), Vienna, Austria, 2011.
Hegedüs, A., A. Horváth, I. Ráth, and D. Varró, "A Model-driven Framework for Guided Design Space Exploration", 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, USA, IEEE Computer Society, 11/2011. Abstract

ACM Distinguished Paper Award, Acceptance rate: 15%

Hafner, M., "Modeling and Managing System Evolution Description of EternalS Task Force 2", Leveraging Applications of Formal Methods, Verification, and Validation 4th International Symposium on Leveraging Applications, Isola 2010, Heraklion, Greece, 10/2010.
Fontaine, A., S. Hym, and I. Simplot-Ryl, "On-Device Control Flow Verification for Java Programs", Proc. of ESSoS’11, ACM/IEEE 3rd International Symposium on Engineering Secure Software and Systems, 2011.
Yu, Y., T. Tun, A. Tedeschi, V. N. L. Franqueira, and B. Nuseibeh, "OpenArgue: supporting argumentation to evolve secure software systems", 2011 IEEE 19th International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 351–352, August 2011. Abstract

ISBN: 978-1-4577-0924-1

Massacci, F., and I. Siahaan, "Optimizing IRM with Automata Modulo Theory", In the 5th International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.
Bergmann, G., I. Ráth, and D. Varró, "Parallelization of Graph Transformation Based on Incremental Pattern Matching", 8th International Workshop on Graph Transformation and Visual Modeling Techniques, York, United Kingdom, 2009.
Benats, G., A. Bandara, Y. Yu, J. - N. Colin, and B. Nuseibeh, "PrimAndroid: privacy policy modelling and analysis for Android applications", IEEE International Symposium on Policies for Distributed Systems and Networks, June, 2011. Abstract
Hegedüs, A., A. Horváth, I. Ráth, M. C. Branco, and D. Varró, "Quick fix generation for DSMLs", IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2011, Pittsbourgh, PA, USA, IEEE Computer Society, 09/2011. Abstract

Acceptance rate: 33%

Jacobs, B., J. Smans, and F. Piessens, "A quick tour of the VeriFast program verifier", Programming Languages and Systems (APLAS 2010): Springer-Verlag, pp. 304–311, November, 2010.
Franqueira, V. N. L., T. T. Tun, Y. Yu, R. Wieringa, and B. Nuseibeh, "Risk and argument: A risk-based argumentation method for practical security", 19th IEEE International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 239-248, August 29 2011. Abstract
Hegedüs, A., Z. Ujhelyi, and G. Bergmann, "Saying Hello World with VIATRA2 - A Solution to the TTC 2011 Instructive Case", TTC 2011: Fifth Transformation Tool Contest, Zürich, Switzerland, June 29-30 2011, Post-Proceedings, vol. 74, Zürich, Switzerland, Open Publishing Association, pp. 302-324, 11/2011. Abstract
Bouquet, F., R. Breu, J. Jurjens, F. Massacci, V. Meduri, Z. Micskei, F. Piessens, K. Stolen, and D. Varró, "SecureChange: Security Engineering for Lifelong Evolvable Systems", European Future Technologies Conference and Exhibition (FET09), Prague, Czech Republic, 04/2009. Abstract
Memon, M., M. Hafner, and R. Breu, "Security As A Service: A Reference Architecture for SOA", 7th International Workshop on Security in Information Systems (WOSIS 2009), Milan, Italy, Springer, 05/2009.
Heyman, T., K. Yskout, R. Scandariato, H. Schmidt, and Y. Yu, "The Security Twin Peaks", International Symposium on Engineering Secure Software and Systems, 2011.
Fourneret, E., F. Bouquet, F. Dadeau, and S. Debricon, "Selective Test Generation Method for Evolving Critical Systems", REGRESSION'11, 1st Int. Workshop on Regression Testing - co-located with ICST'2011, Berlin, Germany, IEEE Computer Society Press, pp. 125–134, 2011.
Hegedüs, A., Z. Ujhelyi, and G. Bergmann, "Solving the TTC 2011 Reengineering Case with VIATRA2", TTC 2011: Fifth Transformation Tool Contest, Zürich, Switzerland, June 29-30 2011, Post-Proceedings, vol. 74, Zürich, Switzerland, Open Publishing Association, pp. 136-148, 11/2011. Abstract
Ochoa, M., J. Jürjens, and D. Warzecha, "A Sound Decision Procedure for the Compositionality of Secrecy", 4th International Symposium on Engineering Secure Software and Systems (ESSOS 2012): Springer, 2012.
Yu, Y., T. T. Tun, and B. Nuseibeh, "Specifying and detecting meaningful changes in programs", 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), IEEE, Lawrence, KS, USA, pp. 273-282, November 6-10, 2011. Abstract
Knauss, E., S. Houmb, K. Schneider, S. Islam, and J. Jürjens, "Supporting Requirements Engineers in Recognising Security Issues", 17th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2011), Essen, 28-30 Mar. 2011, Springer, 2011.
Hatebur, D., M. Heisel, J. Jürjens, and H. Schmidt, "Systematic Development of UMLsec Design Models Based On Security Requirements", 14th International Conference on Fundamental Approaches to Software Engineering (FASE 2011), Saarbrücken, Germany, 26 March - 3 April, 2011, Springer, 2011.