Security Engineering for Lifelong Evolvable Systems

Publications

Export 149 results:
Sort by: Author Title Type [ Year  (Asc)]
2011
Butler, S., M. Wermelinger, Y. Yu, and H. Sharp, "Mining Java class naming conventions", 27th IEEE International Conference on Software Maintenance: IEEE, 2011. Abstract
Jürjens, J., and H. Schmidt, "Model-Based Secure Software Development", 8th International Workshop on Security in Information Systems (WOSIS 2011), 13th International Conference on Enterprise Information Systems (ICEIS 2011), Beijing, June 2011, 2011.
Jürjens, J., "Model-Based Security Engineering for Evolving Systems", 11th School on Formal Methods (SFM 2011), Bertinoro (Italy) 13-18 June 2011, Springer, 2011.
Fourneret, E., M. Ochoa, F. Bouquet, J. Botella, J. Jürjens, and P. Yousefi, "Model-Based Security Verification and Testing for Smart-cards", 6th Intl. Conf. on Availability, Reliability and Security (ARES 2011), Vienna, Austria, 2011.
Breu, M., R. Breu, and S. Loew, "MoVEing Forward: Towards an Architecture and Processes for a Living Models Infrastructure", International Journal On Advances in Life Sciences, vol. 3, no. 1 and 2, pp. 12–22, 2011.
Fontaine, A., S. Hym, and I. Simplot-Ryl, "On-Device Control Flow Verification for Java Programs", Proc. of ESSoS’11, ACM/IEEE 3rd International Symposium on Engineering Secure Software and Systems, 2011.
Mühlberg, J. T., A Quick Tour of the VeriFast Program Verifier, , 2011.

Talk at a Departmental Seminar of the School of Computing, Newcastle University, UK.

Lund, M. S., B. Solhaug, and K. Stølen, "Risk analysis of changing and evolving systems using CORAS", Foundations of security analysis and design VI, vol. 6858: Springer, pp. 231-274, 2011.
Bergmann, G., F. Massacci, F. Paci, T. Tun, D. Varró, and Y. Yu, "SeCMER: A Tool to Gain Control of Security Requirements Evolution", Towards a Service-Based Internet, vol. 6994: Springer Berlin / Heidelberg, pp. 321-322, 2011. Abstract

10.1007/978-3-642-24755-2_35

Massacci, F., and F. Paci, "Secure Collaborative Systems", In Trustworthy Internet: Springer, 2011.
Heyman, T., K. Yskout, R. Scandariato, H. Schmidt, and Y. Yu, "The Security Twin Peaks", International Symposium on Engineering Secure Software and Systems, 2011.
Fourneret, E., F. Bouquet, F. Dadeau, and S. Debricon, "Selective Test Generation Method for Evolving Critical Systems", REGRESSION'11, 1st Int. Workshop on Regression Testing - co-located with ICST'2011, Berlin, Germany, IEEE Computer Society Press, pp. 125–134, 2011.
Jürjens, J., and B. Nuseibeh, "Software Engineering for Secure Systems", 33rd International Conference on Software Engineering (ICSE 2011), 2011.
Knauss, E., S. Houmb, K. Schneider, S. Islam, and J. Jürjens, "Supporting Requirements Engineers in Recognising Security Issues", 17th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2011), Essen, 28-30 Mar. 2011, Springer, 2011.
Dragoni, N., O. Gadyatskaya, and F. Massacci, "Supporting Software Evolution for Open Smart Cards by Security-by-Contract", Dependability and Computer Engineering: Concepts for Software-Intensive Systems: IGI , 2011.