Security Engineering for Lifelong Evolvable Systems


Export 149 results:
Sort by: Author Title Type [ Year  (Desc)]
Mühlberg, J. T., A Quick Tour of the VeriFast Program Verifier, , 2011.

Talk at a Departmental Seminar of the School of Computing, Newcastle University, UK.

Lund, M. S., B. Solhaug, and K. Stølen, "Risk analysis of changing and evolving systems using CORAS", Foundations of security analysis and design VI, vol. 6858: Springer, pp. 231-274, 2011.
Bergmann, G., F. Massacci, F. Paci, T. Tun, D. Varró, and Y. Yu, "SeCMER: A Tool to Gain Control of Security Requirements Evolution", Towards a Service-Based Internet, vol. 6994: Springer Berlin / Heidelberg, pp. 321-322, 2011. Abstract


Massacci, F., and F. Paci, "Secure Collaborative Systems", In Trustworthy Internet: Springer, 2011.
Heyman, T., K. Yskout, R. Scandariato, H. Schmidt, and Y. Yu, "The Security Twin Peaks", International Symposium on Engineering Secure Software and Systems, 2011.
Fourneret, E., F. Bouquet, F. Dadeau, and S. Debricon, "Selective Test Generation Method for Evolving Critical Systems", REGRESSION'11, 1st Int. Workshop on Regression Testing - co-located with ICST'2011, Berlin, Germany, IEEE Computer Society Press, pp. 125–134, 2011.
Jürjens, J., and B. Nuseibeh, "Software Engineering for Secure Systems", 33rd International Conference on Software Engineering (ICSE 2011), 2011.
Knauss, E., S. Houmb, K. Schneider, S. Islam, and J. Jürjens, "Supporting Requirements Engineers in Recognising Security Issues", 17th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2011), Essen, 28-30 Mar. 2011, Springer, 2011.
Dragoni, N., O. Gadyatskaya, and F. Massacci, "Supporting Software Evolution for Open Smart Cards by Security-by-Contract", Dependability and Computer Engineering: Concepts for Software-Intensive Systems: IGI , 2011.
Hatebur, D., M. Heisel, J. Jürjens, and H. Schmidt, "Systematic Development of UMLsec Design Models Based On Security Requirements", 14th International Conference on Fundamental Approaches to Software Engineering (FASE 2011), Saarbrücken, Germany, 26 March - 3 April, 2011, Springer, 2011.
Montrieux, L., M. Wermelinger, and Y. Yu, "Tool support for UML-based specification and verification of role-based access control properties", 8th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2011. Abstract

The UML profile and example described in this paper can be downloaded from the Related URL given below. Pages: 456-459 ISBN: 978-1-4503-0443-6

Fourneret, E., and F. Bouquet, "UML/OCL based impact analysis to test evolvin critical software", ETAI'11, Society for Electronics, Telecommunications, Automatics and Informatics 10-th Int. Conf., Ohrid, Macedonia, 2011.
Lund, M. S., B. Solhaug, and K. Stølen, "Using CORAS to Support Change Management", Model-Driven Risk Analysis: The CORAS Approach: Springer, 2011.
Jacobs, B., J. Smans, and F. Piessens, "Verification of unloadable modules", 17th International Symposium on Formal Methods (FM 2011), vol. 6664: Springer, pp. 402–416, 2011.

Limerick (Ireland), 20-24 June 2011

Mühlberg, J. T., and L. Freitas, "Verifying FreeRTOS: from requirements to binary code", Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11), vol. CS-TR-1272, 2011.

Short paper

Jacobs, B., J. Smans, and F. Piessens, "A quick tour of the VeriFast program verifier", Programming Languages and Systems (APLAS 2010): Springer-Verlag, pp. 304–311, November, 2010.
Jacobs, B., and F. Piessens, Expressive modular fine-grained concurrency specification (Extended version), , no. CW590: Department of Computer Science, K.U.Leuven, July, 2010.
Massacci, F., and V. H. Nguyen, "Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox", International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.