Publications
"Problem Analysis of Traditional IT-Security Risk Assessment Methods – An Experience Report",
IFIP SEC 2011, 2011.
A Quick Tour of the VeriFast Program Verifier,
, 2011.
Talk at a Departmental Seminar of the School of Computing, Newcastle University, UK.
"Requirement Evolution: Towards a Methodology and Framework",
The CaiSE’11 Doctoral Consortium, London, 2011.
"Risk analysis of changing and evolving systems using CORAS",
Foundations of security analysis and design VI, vol. 6858: Springer, pp. 231-274, 2011.
SeAAS – Introduction and Empirical Performance Evaluation,
, no. QE-2011-24: QE, 2011.
"SeCMER: A Tool to Gain Control of Security Requirements Evolution",
Towards a Service-Based Internet, vol. 6994: Springer Berlin / Heidelberg, pp. 321-322, 2011.
Abstract
10.1007/978-3-642-24755-2_35
"Secure Collaborative Systems",
In Trustworthy Internet: Springer, 2011.
"The Security Twin Peaks",
International Symposium on Engineering Secure Software and Systems, 2011.
"Selective Test Generation Method for Evolving Critical Systems",
REGRESSION'11, 1st Int. Workshop on Regression Testing - co-located with ICST'2011, Berlin, Germany, IEEE Computer Society Press, pp. 125–134, 2011.
"Software Engineering for Secure Systems",
33rd International Conference on Software Engineering (ICSE 2011), 2011.
"Supporting Requirements Engineers in Recognising Security Issues",
17th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2011), Essen, 28-30 Mar. 2011, Springer, 2011.
"Supporting Software Evolution for Open Smart Cards by Security-by-Contract",
Dependability and Computer Engineering: Concepts for Software-Intensive Systems: IGI , 2011.
"Systematic Development of UMLsec Design Models Based On Security Requirements",
14th International Conference on Fundamental Approaches to Software Engineering (FASE 2011), Saarbrücken, Germany, 26 March - 3 April, 2011, Springer, 2011.
"A Tool for Managing Evolving Security Requirements",
CAiSE Forum , London, Springer-Verlag, pp. 49-56, 2011.
"Tool support for UML-based specification and verification of role-based access control properties",
8th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2011.
Abstract
The UML profile and example described in this paper can be downloaded from the Related URL given below. Pages: 456-459 ISBN: 978-1-4503-0443-6
"UML/OCL based impact analysis to test evolvin critical software",
ETAI'11, Society for Electronics, Telecommunications, Automatics and Informatics 10-th Int. Conf., Ohrid, Macedonia, 2011.
"Using CORAS to Support Change Management",
Model-Driven Risk Analysis: The CORAS Approach: Springer, 2011.
"Verification of unloadable modules",
17th International Symposium on Formal Methods (FM 2011), vol. 6664: Springer, pp. 402–416, 2011.
Limerick (Ireland), 20-24 June 2011
"Verifying FreeRTOS: from requirements to binary code",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11), vol. CS-TR-1272, 2011.
Short paper
"A quick tour of the VeriFast program verifier",
Programming Languages and Systems (APLAS 2010): Springer-Verlag, pp. 304–311, November, 2010.
Expressive modular fine-grained concurrency specification (Extended version),
, no. CW590: Department of Computer Science, K.U.Leuven, July, 2010.
"Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox",
International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
"Evolving Embedded Systems",
IEEE Computer, vol. 43, issue 5, 5/2010.