Publications
"ACConv-An access control model for conversational Web services",
ACM Transactions on the Web, vol. Vol. x, No. y,, 01/2011.
"ACConv-An access control model for conversational Web services",
ACM Transactions on the Web , vol. Volume 5 , issue Issue 3, 07/2011 .
"Algorithms for Security-by-Contract on Multi-Application Java Cards",
Journal of Critical Computer-Based Systems, 2011.
"Analyzing evolution of variability in a software product line: From contexts and requirements to features",
Information and Software Technology, vol. 53, no. 7, pp. 707 - 721, 2011.
Abstract
"Assessing architectural evolution: a case study",
Empirical Software Engineering, vol. 16, no. 5, pp. 623–666, June, 2011.
Abstract
The final version is available at the DOI given above. The zip file is the web companion mentioned in the paper.
"Automated UML models merging for web services testing",
Journal on Web and Grid Services, vol. 5, issue 2, pp. 107--129, 2009.
"Change Patterns: Co-evolving Requirements and Architecture",
Software and Systems Modeling: Springer, 2011.
to appear
"Change Patterns: Co-evolving Requirements and Architecture",
Software and Systems Modeling: Springer, Submitted.
"Change-driven model transformations. Change (in) the rule to rule the change.",
Software and Systems Modeling, issue Online first.: Springer Berlin / Heidelberg, pp. 1-31, 2011.
"Dynamic constraint satisfaction problems over models",
Software and Systems Modeling, 11/2010.
Abstract
"Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec",
Requirements Engineering Journal, vol. 15(1), 2010.
"Enhancing Argumentation with Risk Assessment for Achieving Good-Enough Security",
Requirements Engineering Journal , Submitted.
"Evolution in Relation to Risk and Trust Management",
IEEE Computer, vol. 43, issue 5, 05/2010.
"Evolving Embedded Systems",
IEEE Computer, vol. 43, issue 5, 5/2010.
"Experimental Assessment of Combining Pattern Matching Strategies with VIATRA2",
International Journal on Software Tools for Technology Transfer, vol. 12, pp. 211-230, 2010.
Abstract
From BPEL to SAL and Back: a Tool Demo on Back-Annotation with VIATRA2,
: Consiglio Nazionale delle Ricerche (CNR), pp. 35-42, 09/2010.
Accepted for the SEFM'2010 "Posters and Tool Demo Session" Track
"From Goal-Driven Security Requirements Engineering to Secure Design",
International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
"Generating Tests from B Specifications and Dynamic Selection Criteria",
FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.
Revised and extended version of a paper from the ABZ'08 conference
"Guest Editors' Introduction: Evolving Critical Systems",
IEEE Computer , vol. 43, issue 5, pp. 6, 2010.
"Living Models - Ten Principles for Change-Driven Software Engineering",
Int. J. Software and Informatics, vol. 5, no. 1-2, pp. 267-290, 2011.
"MoVEing Forward: Towards an Architecture and Processes for a Living Models Infrastructure",
International Journal On Advances in Life Sciences, vol. 3, no. 1 and 2, pp. 12–22, 2011.
"An NFR Pattern Approach to Dealing with NFRs",
IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.
"Run-time Security Traceability for Evolving Systems",
The Computer Journal: Oxford Univ. Press, 2010.
"Run-time Verification of Cryptographic Protocols",
Journal for Computers & Security, vol. 29, 2010.
"SeAAS - A Reference Architecture for Security Services in SOA",
Journal of Universal Computer Science, 2010.