Security Engineering for Lifelong Evolvable Systems

Publications

Export 149 results:
Sort by: Author Title [ Type  (Asc)] Year
Journal Article
Paci, F., M. Mecella, M. Ouzzani, and E. Bertino, "ACConv-An access control model for conversational Web services", ACM Transactions on the Web , vol. Volume 5 , issue Issue 3, 07/2011 .
Wermelinger, M., Y. Yu, A. Lozano, and A. Capiluppi, "Assessing architectural evolution: a case study", Empirical Software Engineering, vol. 16, no. 5, pp. 623–666, June, 2011. Abstract

The final version is available at the DOI given above. The zip file is the web companion mentioned in the paper.

Pretre, V., F. Bouquet, A. Dekermadec, C. Lang, and F. Dadeau, "Automated UML models merging for web services testing", Journal on Web and Grid Services, vol. 5, issue 2, pp. 107--129, 2009.
Bergmann, G., I. Ráth, G. Varró, and D. Varró, "Change-driven model transformations. Change (in) the rule to rule the change.", Software and Systems Modeling, issue Online first.: Springer Berlin / Heidelberg, pp. 1-31, 2011.
Horváth, A., G. Bergmann, I. Ráth, and D. Varró, "Experimental Assessment of Combining Pattern Matching Strategies with VIATRA2", International Journal on Software Tools for Technology Transfer, vol. 12, pp. 211-230, 2010. Abstract
Hegedüs, A., I. Ráth, and D. Varró, From BPEL to SAL and Back: a Tool Demo on Back-Annotation with VIATRA2, : Consiglio Nazionale delle Ricerche (CNR), pp. 35-42, 09/2010.

Accepted for the SEFM'2010 "Posters and Tool Demo Session" Track

Mouratidis, H., and J. Jürjens, "From Goal-Driven Security Requirements Engineering to Secure Design", International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
Julliand, J., P. - A. Masson, R. Tissot, and P. - C. Bué, "Generating Tests from B Specifications and Dynamic Selection Criteria", FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.

Revised and extended version of a paper from the ABZ'08 conference

Breu, M., R. Breu, and S. Loew, "MoVEing Forward: Towards an Architecture and Processes for a Living Models Infrastructure", International Journal On Advances in Life Sciences, vol. 3, no. 1 and 2, pp. 12–22, 2011.
Supakkul, S., T. Hill, L. Chung, T. T. Tun, and J. C. S. P. do Leite, "An NFR Pattern Approach to Dealing with NFRs", IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.
Jürjens, J., A. Bauer, and Y. Yu, "Run-time Security Traceability for Evolving Systems", The Computer Journal: Oxford Univ. Press, 2010.
Bauer, A., and J. Jürjens, "Run-time Verification of Cryptographic Protocols", Journal for Computers & Security, vol. 29, 2010.