Security Engineering for Lifelong Evolvable Systems


Export 149 results:
Sort by: Author Title Type [ Year  (Desc)]
Bergmann, G., A. Horváth, I. Ráth, D. Varró, A. Balogh, Z. Balogh, and A. Ökrös, "Incremental Evaluation of Model Queries over EMF Models", Model Driven Engineering Languages and Systems, 13th International Conference, MODELS’10: Springer, 10/2010.

Acceptance rate: 21%

Bergmann, G., A. Horvath, I. Ráth, D. Varró, and al., "Incremental query evaluation over EMF models", ACM/IEEE 13th International Conference On Model Driven Engineering Languages and Systems, Oslo, Norway, ACM/IEEE , 10/2010.
Hafner, M., "Modeling and Managing System Evolution Description of EternalS Task Force 2", Leveraging Applications of Formal Methods, Verification, and Validation 4th International Symposium on Leveraging Applications, Isola 2010, Heraklion, Greece, 10/2010.
Hegedüs, A., G. Bergmann, I. Ráth, and D. Varró, "Back-annotation of Simulation Traces with Change-Driven Model Transformations", Proceedings of the Eighth International Conference on Software Engineering and Formal Methods, Pisa, IEEE Computer Society, pp. 145-155, 09/2010.

Acceptance rate: 22%

Hegedüs, A., I. Ráth, and D. Varró, From BPEL to SAL and Back: a Tool Demo on Back-Annotation with VIATRA2, : Consiglio Nazionale delle Ricerche (CNR), pp. 35-42, 09/2010.

Accepted for the SEFM'2010 "Posters and Tool Demo Session" Track

Breu, M., R. Breu, and S. Löw, "Living on the MoVE: Towards an Architecture for a Living Models Infrastructure.", The Fifth International Conference on Software Engineering Advances, Nice, France, IEEE Computer Society, 08/2010.
Trojer, T., M. Breu, and S. Löw, "Change-driven Model Evolution for Living Models", 3rd Workshop Model-driven Tool and Process Intergration (MDTPI), ECMFA 2010, Paris, France, 06/2010.
Tun, T. T., Y. Yu, C. B. Haley, and B. Nuseibeh, "Model-Based Argument Analysis for Evolving Security Requirements", Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, IEEE Computer Society, pp. 88-97, 06/10, 2010.
Gander, M., M. Hafner, H. Yu, and M. Memon, "Architectural Patterns for Model Driven Security in SOA", Communications and Multimedia Security - CMS 2010, Linz, Austria, 05/2010.
Pironti, A., and J. Jürjens, "Formally Based Black Box Monitoring of Security Protocols", International Symposium on Engineering Secure Software and Systems (ESSOS 2010): Springer-Verlag, 2010.
Mouratidis, H., and J. Jürjens, "From Goal-Driven Security Requirements Engineering to Secure Design", International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
Jürjens, J., "Model-based Security Engineering with UML", 26th IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010), Madrid, 21-25 Sep. 2010, 2010.
Supakkul, S., T. Hill, L. Chung, T. T. Tun, and J. C. S. P. do Leite, "An NFR Pattern Approach to Dealing with NFRs", IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.
Jürjens, J., A. Bauer, and Y. Yu, "Run-time Security Traceability for Evolving Systems", The Computer Journal: Oxford Univ. Press, 2010.
Bauer, A., and J. Jürjens, "Run-time Verification of Cryptographic Protocols", Journal for Computers & Security, vol. 29, 2010.