Security Engineering for Lifelong Evolvable Systems

Publications

Export 149 results:
Sort by: Author Title Type [ Year  (Desc)]
2010
Bergmann, G., A. Horváth, I. Ráth, D. Varró, A. Balogh, Z. Balogh, and A. Ökrös, "Incremental Evaluation of Model Queries over EMF Models", Model Driven Engineering Languages and Systems, 13th International Conference, MODELS’10: Springer, 10/2010.

Acceptance rate: 21%

Bergmann, G., A. Horvath, I. Ráth, D. Varró, and al., "Incremental query evaluation over EMF models", ACM/IEEE 13th International Conference On Model Driven Engineering Languages and Systems, Oslo, Norway, ACM/IEEE , 10/2010.
Hafner, M., "Modeling and Managing System Evolution Description of EternalS Task Force 2", Leveraging Applications of Formal Methods, Verification, and Validation 4th International Symposium on Leveraging Applications, Isola 2010, Heraklion, Greece, 10/2010.
Hegedüs, A., G. Bergmann, I. Ráth, and D. Varró, "Back-annotation of Simulation Traces with Change-Driven Model Transformations", Proceedings of the Eighth International Conference on Software Engineering and Formal Methods, Pisa, IEEE Computer Society, pp. 145-155, 09/2010.

Acceptance rate: 22%

Hegedüs, A., I. Ráth, and D. Varró, From BPEL to SAL and Back: a Tool Demo on Back-Annotation with VIATRA2, : Consiglio Nazionale delle Ricerche (CNR), pp. 35-42, 09/2010.

Accepted for the SEFM'2010 "Posters and Tool Demo Session" Track

Breu, M., R. Breu, and S. Löw, "Living on the MoVE: Towards an Architecture for a Living Models Infrastructure.", The Fifth International Conference on Software Engineering Advances, Nice, France, IEEE Computer Society, 08/2010.
Trojer, T., M. Breu, and S. Löw, "Change-driven Model Evolution for Living Models", 3rd Workshop Model-driven Tool and Process Intergration (MDTPI), ECMFA 2010, Paris, France, 06/2010.
Tun, T. T., Y. Yu, C. B. Haley, and B. Nuseibeh, "Model-Based Argument Analysis for Evolving Security Requirements", Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, IEEE Computer Society, pp. 88-97, 06/10, 2010.
Gander, M., M. Hafner, H. Yu, and M. Memon, "Architectural Patterns for Model Driven Security in SOA", Communications and Multimedia Security - CMS 2010, Linz, Austria, 05/2010.
Pironti, A., and J. Jürjens, "Formally Based Black Box Monitoring of Security Protocols", International Symposium on Engineering Secure Software and Systems (ESSOS 2010): Springer-Verlag, 2010.
Mouratidis, H., and J. Jürjens, "From Goal-Driven Security Requirements Engineering to Secure Design", International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
Jürjens, J., "Model-based Security Engineering with UML", 26th IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010), Madrid, 21-25 Sep. 2010, 2010.
Supakkul, S., T. Hill, L. Chung, T. T. Tun, and J. C. S. P. do Leite, "An NFR Pattern Approach to Dealing with NFRs", IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.
Jürjens, J., A. Bauer, and Y. Yu, "Run-time Security Traceability for Evolving Systems", The Computer Journal: Oxford Univ. Press, 2010.
Bauer, A., and J. Jürjens, "Run-time Verification of Cryptographic Protocols", Journal for Computers & Security, vol. 29, 2010.