Security Engineering for Lifelong Evolvable Systems

Publications

Export 149 results:
Sort by: Author [ Title  (Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Bergmann, G., I. Ráth, G. Varró, and D. Varró, "Change-driven model transformations. Change (in) the rule to rule the change.", Software and Systems Modeling, issue Online first.: Springer Berlin / Heidelberg, pp. 1-31, 2011.
Ráth, I., G. Varró, and D. Varró, "Change-driven Model Transformations", Proc. of MODELS'09, ACM/IEEE 12th International Conference On Model Driven Engineering Languages and Systems, vol. 5795/2009, pp. 342-356, 2009. Abstract
Trojer, T., M. Breu, and S. Löw, "Change-driven Model Evolution for Living Models", 3rd Workshop Model-driven Tool and Process Intergration (MDTPI), ECMFA 2010, Paris, France, 06/2010.
Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Dragoni, N., O. Gadyatskaya, and F. Massacci, "Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?", Security and Privacy of Pervasive Systems and Small Devices, Passau, Germany, Springer, Submitted.
B
Philippaerts, P., F. Vogels, J. Smans, B. Jacobs, and F. Piessens, "The Belgian electronic identity card: a verification case study", Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.

Newcastle (UK), 12-14 September 2011, to appear

Hegedüs, A., G. Bergmann, I. Ráth, and D. Varró, "Back-annotation of Simulation Traces with Change-Driven Model Transformations", Proceedings of the Eighth International Conference on Software Engineering and Formal Methods, Pisa, IEEE Computer Society, pp. 145-155, 09/2010.

Acceptance rate: 22%

A
Pretre, V., F. Bouquet, A. Dekermadec, C. Lang, and F. Dadeau, "Automated UML models merging for web services testing", Journal on Web and Grid Services, vol. 5, issue 2, pp. 107--129, 2009.
Wermelinger, M., Y. Yu, A. Lozano, and A. Capiluppi, "Assessing architectural evolution: a case study", Empirical Software Engineering, vol. 16, no. 5, pp. 623–666, June, 2011. Abstract

The final version is available at the DOI given above. The zip file is the web companion mentioned in the paper.

Chen, B., X. Peng, Y. Yu, and W. Zhao, "Are your sites down? Requirements-driven self-tuning for the survivability of Web systems", Requirements Engineering Conference (RE), 2011 19th IEEE International, pp. 219 -228, 29 2011-sept. 2. Abstract
Gander, M., M. Hafner, H. Yu, and M. Memon, "Architectural Patterns for Model Driven Security in SOA", Communications and Multimedia Security - CMS 2010, Linz, Austria, 05/2010.
Vogels, F., B. Jacobs, F. Piessens, and J. Smans, "Annotation inference for separation logic based verifiers", Formal Techniques for Distributed Systems (FMOODS/FORTE 2011), vol. 6722: Springer, pp. 319–333, 2011.

Reykjavik, Iceland, 6-9 June 2011

Massacci, F., S. Neuhaus, and V. H. Nguyen, "After-Life Vulnerabilities: A Study on Firefox Evolution, its Vulnerabilities and Fixes", Proceeding of the International Symposium on Engineering Secure Software and Systems (ESSoS)'11, Madrid, Spain, 2/2011.
Paci, F., M. Mecella, M. Ouzzani, and E. Bertino, "ACConv-An access control model for conversational Web services", ACM Transactions on the Web , vol. Volume 5 , issue Issue 3, 07/2011 .