Security Engineering for Lifelong Evolvable Systems

Publications

Export 149 results:
Sort by: Author Title [ Type  (Desc)] Year
Conference Paper
Breu, R., "Ten Principles for Living Models - A Manifesto of Change-Driven Software Engineering", International Conference on Complex, Intelligent and Software Intensive Systems (CISIS)), 2010.
Bouquet, F., P. - C. Bué, J. Julliand, and P. - A. Masson, "Test Generation Based on Abstraction and Test Purposes to Complement Structural Tests", A-MOST'10, 6th int. Workshop on Advances in Model Based Testing, in conjunction with ICST'10, Paris, France, pp. 54–61, 2010.
Montrieux, L., J. Jürjens, C. B. Haley, Y. Yu, P. - Y. Schobbens, and H. Toussaint, "Tool Support for Code Generation from a UMLsec Property", 25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
Montrieux, L., J. Jürjens, C. B. Haley, Y. Yu, P. - Y. Schobbens, and H. Toussaint, "Tool support for code generation from a UMLsec property", Proceedings of the IEEE/ACM international conference on Automated software engineering, New York, NY, USA, ACM, pp. 357–358, 2010.
Montrieux, L., M. Wermelinger, and Y. Yu, "Tool support for UML-based specification and verification of role-based access control properties", 8th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2011. Abstract

The UML profile and example described in this paper can be downloaded from the Related URL given below. Pages: 456-459 ISBN: 978-1-4503-0443-6

Ujhelyi, Z., A. Horváth, and D. Varró, "Towards Dynamic Backward Slicing of Model Transformations", 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, IEEE Computer Society, 11/2011.
Yu, Y., A. Bandara, T. T. Tun, and B. Nuseibeh, "Towards learning to detect meaningful changes in software", Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering, New York, NY, USA, ACM, pp. 51–54, November, 2011. Abstract
Fourneret, E., and F. Bouquet, "UML/OCL based impact analysis to test evolvin critical software", ETAI'11, Society for Electronics, Telecommunications, Automatics and Informatics 10-th Int. Conf., Ohrid, Macedonia, 2011.
Fourneret, E., F. Bouquet, M. Ochoa, J. Jürjens, and S. Wenzel, "Vérification et Test pour des systèmes évolutifs", AFADL'12, Congrès Approches Formelles dans l'Assistance au Développement de Logiciels, Grenoble, France, pp. 150–164, 2012.
Jacobs, B., J. Smans, and F. Piessens, "Verification of unloadable modules", 17th International Symposium on Formal Methods (FM 2011), vol. 6664: Springer, pp. 402–416, 2011.

Limerick (Ireland), 20-24 June 2011

Mühlberg, J. T., and L. Freitas, "Verifying FreeRTOS: from requirements to binary code", Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11), vol. CS-TR-1272, 2011.

Short paper

Book Chapter
Massacci, F., J. Mylopoulos, F. Paci, T. T. Tun, and Y. Yu, "An Extended Ontology for Security Requirements", Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011. Abstract

10.1007/978-3-642-22056-2_64

Bergmann, G., A. Horváth, I. Ráth, and D. Varró, "Incremental Evaluation of Model Queries over EMF Models: A Tutorial on EMF-IncQuery", Modelling Foundations and Applications, vol. 6698: Springer Berlin / Heidelberg, pp. 389-390, 2011. Abstract
Lund, M. S., B. Solhaug, and K. Stølen, "Risk analysis of changing and evolving systems using CORAS", Foundations of security analysis and design VI, vol. 6858: Springer, pp. 231-274, 2011.
Bergmann, G., F. Massacci, F. Paci, T. Tun, D. Varró, and Y. Yu, "SeCMER: A Tool to Gain Control of Security Requirements Evolution", Towards a Service-Based Internet, vol. 6994: Springer Berlin / Heidelberg, pp. 321-322, 2011. Abstract

10.1007/978-3-642-24755-2_35

Massacci, F., and F. Paci, "Secure Collaborative Systems", In Trustworthy Internet: Springer, 2011.
Bandara, A., H. Shinpei, J. Jurjens, H. Kaiya, A. Kubo, R. Laney, H. Mouratidis, A. Nhlabatsi, B. Nuseibeh, Y. Tahara, et al., "Security Patterns: Comparing Modeling Approaches", Software Engineering for Security Systems: Industrial and Research Perspectives: IGI Global, 2010.
Felderer, M., B. Agreiter, and R. Breu, "State-based Evolution Management of Risk-based System Tests for Service-centric Systems.", Emerging Technologies for the Evolution and Maintenance of Software Models.: IGI Global, pp. 298-318., 2012.
Dragoni, N., O. Gadyatskaya, and F. Massacci, "Supporting Software Evolution for Open Smart Cards by Security-by-Contract", Dependability and Computer Engineering: Concepts for Software-Intensive Systems: IGI , 2011.
Dadeau, F., F. Peureux, B. Legeard, R. Tissot, J. Julliand, P. - A. Masson, and F. Bouquet, "Test Generation using Symbolic Animation of Models", Model-Based Testing for Embedded Systems: CRC Press, pp. ***–***, 2010.

Accepted manuscript. To appear

Lund, M. S., B. Solhaug, and K. Stølen, "Using CORAS to Support Change Management", Model-Driven Risk Analysis: The CORAS Approach: Springer, 2011.
Book