Security Engineering for Lifelong Evolvable Systems


Export 149 results:
Sort by: Author Title Type [ Year  (Desc)]
Bandara, A., H. Shinpei, J. Jurjens, H. Kaiya, A. Kubo, R. Laney, H. Mouratidis, A. Nhlabatsi, B. Nuseibeh, Y. Tahara, et al., "Security Patterns: Comparing Modeling Approaches", Software Engineering for Security Systems: Industrial and Research Perspectives: IGI Global, 2010.
Breu, R., "Ten Principles for Living Models - A Manifesto of Change-Driven Software Engineering", International Conference on Complex, Intelligent and Software Intensive Systems (CISIS)), 2010.
Bouquet, F., P. - C. Bué, J. Julliand, and P. - A. Masson, "Test Generation Based on Abstraction and Test Purposes to Complement Structural Tests", A-MOST'10, 6th int. Workshop on Advances in Model Based Testing, in conjunction with ICST'10, Paris, France, pp. 54–61, 2010.
Dadeau, F., F. Peureux, B. Legeard, R. Tissot, J. Julliand, P. - A. Masson, and F. Bouquet, "Test Generation using Symbolic Animation of Models", Model-Based Testing for Embedded Systems: CRC Press, pp. ***–***, 2010.

Accepted manuscript. To appear

Montrieux, L., J. Jürjens, C. B. Haley, Y. Yu, P. - Y. Schobbens, and H. Toussaint, "Tool Support for Code Generation from a UMLsec Property", 25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
Montrieux, L., J. Jürjens, C. B. Haley, Y. Yu, P. - Y. Schobbens, and H. Toussaint, "Tool support for code generation from a UMLsec property", Proceedings of the IEEE/ACM international conference on Automated software engineering, New York, NY, USA, ACM, pp. 357–358, 2010.
Horváth, A., G. Bergmann, I. Ráth, and D. Varró, "Experimental Assessment of Combining Pattern Matching Strategies with VIATRA2", International Journal on Software Tools for Technology Transfer, vol. 12, pp. 211-230, 2010. Abstract
Hegedüs, A., and D. Varró, "Guided State Space Exploration using Back-annotation of Occurrence Vectors", Proceedings of the Fourth International Workshop on Petri Nets and Graph Transformation, 2010.
Hegedüs, A., Z. Ujhelyi, I. Ráth, and A. Horváth, "Visualization of Traceability Models with Domain-specific Layouting", Proceedings of the Fourth International Workshop on Graph-Based Tools, 2010.
Bergmann, G., I. Ráth, and D. Varró, "Parallelization of Graph Transformation Based on Incremental Pattern Matching", 8th International Workshop on Graph Transformation and Visual Modeling Techniques, York, United Kingdom, 2009.
Jacobs, B., and F. Piessens, "Failboxes: Provably safe exception handling", ECOOP 2009 - Object-Oriented Programming, 23rd European Conference, Genova, Italy, July 6-10, 2009, Proceedings, vol. 5653: Springer-Verlag, pp. 470–494, 07/2009.
Memon, M., M. Hafner, and R. Breu, "Security As A Service: A Reference Architecture for SOA", 7th International Workshop on Security in Information Systems (WOSIS 2009), Milan, Italy, Springer, 05/2009.
Bouquet, F., R. Breu, J. Jurjens, F. Massacci, V. Meduri, Z. Micskei, F. Piessens, K. Stolen, and D. Varró, "SecureChange: Security Engineering for Lifelong Evolvable Systems", European Future Technologies Conference and Exhibition (FET09), Prague, Czech Republic, 04/2009. Abstract
Pretre, V., F. Bouquet, A. Dekermadec, C. Lang, and F. Dadeau, "Automated UML models merging for web services testing", Journal on Web and Grid Services, vol. 5, issue 2, pp. 107--129, 2009.
Ráth, I., G. Varró, and D. Varró, "Change-driven Model Transformations", Proc. of MODELS'09, ACM/IEEE 12th International Conference On Model Driven Engineering Languages and Systems, vol. 5795/2009, pp. 342-356, 2009. Abstract
Legeard, B., F. Bouquet, and N. Pickaert, "Industrialiser le test fonctionnel", InfoPro - Etudes, développement et intégration: Dunod, 2009.
Innerhofer-Oberperfler, F., D. Bachlechner, R. Maier, V. Hahn, M. Weitlaner, and R. Breu, "Information Security Management: A Collaborative Approach", International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.
Massacci, F., and I. Siahaan, "Optimizing IRM with Automata Modulo Theory", In the 5th International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.
Nhlabatsi, A., B. Nuseibeh, and Y. Yu, "Security Requirements Engineering for Evolving Software Systems: A Survey", Journal of Secure Software Engineering, vol. 1, issue 1, pp. 54--73, 2009.
Tun, T. T., T. Trew, M. Jackson, R. Laney, and B. Nuseibeh, "Specifying features of an evolving software system", Software: Practice and Experience, vol. 39, no. 11, pp. 973–1002, 2009. Abstract