Security Engineering for Lifelong Evolvable Systems

Publications

Export 149 results:
Sort by: Author Title Type [ Year  (Asc)]
2009
Pretre, V., F. Bouquet, A. Dekermadec, C. Lang, and F. Dadeau, "Automated UML models merging for web services testing", Journal on Web and Grid Services, vol. 5, issue 2, pp. 107--129, 2009.
Ráth, I., G. Varró, and D. Varró, "Change-driven Model Transformations", Proc. of MODELS'09, ACM/IEEE 12th International Conference On Model Driven Engineering Languages and Systems, vol. 5795/2009, pp. 342-356, 2009. Abstract
Legeard, B., F. Bouquet, and N. Pickaert, "Industrialiser le test fonctionnel", InfoPro - Etudes, développement et intégration: Dunod, 2009.
Innerhofer-Oberperfler, F., D. Bachlechner, R. Maier, V. Hahn, M. Weitlaner, and R. Breu, "Information Security Management: A Collaborative Approach", International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.
Massacci, F., and I. Siahaan, "Optimizing IRM with Automata Modulo Theory", In the 5th International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.
Nhlabatsi, A., B. Nuseibeh, and Y. Yu, "Security Requirements Engineering for Evolving Software Systems: A Survey", Journal of Secure Software Engineering, vol. 1, issue 1, pp. 54--73, 2009.
Tun, T. T., T. Trew, M. Jackson, R. Laney, and B. Nuseibeh, "Specifying features of an evolving software system", Software: Practice and Experience, vol. 39, no. 11, pp. 973–1002, 2009. Abstract
Bouquet, F., R. Breu, J. Jurjens, F. Massacci, V. Meduri, Z. Micskei, F. Piessens, K. Stolen, and D. Varró, "SecureChange: Security Engineering for Lifelong Evolvable Systems", European Future Technologies Conference and Exhibition (FET09), Prague, Czech Republic, 04/2009. Abstract
Memon, M., M. Hafner, and R. Breu, "Security As A Service: A Reference Architecture for SOA", 7th International Workshop on Security in Information Systems (WOSIS 2009), Milan, Italy, Springer, 05/2009.
Jacobs, B., and F. Piessens, "Failboxes: Provably safe exception handling", ECOOP 2009 - Object-Oriented Programming, 23rd European Conference, Genova, Italy, July 6-10, 2009, Proceedings, vol. 5653: Springer-Verlag, pp. 470–494, 07/2009.
Bergmann, G., I. Ráth, and D. Varró, "Parallelization of Graph Transformation Based on Incremental Pattern Matching", 8th International Workshop on Graph Transformation and Visual Modeling Techniques, York, United Kingdom, 2009.
2010
Horváth, A., G. Bergmann, I. Ráth, and D. Varró, "Experimental Assessment of Combining Pattern Matching Strategies with VIATRA2", International Journal on Software Tools for Technology Transfer, vol. 12, pp. 211-230, 2010. Abstract
Hegedüs, A., and D. Varró, "Guided State Space Exploration using Back-annotation of Occurrence Vectors", Proceedings of the Fourth International Workshop on Petri Nets and Graph Transformation, 2010.
Hegedüs, A., Z. Ujhelyi, I. Ráth, and A. Horváth, "Visualization of Traceability Models with Domain-specific Layouting", Proceedings of the Fourth International Workshop on Graph-Based Tools, 2010.
Pironti, A., and J. Jürjens, "Formally Based Black Box Monitoring of Security Protocols", International Symposium on Engineering Secure Software and Systems (ESSOS 2010): Springer-Verlag, 2010.
Mouratidis, H., and J. Jürjens, "From Goal-Driven Security Requirements Engineering to Secure Design", International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
Jürjens, J., "Model-based Security Engineering with UML", 26th IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010), Madrid, 21-25 Sep. 2010, 2010.
Supakkul, S., T. Hill, L. Chung, T. T. Tun, and J. C. S. P. do Leite, "An NFR Pattern Approach to Dealing with NFRs", IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.
Jürjens, J., A. Bauer, and Y. Yu, "Run-time Security Traceability for Evolving Systems", The Computer Journal: Oxford Univ. Press, 2010.
Bauer, A., and J. Jürjens, "Run-time Verification of Cryptographic Protocols", Journal for Computers & Security, vol. 29, 2010.