Publications
Filters: First Letter Of Last Name is A [Clear All Filters]
"State-based Evolution Management of Risk-based System Tests for Service-centric Systems.",
Emerging Technologies for the Evolution and Maintenance of Software Models.: IGI Global, pp. 298-318., 2012.
"Evolution of Security Requirements Tests for Service-Centric Systems",
International Symposium on Engineering Secure Software and Systems, Madrid, Spain, Springer-Verlag, 02/2011.
Abstract
"Managing Evolution of Service Centric Systems by Test Models",
The Tenth IASTED International Conference on Software Engineering, Innsbruck, Austria, ACTA Press, 02/2011.
Abstract
"Computer-Aided Threat Identification",
CEC 2011, New Orleans, IEEE, 2011.
"An Extended Ontology for Security Requirements",
Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011.
Abstract
10.1007/978-3-642-22056-2_64
"Living Models - Ten Principles for Change-Driven Software Engineering",
Int. J. Software and Informatics, vol. 5, no. 1-2, pp. 267-290, 2011.
"Risk analysis of changing and evolving systems using CORAS",
Foundations of security analysis and design VI, vol. 6858: Springer, pp. 231-274, 2011.
"SeCMER: A Tool to Gain Control of Security Requirements Evolution",
Towards a Service-Based Internet, vol. 6994: Springer Berlin / Heidelberg, pp. 321-322, 2011.
Abstract
10.1007/978-3-642-24755-2_35
"Incremental query evaluation over EMF models",
ACM/IEEE 13th International Conference On Model Driven Engineering Languages and Systems, Oslo, Norway, ACM/IEEE , 10/2010.
"Modeling and Managing System Evolution Description of EternalS Task Force 2",
Leveraging Applications of Formal Methods, Verification, and Validation 4th International Symposium on Leveraging Applications, Isola 2010, Heraklion, Greece, 10/2010.
"Security Testing by Telling TestStories",
Modellierung 2010, Klagenfurt, Austria, 03/2010.
"An Access Control Model Based Testing Approach for Smart Card Applications: Results of the POSÉ Project",
JIAS, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 335–351, 2010.