Security Engineering for Lifelong Evolvable Systems

Publications

Export 8 results:
Sort by: Author Title Type [ Year  (Desc)]
Filters: First Letter Of Last Name is C  [Clear All Filters]
2011
Wermelinger, M., Y. Yu, A. Lozano, and A. Capiluppi, "Assessing architectural evolution: a case study", Empirical Software Engineering, vol. 16, no. 5, pp. 623–666, June, 2011. Abstract

The final version is available at the DOI given above. The zip file is the web companion mentioned in the paper.

Benats, G., A. Bandara, Y. Yu, J. - N. Colin, and B. Nuseibeh, "PrimAndroid: privacy policy modelling and analysis for Android applications", IEEE International Symposium on Policies for Distributed Systems and Networks, June, 2011. Abstract
Chen, B., X. Peng, Y. Yu, and W. Zhao, "Are your sites down? Requirements-driven self-tuning for the survivability of Web systems", Requirements Engineering Conference (RE), 2011 19th IEEE International, pp. 219 -228, 29 2011-sept. 2. Abstract
Bergmann, G., Z. Ujhelyi, I. Ráth, and D. Varró, "A Graph Query Language for EMF models", Theory and Practice of Model Transformations, Fourth International Conference, ICMT 2011, Zurich, Switzerland, June 27-28, 2011. Proceedings, vol. 6707: Springer, pp. 167-182, 2011. Abstract
2010
Supakkul, S., T. Hill, L. Chung, T. T. Tun, and J. C. S. P. do Leite, "An NFR Pattern Approach to Dealing with NFRs", IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.