Publications
Filters: First Letter Of Last Name is H [Clear All Filters]
"An Access Control Model Based Testing Approach for Smart Card Applications: Results of the POSÉ Project",
JIAS, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 335–351, 2010.
"Architectural Patterns for Model Driven Security in SOA",
Communications and Multimedia Security - CMS 2010, Linz, Austria, 05/2010.
"Back-annotation of Simulation Traces with Change-Driven Model Transformations",
Proceedings of the Eighth International Conference on Software Engineering and Formal Methods, Pisa, IEEE Computer Society, pp. 145-155, 09/2010.
Acceptance rate: 22%
"Dynamic Backwards Slicing of Model Transformations",
Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on, 04/2012.
Accepted
"Dynamic constraint satisfaction problems over models",
Software and Systems Modeling, 11/2010.
Abstract
"Ecore to Genmodel case study solution using the Viatra2 framework",
Transformation Tool Contest (TTC ’10), Malaga, Spain, 07/2010.
"Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec",
Requirements Engineering Journal, vol. 15(1), 2010.
"Experimental Assessment of Combining Pattern Matching Strategies with VIATRA2",
International Journal on Software Tools for Technology Transfer, vol. 12, pp. 211-230, 2010.
Abstract
From BPEL to SAL and Back: a Tool Demo on Back-Annotation with VIATRA2,
: Consiglio Nazionale delle Ricerche (CNR), pp. 35-42, 09/2010.
Accepted for the SEFM'2010 "Posters and Tool Demo Session" Track
"Graph Transformation with Incremental Pattern Matching on a Relational Database",
International Symposium on Applications of Graph Transformation With Industrial Relevance (AGTIVE 2011), Budapest, Hungary, 10/2011.
In Review for Post-proceedings.
"Guest Editors' Introduction: Evolving Critical Systems",
IEEE Computer , vol. 43, issue 5, pp. 6, 2010.
"Guided State Space Exploration using Back-annotation of Occurrence Vectors",
Proceedings of the Fourth International Workshop on Petri Nets and Graph Transformation, 2010.
"Implementing Efficient Model Validation in EMF Tools: Tool Demonstration",
26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, USA, IEEE Computer Society, 11/2011.
Abstract
"Incremental Evaluation of Model Queries over EMF Models",
Model Driven Engineering Languages and Systems, 13th International Conference, MODELS’10: Springer, 10/2010.
Acceptance rate: 21%
"Incremental Evaluation of Model Queries over EMF Models: A Tutorial on EMF-IncQuery",
Modelling Foundations and Applications, vol. 6698: Springer Berlin / Heidelberg, pp. 389-390, 2011.
Abstract
"Incremental query evaluation over EMF models",
ACM/IEEE 13th International Conference On Model Driven Engineering Languages and Systems, Oslo, Norway, ACM/IEEE , 10/2010.
"Information Security Management: A Collaborative Approach",
International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.
"Living Models - Ten Principles for Change-Driven Software Engineering",
Int. J. Software and Informatics, vol. 5, no. 1-2, pp. 267-290, 2011.
"Living Security — Collaborative Security Management in a Changing World",
Tenth IASTED International Conference on Software Engineering SE 2011, Innsbruck, Austria, ACTA Press, 02/2011.
"Maintaining invariant traceability through bidirectional transformations",
34th International Conference on Software Engineering, 2012.
"Model-Based Argument Analysis for Evolving Security Requirements",
Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, IEEE Computer Society, pp. 88-97, 06/10, 2010.
"A Model-driven Framework for Guided Design Space Exploration",
26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, USA, IEEE Computer Society, 11/2011.
Abstract
ACM Distinguished Paper Award, Acceptance rate: 15%
"Modeling and Managing System Evolution Description of EternalS Task Force 2",
Leveraging Applications of Formal Methods, Verification, and Validation 4th International Symposium on Leveraging Applications, Isola 2010, Heraklion, Greece, 10/2010.
"Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications (invited lecture)",
11th School on Formal Methods (SFM 2011), Bertinoro, Italy, 2011.
"An NFR Pattern Approach to Dealing with NFRs",
IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.