Publications
Filters: First Letter Of Last Name is H [Clear All Filters]
"Visualization of Traceability Models with Domain-specific Layouting",
Proceedings of the Fourth International Workshop on Graph-Based Tools, 2010.
"Visualization of Traceability Models with Domain-specific Layouting",
Electronic Communications of the EASST, Proceedings of the Fourth International Workshop on Graph-Based Tools, vol. 32, 04/2011.
Abstract
"Verifiable control flow properties for Java bytecode",
FAST 2011: Springer Berlin / Heidelberg, to appear, 2011.
"Towards Guided Trajectory Exploration of Graph Transformation Systems",
Electronic Communications of the EASST, Petri Nets and Graph Transformations 2010, vol. 40, 08/2011.
Abstract
"Towards Dynamic Backward Slicing of Model Transformations",
26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, IEEE Computer Society, 11/2011.
"Tool Support for Code Generation from a UMLsec Property",
25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
"Tool support for code generation from a UMLsec property",
Proceedings of the IEEE/ACM international conference on Automated software engineering, New York, NY, USA, ACM, pp. 357–358, 2010.
"Systematic Development of UMLsec Design Models Based On Security Requirements",
14th International Conference on Fundamental Approaches to Software Engineering (FASE 2011), Saarbrücken, Germany, 26 March - 3 April, 2011, Springer, 2011.
"Supporting Requirements Engineers in Recognising Security Issues",
17th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2011), Essen, 28-30 Mar. 2011, Springer, 2011.
"Static Type Checking of Model Transformation Programs",
Electronic Communications of the EASST, International Conference on Graph Transformation 2010 - Doctoral Symposium, vol. 38, 09/2011.
Abstract
Accepted
"Solving the TTC 2011 Reengineering Case with VIATRA2",
TTC 2011: Fifth Transformation Tool Contest, Zürich, Switzerland, June 29-30 2011, Post-Proceedings, vol. 74, Zürich, Switzerland, Open Publishing Association, pp. 136-148, 11/2011.
Abstract
"The Security Twin Peaks",
International Symposium on Engineering Secure Software and Systems, 2011.
"Security As A Service: A Reference Architecture for SOA",
7th International Workshop on Security in Information Systems (WOSIS 2009), Milan, Italy, Springer, 05/2009.
"Securing the Skies: In Requirements We Trust.",
IEEE Computer, vol. 42, no. 9, pp. 64-72, 2009.
"SeAAS - A Reference Architecture for Security Services in SOA",
Journal of Universal Computer Science, 2010.
"Saying Hello World with VIATRA2 - A Solution to the TTC 2011 Instructive Case",
TTC 2011: Fifth Transformation Tool Contest, Zürich, Switzerland, June 29-30 2011, Post-Proceedings, vol. 74, Zürich, Switzerland, Open Publishing Association, pp. 302-324, 11/2011.
Abstract
"Quick fix generation for DSMLs",
IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2011, Pittsbourgh, PA, USA, IEEE Computer Society, 09/2011.
Abstract
Acceptance rate: 33%
"On-Device Control Flow Verification for Java Programs",
Proc. of ESSoS’11, ACM/IEEE 3rd International Symposium on Engineering Secure Software and Systems, 2011.
"An NFR Pattern Approach to Dealing with NFRs",
IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.
"Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications (invited lecture)",
11th School on Formal Methods (SFM 2011), Bertinoro, Italy, 2011.
"Modeling and Managing System Evolution Description of EternalS Task Force 2",
Leveraging Applications of Formal Methods, Verification, and Validation 4th International Symposium on Leveraging Applications, Isola 2010, Heraklion, Greece, 10/2010.
"A Model-driven Framework for Guided Design Space Exploration",
26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, USA, IEEE Computer Society, 11/2011.
Abstract
ACM Distinguished Paper Award, Acceptance rate: 15%
"Model-Based Argument Analysis for Evolving Security Requirements",
Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, IEEE Computer Society, pp. 88-97, 06/10, 2010.
"Maintaining invariant traceability through bidirectional transformations",
34th International Conference on Software Engineering, 2012.
"Living Security — Collaborative Security Management in a Changing World",
Tenth IASTED International Conference on Software Engineering SE 2011, Innsbruck, Austria, ACTA Press, 02/2011.