Security Engineering for Lifelong Evolvable Systems

Publications

Export 43 results:
Sort by: Author Title [ Type  (Asc)] Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
Book Chapter
Bergmann, G., A. Horváth, I. Ráth, and D. Varró, "Incremental Evaluation of Model Queries over EMF Models: A Tutorial on EMF-IncQuery", Modelling Foundations and Applications, vol. 6698: Springer Berlin / Heidelberg, pp. 389-390, 2011. Abstract
Conference Paper
Gander, M., M. Hafner, H. Yu, and M. Memon, "Architectural Patterns for Model Driven Security in SOA", Communications and Multimedia Security - CMS 2010, Linz, Austria, 05/2010.
Hegedüs, A., G. Bergmann, I. Ráth, and D. Varró, "Back-annotation of Simulation Traces with Change-Driven Model Transformations", Proceedings of the Eighth International Conference on Software Engineering and Formal Methods, Pisa, IEEE Computer Society, pp. 145-155, 09/2010.

Acceptance rate: 22%

Ujhelyi, Z., A. Horváth, and D. Varró, "Dynamic Backwards Slicing of Model Transformations", Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on, 04/2012.

Accepted

Bergmann, G., D. Horváth, and A. Horváth, "Graph Transformation with Incremental Pattern Matching on a Relational Database", International Symposium on Applications of Graph Transformation With Industrial Relevance (AGTIVE 2011), Budapest, Hungary, 10/2011.

In Review for Post-proceedings.

Bergmann, G., A. Hegedüs, A. Horváth, I. Ráth, Z. Ujhelyi, and D. Varró, "Implementing Efficient Model Validation in EMF Tools: Tool Demonstration", 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, USA, IEEE Computer Society, 11/2011. Abstract
Bergmann, G., A. Horváth, I. Ráth, D. Varró, A. Balogh, Z. Balogh, and A. Ökrös, "Incremental Evaluation of Model Queries over EMF Models", Model Driven Engineering Languages and Systems, 13th International Conference, MODELS’10: Springer, 10/2010.

Acceptance rate: 21%

Innerhofer-Oberperfler, F., D. Bachlechner, R. Maier, V. Hahn, M. Weitlaner, and R. Breu, "Information Security Management: A Collaborative Approach", International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.
Innerhofer-Oberperfler, F., M. Hafner, and R. Breu, "Living Security — Collaborative Security Management in a Changing World", Tenth IASTED International Conference on Software Engineering SE 2011, Innsbruck, Austria, ACTA Press, 02/2011.
Tun, T. T., Y. Yu, C. B. Haley, and B. Nuseibeh, "Model-Based Argument Analysis for Evolving Security Requirements", Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, IEEE Computer Society, pp. 88-97, 06/10, 2010.
Hegedüs, A., A. Horváth, I. Ráth, and D. Varró, "A Model-driven Framework for Guided Design Space Exploration", 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, USA, IEEE Computer Society, 11/2011. Abstract

ACM Distinguished Paper Award, Acceptance rate: 15%

Hafner, M., "Modeling and Managing System Evolution Description of EternalS Task Force 2", Leveraging Applications of Formal Methods, Verification, and Validation 4th International Symposium on Leveraging Applications, Isola 2010, Heraklion, Greece, 10/2010.
Fontaine, A., S. Hym, and I. Simplot-Ryl, "On-Device Control Flow Verification for Java Programs", Proc. of ESSoS’11, ACM/IEEE 3rd International Symposium on Engineering Secure Software and Systems, 2011.
Hegedüs, A., A. Horváth, I. Ráth, M. C. Branco, and D. Varró, "Quick fix generation for DSMLs", IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2011, Pittsbourgh, PA, USA, IEEE Computer Society, 09/2011. Abstract

Acceptance rate: 33%

Hegedüs, A., Z. Ujhelyi, and G. Bergmann, "Saying Hello World with VIATRA2 - A Solution to the TTC 2011 Instructive Case", TTC 2011: Fifth Transformation Tool Contest, Zürich, Switzerland, June 29-30 2011, Post-Proceedings, vol. 74, Zürich, Switzerland, Open Publishing Association, pp. 302-324, 11/2011. Abstract
Memon, M., M. Hafner, and R. Breu, "Security As A Service: A Reference Architecture for SOA", 7th International Workshop on Security in Information Systems (WOSIS 2009), Milan, Italy, Springer, 05/2009.
Heyman, T., K. Yskout, R. Scandariato, H. Schmidt, and Y. Yu, "The Security Twin Peaks", International Symposium on Engineering Secure Software and Systems, 2011.
Hegedüs, A., Z. Ujhelyi, and G. Bergmann, "Solving the TTC 2011 Reengineering Case with VIATRA2", TTC 2011: Fifth Transformation Tool Contest, Zürich, Switzerland, June 29-30 2011, Post-Proceedings, vol. 74, Zürich, Switzerland, Open Publishing Association, pp. 136-148, 11/2011. Abstract
Knauss, E., S. Houmb, K. Schneider, S. Islam, and J. Jürjens, "Supporting Requirements Engineers in Recognising Security Issues", 17th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2011), Essen, 28-30 Mar. 2011, Springer, 2011.
Hatebur, D., M. Heisel, J. Jürjens, and H. Schmidt, "Systematic Development of UMLsec Design Models Based On Security Requirements", 14th International Conference on Fundamental Approaches to Software Engineering (FASE 2011), Saarbrücken, Germany, 26 March - 3 April, 2011, Springer, 2011.
Montrieux, L., J. Jürjens, C. B. Haley, Y. Yu, P. - Y. Schobbens, and H. Toussaint, "Tool Support for Code Generation from a UMLsec Property", 25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
Montrieux, L., J. Jürjens, C. B. Haley, Y. Yu, P. - Y. Schobbens, and H. Toussaint, "Tool support for code generation from a UMLsec property", Proceedings of the IEEE/ACM international conference on Automated software engineering, New York, NY, USA, ACM, pp. 357–358, 2010.
Ujhelyi, Z., A. Horváth, and D. Varró, "Towards Dynamic Backward Slicing of Model Transformations", 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, IEEE Computer Society, 11/2011.