Publications
Filters: First Letter Of Last Name is J [Clear All Filters]
"An Access Control Model Based Testing Approach for Smart Card Applications: Results of the POSÉ Project",
JIAS, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 335–351, 2010.
"Annotation inference for separation logic based verifiers",
Formal Techniques for Distributed Systems (FMOODS/FORTE 2011), vol. 6722: Springer, pp. 319–333, 2011.
Reykjavik, Iceland, 6-9 June 2011
"The Belgian electronic identity card: a verification case study",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.
Newcastle (UK), 12-14 September 2011, to appear
Change patterns: Co-evolving requirements and architecture,
: K.U.Leuven, 08/2010.
"Change Patterns: Co-evolving Requirements and Architecture",
Software and Systems Modeling: Springer, 2011.
to appear
"Change Patterns: Co-evolving Requirements and Architecture",
Software and Systems Modeling: Springer, Submitted.
"Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec",
Requirements Engineering Journal, vol. 15(1), 2010.
"Expressive modular fine-grained concurrency specification",
Principles of Programming Languages (POPL 2011), January, 2011.
Expressive modular fine-grained concurrency specification (Extended version),
, no. CW590: Department of Computer Science, K.U.Leuven, July, 2010.
"Failboxes: Provably safe exception handling",
ECOOP 2009 - Object-Oriented Programming, 23rd European Conference, Genova, Italy, July 6-10, 2009, Proceedings, vol. 5653: Springer-Verlag, pp. 470–494, 07/2009.
"Formally Based Black Box Monitoring of Security Protocols",
International Symposium on Engineering Secure Software and Systems (ESSOS 2010): Springer-Verlag, 2010.
"From Goal-Driven Security Requirements Engineering to Secure Design",
International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
"Generating Tests from B Specifications and Dynamic Selection Criteria",
FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.
Revised and extended version of a paper from the ABZ'08 conference
"Incremental Security Verification for Evolving UMLsec models",
Proc. of the 7th European Conference on Modelling Foundations and Applications (ECMFA'11), Birmingham, UK, pp. 52-68, 2011.
"Model-Based Secure Software Development",
8th International Workshop on Security in Information Systems (WOSIS 2011), 13th International Conference on Enterprise Information Systems (ICEIS 2011), Beijing, June 2011, 2011.
"Model-Based Security Engineering for Evolving Systems",
11th School on Formal Methods (SFM 2011), Bertinoro (Italy) 13-18 June 2011, Springer, 2011.
"Model-based Security Engineering with UML",
26th IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010), Madrid, 21-25 Sep. 2010, 2010.
"Model-Based Security Verification and Testing for Smart-cards",
6th Intl. Conf. on Availability, Reliability and Security (ARES 2011), Vienna, Austria, 2011.
"Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications (invited lecture)",
11th School on Formal Methods (SFM 2011), Bertinoro, Italy, 2011.
"Orchestrating Security and System Engineering for Evolving Systems",
ServiceWave, pp. 134-143, 2011.
"Problem Analysis of Traditional IT-Security Risk Assessment Methods – An Experience Report",
IFIP SEC 2011, 2011.
"A quick tour of the VeriFast program verifier",
Programming Languages and Systems (APLAS 2010): Springer-Verlag, pp. 304–311, November, 2010.
"Run-time Security Traceability for Evolving Systems",
The Computer Journal: Oxford Univ. Press, 2010.
"Run-time Verification of Cryptographic Protocols",
Journal for Computers & Security, vol. 29, 2010.
"SecureChange: Security Engineering for Lifelong Evolvable Systems",
European Future Technologies Conference and Exhibition (FET09), Prague, Czech Republic, 04/2009.
Abstract