Publications
Filters: First Letter Of Last Name is J [Clear All Filters]
Change patterns: Co-evolving requirements and architecture,
: K.U.Leuven, 08/2010.
Expressive modular fine-grained concurrency specification (Extended version),
, no. CW590: Department of Computer Science, K.U.Leuven, July, 2010.
"An Access Control Model Based Testing Approach for Smart Card Applications: Results of the POSÉ Project",
JIAS, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 335–351, 2010.
"Change Patterns: Co-evolving Requirements and Architecture",
Software and Systems Modeling: Springer, 2011.
to appear
"Change Patterns: Co-evolving Requirements and Architecture",
Software and Systems Modeling: Springer, Submitted.
"Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec",
Requirements Engineering Journal, vol. 15(1), 2010.
"From Goal-Driven Security Requirements Engineering to Secure Design",
International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
"Generating Tests from B Specifications and Dynamic Selection Criteria",
FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.
Revised and extended version of a paper from the ABZ'08 conference
"Run-time Security Traceability for Evolving Systems",
The Computer Journal: Oxford Univ. Press, 2010.
"Run-time Verification of Cryptographic Protocols",
Journal for Computers & Security, vol. 29, 2010.
"Software Engineering for Secure Systems",
33rd International Conference on Software Engineering (ICSE 2011), 2011.
"Specifying features of an evolving software system",
Software: Practice and Experience, vol. 39, no. 11, pp. 973–1002, 2009.
Abstract
UMLsec4UML2 - Adopting UMLsec to Support UML2,
, 02/2011.
"Formally Based Black Box Monitoring of Security Protocols",
International Symposium on Engineering Secure Software and Systems (ESSOS 2010): Springer-Verlag, 2010.
"Orchestrating Security and System Engineering for Evolving Systems",
ServiceWave, pp. 134-143, 2011.
"Problem Analysis of Traditional IT-Security Risk Assessment Methods – An Experience Report",
IFIP SEC 2011, 2011.
"Annotation inference for separation logic based verifiers",
Formal Techniques for Distributed Systems (FMOODS/FORTE 2011), vol. 6722: Springer, pp. 319–333, 2011.
Reykjavik, Iceland, 6-9 June 2011
"The Belgian electronic identity card: a verification case study",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.
Newcastle (UK), 12-14 September 2011, to appear
"Expressive modular fine-grained concurrency specification",
Principles of Programming Languages (POPL 2011), January, 2011.
"Failboxes: Provably safe exception handling",
ECOOP 2009 - Object-Oriented Programming, 23rd European Conference, Genova, Italy, July 6-10, 2009, Proceedings, vol. 5653: Springer-Verlag, pp. 470–494, 07/2009.
"Incremental Security Verification for Evolving UMLsec models",
Proc. of the 7th European Conference on Modelling Foundations and Applications (ECMFA'11), Birmingham, UK, pp. 52-68, 2011.
"Model-Based Secure Software Development",
8th International Workshop on Security in Information Systems (WOSIS 2011), 13th International Conference on Enterprise Information Systems (ICEIS 2011), Beijing, June 2011, 2011.
"Model-Based Security Engineering for Evolving Systems",
11th School on Formal Methods (SFM 2011), Bertinoro (Italy) 13-18 June 2011, Springer, 2011.
"Model-based Security Engineering with UML",
26th IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010), Madrid, 21-25 Sep. 2010, 2010.