Publications
Filters: First Letter Of Last Name is J  [Clear All Filters]
 
Change patterns: Co-evolving requirements and architecture,  
: K.U.Leuven, 08/2010.
 
Expressive modular fine-grained concurrency specification (Extended version),  
, no. CW590: Department of Computer Science, K.U.Leuven, July, 2010.
 
"An Access Control Model Based Testing Approach for Smart Card Applications: Results of the POSÉ Project",  
JIAS, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 335–351, 2010.
 
"Change Patterns: Co-evolving Requirements and Architecture",  
Software and Systems Modeling: Springer, 2011.
to appear
 
"Change Patterns: Co-evolving Requirements and Architecture",  
Software and Systems Modeling: Springer, Submitted.
 
"Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec",  
Requirements Engineering Journal, vol. 15(1), 2010.
 
"From Goal-Driven Security Requirements Engineering to Secure Design",  
International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
 
"Generating Tests from B Specifications and Dynamic Selection Criteria",  
FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.
Revised and extended version of a paper from the ABZ'08 conference
 
"Run-time Security Traceability for Evolving Systems",  
The Computer Journal: Oxford Univ. Press, 2010.
 
"Run-time Verification of Cryptographic Protocols",  
Journal for Computers & Security, vol. 29, 2010.
 
"Software Engineering for Secure Systems",  
 33rd International Conference on Software Engineering (ICSE 2011), 2011.
 
"Specifying features of an evolving software system",  
Software: Practice and Experience, vol. 39, no. 11, pp. 973–1002, 2009.
 Abstract
 
UMLsec4UML2 - Adopting UMLsec to Support UML2,  
, 02/2011.
 
"Formally Based Black Box Monitoring of Security Protocols",  
International Symposium on Engineering Secure Software and Systems (ESSOS 2010): Springer-Verlag, 2010.
 
"Orchestrating Security and System Engineering for Evolving Systems",  
ServiceWave, pp. 134-143, 2011.
 
"Problem Analysis of Traditional IT-Security Risk Assessment Methods – An Experience Report",  
IFIP SEC 2011, 2011.
 
"Annotation inference for separation logic based verifiers",  
Formal Techniques for Distributed Systems (FMOODS/FORTE 2011), vol. 6722: Springer, pp. 319–333, 2011.
Reykjavik, Iceland, 6-9 June 2011
 
"The Belgian electronic identity card: a verification case study",  
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.
Newcastle (UK), 12-14 September 2011, to appear
 
"Expressive modular fine-grained concurrency specification",  
Principles of Programming Languages (POPL 2011), January, 2011.
 
"Failboxes: Provably safe exception handling",  
ECOOP 2009 - Object-Oriented Programming, 23rd European Conference, Genova, Italy, July 6-10, 2009, Proceedings, vol. 5653: Springer-Verlag, pp. 470–494, 07/2009.
 
"Incremental Security Verification for Evolving UMLsec models",  
Proc. of the 7th European Conference on Modelling Foundations and Applications (ECMFA'11),  Birmingham, UK, pp. 52-68, 2011.
 
"Model-Based Secure Software Development",  
8th International Workshop on Security in Information Systems (WOSIS 2011), 13th International Conference on Enterprise Information Systems (ICEIS 2011), Beijing, June 2011, 2011.
 
"Model-Based Security Engineering for Evolving Systems",  
11th School on Formal Methods (SFM 2011),  Bertinoro (Italy) 13-18 June 2011, Springer, 2011.
 
"Model-based Security Engineering with UML",  
26th IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2010), Madrid, 21-25 Sep. 2010, 2010.
          
]  



