Publications
Filters: First Letter Of Last Name is L [Clear All Filters]
"An Access Control Model Based Testing Approach for Smart Card Applications: Results of the POSÉ Project",
JIAS, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 335–351, 2010.
"Assessing architectural evolution: a case study",
Empirical Software Engineering, vol. 16, no. 5, pp. 623–666, June, 2011.
Abstract
The final version is available at the DOI given above. The zip file is the web companion mentioned in the paper.
"Automated UML models merging for web services testing",
Journal on Web and Grid Services, vol. 5, issue 2, pp. 107--129, 2009.
"Change-driven Model Evolution for Living Models",
3rd Workshop Model-driven Tool and Process Intergration (MDTPI), ECMFA 2010, Paris, France, 06/2010.
"Computer-Aided Threat Identification",
CEC 2011, New Orleans, IEEE, 2011.
"Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution",
23rd International Conference on Advanced Information Systems Engineering (CAiSE'11), London, Sringer-Verlag , 2011.
"Evolution in Relation to Risk and Trust Management",
IEEE Computer, vol. 43, issue 5, 05/2010.
"Industrialiser le test fonctionnel",
InfoPro - Etudes, développement et intégration: Dunod, 2009.
"Living on the MoVE: Towards an Architecture for a Living Models Infrastructure.",
The Fifth International Conference on Software Engineering Advances, Nice, France, IEEE Computer Society, 08/2010.
"A Load Time Policy Checker for Open Multi-application Smart Cards",
Policy symposium 2011, Pisa, 2011.
"Load Time Security Verification",
ICISS: Springer- Verlag, 2011.
"Maintaining invariant traceability through bidirectional transformations",
34th International Conference on Software Engineering, 2012.
"MoVEing Forward: Towards an Architecture and Processes for a Living Models Infrastructure",
International Journal On Advances in Life Sciences, vol. 3, no. 1 and 2, pp. 12–22, 2011.
"An NFR Pattern Approach to Dealing with NFRs",
IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.
"Orchestrating Security and System Engineering for Evolving Systems",
ServiceWave, pp. 134-143, 2011.
"Risk analysis of changing and evolving systems using CORAS",
Foundations of security analysis and design VI, vol. 6858: Springer, pp. 231-274, 2011.
"SeCMER: A Tool to Gain Control of Security Requirements Evolution",
Towards a Service-Based Internet, vol. 6994: Springer Berlin / Heidelberg, pp. 321-322, 2011.
Abstract
10.1007/978-3-642-24755-2_35
"Security Patterns: Comparing Modeling Approaches",
Software Engineering for Security Systems: Industrial and Research Perspectives: IGI Global, 2010.
"Specifying features of an evolving software system",
Software: Practice and Experience, vol. 39, no. 11, pp. 973–1002, 2009.
Abstract
"Test Generation using Symbolic Animation of Models",
Model-Based Testing for Embedded Systems: CRC Press, pp. ***–***, 2010.
Accepted manuscript. To appear
"Using CORAS to Support Change Management",
Model-Driven Risk Analysis: The CORAS Approach: Springer, 2011.
"Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox",
International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.