Publications
Filters: First Letter Of Last Name is L [Clear All Filters]
"Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox",
International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
"Using CORAS to Support Change Management",
Model-Driven Risk Analysis: The CORAS Approach: Springer, 2011.
"Test Generation using Symbolic Animation of Models",
Model-Based Testing for Embedded Systems: CRC Press, pp. ***–***, 2010.
Accepted manuscript. To appear
"Specifying features of an evolving software system",
Software: Practice and Experience, vol. 39, no. 11, pp. 973–1002, 2009.
Abstract
"Security Patterns: Comparing Modeling Approaches",
Software Engineering for Security Systems: Industrial and Research Perspectives: IGI Global, 2010.
"SeCMER: A Tool to Gain Control of Security Requirements Evolution",
Towards a Service-Based Internet, vol. 6994: Springer Berlin / Heidelberg, pp. 321-322, 2011.
Abstract
10.1007/978-3-642-24755-2_35
"Risk analysis of changing and evolving systems using CORAS",
Foundations of security analysis and design VI, vol. 6858: Springer, pp. 231-274, 2011.
"Orchestrating Security and System Engineering for Evolving Systems",
ServiceWave, pp. 134-143, 2011.
"An NFR Pattern Approach to Dealing with NFRs",
IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.
"MoVEing Forward: Towards an Architecture and Processes for a Living Models Infrastructure",
International Journal On Advances in Life Sciences, vol. 3, no. 1 and 2, pp. 12–22, 2011.
"Maintaining invariant traceability through bidirectional transformations",
34th International Conference on Software Engineering, 2012.
"Load Time Security Verification",
ICISS: Springer- Verlag, 2011.
"A Load Time Policy Checker for Open Multi-application Smart Cards",
Policy symposium 2011, Pisa, 2011.
"Living on the MoVE: Towards an Architecture for a Living Models Infrastructure.",
The Fifth International Conference on Software Engineering Advances, Nice, France, IEEE Computer Society, 08/2010.
"Industrialiser le test fonctionnel",
InfoPro - Etudes, développement et intégration: Dunod, 2009.
"Evolution in Relation to Risk and Trust Management",
IEEE Computer, vol. 43, issue 5, 05/2010.
"Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution",
23rd International Conference on Advanced Information Systems Engineering (CAiSE'11), London, Sringer-Verlag , 2011.
"Computer-Aided Threat Identification",
CEC 2011, New Orleans, IEEE, 2011.
"Change-driven Model Evolution for Living Models",
3rd Workshop Model-driven Tool and Process Intergration (MDTPI), ECMFA 2010, Paris, France, 06/2010.
"Automated UML models merging for web services testing",
Journal on Web and Grid Services, vol. 5, issue 2, pp. 107--129, 2009.
"Assessing architectural evolution: a case study",
Empirical Software Engineering, vol. 16, no. 5, pp. 623–666, June, 2011.
Abstract
The final version is available at the DOI given above. The zip file is the web companion mentioned in the paper.
"An Access Control Model Based Testing Approach for Smart Card Applications: Results of the POSÉ Project",
JIAS, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 335–351, 2010.