Security Engineering for Lifelong Evolvable Systems

Publications

Export 46 results:
Sort by: Author [ Title  (Desc)] Type Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
A B C D E F G H I J K L [M] N O P Q R S T U V W X Y Z   [Show ALL]
L
J
I
Innerhofer-Oberperfler, F., D. Bachlechner, R. Maier, V. Hahn, M. Weitlaner, and R. Breu, "Information Security Management: A Collaborative Approach", International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.
Jürjens, J., L. Marchal, M. Ochoa, and H. Schmidt, "Incremental Security Verification for Evolving UMLsec models", Proc. of the 7th European Conference on Modelling Foundations and Applications (ECMFA'11), Birmingham, UK, pp. 52-68, 2011.
G
Julliand, J., P. - A. Masson, R. Tissot, and P. - C. Bué, "Generating Tests from B Specifications and Dynamic Selection Criteria", FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.

Revised and extended version of a paper from the ABZ'08 conference

F
Mouratidis, H., and J. Jürjens, "From Goal-Driven Security Requirements Engineering to Secure Design", International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
E
Massacci, F., J. Mylopoulos, F. Paci, T. T. Tun, and Y. Yu, "An Extended Ontology for Security Requirements", Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011. Abstract

10.1007/978-3-642-22056-2_64

Felici, M., V. Meduri, B. Solhaug, and A. Tedeschi, "Evolutionary risk analysis: Expert judgement", Computer safety, reliability, and security (SAFECOMP), Italy, Springer, 09/2011.
C
Mühlberg, J. T., and L. Freitas, Combining Formal Methods and Testing: A Case Study on FreeRTOS, , 2011.

Invited talk at the 10th International Conference on Software QA and Testing on Embedded Systems (QA&Test 2011), Bilbao, Spain.

Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Dragoni, N., O. Gadyatskaya, and F. Massacci, "Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?", Security and Privacy of Pervasive Systems and Small Devices, Passau, Germany, Springer, Submitted.
A
Gander, M., M. Hafner, H. Yu, and M. Memon, "Architectural Patterns for Model Driven Security in SOA", Communications and Multimedia Security - CMS 2010, Linz, Austria, 05/2010.
Massacci, F., S. Neuhaus, and V. H. Nguyen, "After-Life Vulnerabilities: A Study on Firefox Evolution, its Vulnerabilities and Fixes", Proceeding of the International Symposium on Engineering Secure Software and Systems (ESSoS)'11, Madrid, Spain, 2/2011.
Paci, F., M. Mecella, M. Ouzzani, and E. Bertino, "ACConv-An access control model for conversational Web services", ACM Transactions on the Web , vol. Volume 5 , issue Issue 3, 07/2011 .