Publications
Filters: First Letter Of Last Name is M [Clear All Filters]
"Load Time Security Verification",
ICISS: Springer- Verlag, 2011.
"A Load Time Policy Checker for Open Multi-application Smart Cards",
Policy symposium 2011, Pisa, 2011.
"Java Card Architecture for Autonomous yet Secure Evolution of Smart Cards Applications",
Nordsec 2010 Conference Program, Aalto University, Espoo, Finland, 10/2010.
"Information Security Management: A Collaborative Approach",
International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.
"Incremental Security Verification for Evolving UMLsec models",
Proc. of the 7th European Conference on Modelling Foundations and Applications (ECMFA'11), Birmingham, UK, pp. 52-68, 2011.
"Generating Tests from B Specifications and Dynamic Selection Criteria",
FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.
Revised and extended version of a paper from the ABZ'08 conference
"From Goal-Driven Security Requirements Engineering to Secure Design",
International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
"An Extended Ontology for Security Requirements",
Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011.
Abstract
10.1007/978-3-642-22056-2_64
"Evolving Embedded Systems",
IEEE Computer, vol. 43, issue 5, 5/2010.
"Evolutionary risk analysis: Expert judgement",
Computer safety, reliability, and security (SAFECOMP), Italy, Springer, 09/2011.
"Ecore to Genmodel case study solution using the Viatra2 framework",
Transformation Tool Contest (TTC ’10), Malaga, Spain, 07/2010.
Combining Formal Methods and Testing: A Case Study on FreeRTOS,
, 2011.
Invited talk at the 10th International Conference on Software QA and Testing on Embedded Systems (QA&Test 2011), Bilbao, Spain.
"Challenges in Model-Based Evolution and Merging of Access Control Policies",
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
"Challenges in Model-Based Evolution and Merging of Access Control Policies",
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
"Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?",
Security and Privacy of Pervasive Systems and Small Devices, Passau, Germany, Springer, Submitted.
"Architectural Patterns for Model Driven Security in SOA",
Communications and Multimedia Security - CMS 2010, Linz, Austria, 05/2010.
"Algorithms for Security-by-Contract on Multi-Application Java Cards",
Journal of Critical Computer-Based Systems, 2011.
"After-Life Vulnerabilities: A Study on Firefox Evolution, its Vulnerabilities and Fixes",
Proceeding of the International Symposium on Engineering Secure Software and Systems (ESSoS)'11, Madrid, Spain, 2/2011.
"ACConv-An access control model for conversational Web services",
ACM Transactions on the Web, vol. Vol. x, No. y,, 01/2011.
"ACConv-An access control model for conversational Web services",
ACM Transactions on the Web , vol. Volume 5 , issue Issue 3, 07/2011 .
"An Access Control Model Based Testing Approach for Smart Card Applications: Results of the POSÉ Project",
JIAS, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 335–351, 2010.