Publications
Filters: First Letter Of Last Name is M [Clear All Filters]
"Test Generation Based on Abstraction and Test Purposes to Complement Structural Tests",
A-MOST'10, 6th int. Workshop on Advances in Model Based Testing, in conjunction with ICST'10, Paris, France, pp. 54–61, 2010.
"A Tool for Managing Evolving Security Requirements",
CAiSE Forum: CEUR-WS.org, pp. 49-56, 2011.
"Tool Support for Code Generation from a UMLsec Property",
25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
"Tool support for code generation from a UMLsec property",
Proceedings of the IEEE/ACM international conference on Automated software engineering, New York, NY, USA, ACM, pp. 357–358, 2010.
"Tool support for UML-based specification and verification of role-based access control properties",
8th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2011.
Abstract
The UML profile and example described in this paper can be downloaded from the Related URL given below. Pages: 456-459 ISBN: 978-1-4503-0443-6
"Verifying FreeRTOS: from requirements to binary code",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11), vol. CS-TR-1272, 2011.
Short paper
"After-Life Vulnerabilities: A Study on Firefox Evolution, its Vulnerabilities and Fixes",
Proceeding of the International Symposium on Engineering Secure Software and Systems (ESSoS)'11, Madrid, Spain, 2/2011.
"Maintaining invariant traceability through bidirectional transformations",
34th International Conference on Software Engineering, 2012.
"Orchestrating Security and System Engineering for Evolving Systems",
ServiceWave, pp. 134-143, 2011.
"A Tool for Managing Evolving Security Requirements",
CAiSE Forum , London, Springer-Verlag, pp. 49-56, 2011.
"Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox",
International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
"An Access Control Model Based Testing Approach for Smart Card Applications: Results of the POSÉ Project",
JIAS, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 335–351, 2010.
"ACConv-An access control model for conversational Web services",
ACM Transactions on the Web, vol. Vol. x, No. y,, 01/2011.
"ACConv-An access control model for conversational Web services",
ACM Transactions on the Web , vol. Volume 5 , issue Issue 3, 07/2011 .
"Algorithms for Security-by-Contract on Multi-Application Java Cards",
Journal of Critical Computer-Based Systems, 2011.
"Evolving Embedded Systems",
IEEE Computer, vol. 43, issue 5, 5/2010.
"From Goal-Driven Security Requirements Engineering to Secure Design",
International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
"Generating Tests from B Specifications and Dynamic Selection Criteria",
FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.
Revised and extended version of a paper from the ABZ'08 conference
"SeAAS - A Reference Architecture for Security Services in SOA",
Journal of Universal Computer Science, 2010.
Combining Formal Methods and Testing: A Case Study on FreeRTOS,
, 2011.
Invited talk at the 10th International Conference on Software QA and Testing on Embedded Systems (QA&Test 2011), Bilbao, Spain.
A Quick Tour of the VeriFast Program Verifier,
, 2011.
Talk at a Departmental Seminar of the School of Computing, Newcastle University, UK.