Publications
Filters: First Letter Of Last Name is M [Clear All Filters]
"Load Time Security Verification",
ICISS: Springer- Verlag, 2011.
"Modeling and Managing System Evolution Description of EternalS Task Force 2",
Leveraging Applications of Formal Methods, Verification, and Validation 4th International Symposium on Leveraging Applications, Isola 2010, Heraklion, Greece, 10/2010.
"Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications (invited lecture)",
11th School on Formal Methods (SFM 2011), Bertinoro, Italy, 2011.
"Optimizing IRM with Automata Modulo Theory",
In the 5th International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.
"Saying Hello World with VIATRA2 - A Solution to the TTC 2011 Instructive Case",
TTC 2011: Fifth Transformation Tool Contest, Zürich, Switzerland, June 29-30 2011, Post-Proceedings, vol. 74, Zürich, Switzerland, Open Publishing Association, pp. 302-324, 11/2011.
Abstract
"SecureChange: Security Engineering for Lifelong Evolvable Systems",
European Future Technologies Conference and Exhibition (FET09), Prague, Czech Republic, 04/2009.
Abstract
"Security As A Service: A Reference Architecture for SOA",
7th International Workshop on Security in Information Systems (WOSIS 2009), Milan, Italy, Springer, 05/2009.
"Solving the TTC 2011 Reengineering Case with VIATRA2",
TTC 2011: Fifth Transformation Tool Contest, Zürich, Switzerland, June 29-30 2011, Post-Proceedings, vol. 74, Zürich, Switzerland, Open Publishing Association, pp. 136-148, 11/2011.
Abstract
"Sound Formal Verification of Linux's USB BP Keyboard Driver",
The 4th NASA Formal Methods Symposium (NFM 2012), 2012.
to appear
"Test Generation Based on Abstraction and Test Purposes to Complement Structural Tests",
A-MOST'10, 6th int. Workshop on Advances in Model Based Testing, in conjunction with ICST'10, Paris, France, pp. 54–61, 2010.
"A Tool for Managing Evolving Security Requirements",
CAiSE Forum: CEUR-WS.org, pp. 49-56, 2011.
"Tool Support for Code Generation from a UMLsec Property",
25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
"Tool support for code generation from a UMLsec property",
Proceedings of the IEEE/ACM international conference on Automated software engineering, New York, NY, USA, ACM, pp. 357–358, 2010.
"Tool support for UML-based specification and verification of role-based access control properties",
8th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2011.
Abstract
The UML profile and example described in this paper can be downloaded from the Related URL given below. Pages: 456-459 ISBN: 978-1-4503-0443-6
"Verifying FreeRTOS: from requirements to binary code",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11), vol. CS-TR-1272, 2011.
Short paper
"An Extended Ontology for Security Requirements",
Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011.
Abstract
10.1007/978-3-642-22056-2_64
"SeCMER: A Tool to Gain Control of Security Requirements Evolution",
Towards a Service-Based Internet, vol. 6994: Springer Berlin / Heidelberg, pp. 321-322, 2011.
Abstract
10.1007/978-3-642-24755-2_35
"Secure Collaborative Systems",
In Trustworthy Internet: Springer, 2011.
"Security Patterns: Comparing Modeling Approaches",
Software Engineering for Security Systems: Industrial and Research Perspectives: IGI Global, 2010.
"Supporting Software Evolution for Open Smart Cards by Security-by-Contract",
Dependability and Computer Engineering: Concepts for Software-Intensive Systems: IGI , 2011.
"Test Generation using Symbolic Animation of Models",
Model-Based Testing for Embedded Systems: CRC Press, pp. ***–***, 2010.
Accepted manuscript. To appear