Security Engineering for Lifelong Evolvable Systems

Publications

Export 17 results:
Sort by: [ Author  (Asc)] Title Type Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
A B C D E F G H I J K L [M] N O P Q R S T U V W X Y Z   [Show ALL]
M
Massacci, F., S. Neuhaus, and V. H. Nguyen, "After-Life Vulnerabilities: A Study on Firefox Evolution, its Vulnerabilities and Fixes", Proceeding of the International Symposium on Engineering Secure Software and Systems (ESSoS)'11, Madrid, Spain, 2/2011.
Massacci, F., J. Mylopoulos, F. Paci, T. T. Tun, and Y. Yu, "An Extended Ontology for Security Requirements", Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011. Abstract

10.1007/978-3-642-22056-2_64

Massacci, F., and V. H. Nguyen, "Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox", International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
Massacci, F., and I. Siahaan, "Optimizing IRM with Automata Modulo Theory", In the 5th International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.
Massacci, F., and F. Paci, "Secure Collaborative Systems", In Trustworthy Internet: Springer, 2011.
Memon, M., M. Hafner, and R. Breu, "Security As A Service: A Reference Architecture for SOA", 7th International Workshop on Security in Information Systems (WOSIS 2009), Milan, Italy, Springer, 05/2009.
Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Montrieux, L., M. Wermelinger, and Y. Yu, "Tool support for UML-based specification and verification of role-based access control properties", 8th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2011. Abstract

The UML profile and example described in this paper can be downloaded from the Related URL given below. Pages: 456-459 ISBN: 978-1-4503-0443-6

Montrieux, L., J. Jürjens, C. B. Haley, Y. Yu, P. - Y. Schobbens, and H. Toussaint, "Tool Support for Code Generation from a UMLsec Property", 25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
Montrieux, L., J. Jürjens, C. B. Haley, Y. Yu, P. - Y. Schobbens, and H. Toussaint, "Tool support for code generation from a UMLsec property", Proceedings of the IEEE/ACM international conference on Automated software engineering, New York, NY, USA, ACM, pp. 357–358, 2010.
Mouratidis, H., and J. Jürjens, "From Goal-Driven Security Requirements Engineering to Secure Design", International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
Mühlberg, J. T., and L. Freitas, "Verifying FreeRTOS: from requirements to binary code", Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11), vol. CS-TR-1272, 2011.

Short paper

Mühlberg, J. T., A Quick Tour of the VeriFast Program Verifier, , 2011.

Talk at a Departmental Seminar of the School of Computing, Newcastle University, UK.

Mühlberg, J. T., and L. Freitas, Combining Formal Methods and Testing: A Case Study on FreeRTOS, , 2011.

Invited talk at the 10th International Conference on Software QA and Testing on Embedded Systems (QA&Test 2011), Bilbao, Spain.