Publications
Filters: First Letter Of Last Name is M [Clear All Filters]
A Quick Tour of the VeriFast Program Verifier,
, 2011.
Talk at a Departmental Seminar of the School of Computing, Newcastle University, UK.
Combining Formal Methods and Testing: A Case Study on FreeRTOS,
, 2011.
Invited talk at the 10th International Conference on Software QA and Testing on Embedded Systems (QA&Test 2011), Bilbao, Spain.
"Verifying FreeRTOS: from requirements to binary code",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11), vol. CS-TR-1272, 2011.
Short paper
"From Goal-Driven Security Requirements Engineering to Secure Design",
International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
"Challenges in Model-Based Evolution and Merging of Access Control Policies",
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
"Challenges in Model-Based Evolution and Merging of Access Control Policies",
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
"Tool support for UML-based specification and verification of role-based access control properties",
8th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2011.
Abstract
The UML profile and example described in this paper can be downloaded from the Related URL given below. Pages: 456-459 ISBN: 978-1-4503-0443-6
"Tool Support for Code Generation from a UMLsec Property",
25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
"Tool support for code generation from a UMLsec property",
Proceedings of the IEEE/ACM international conference on Automated software engineering, New York, NY, USA, ACM, pp. 357–358, 2010.
"Security As A Service: A Reference Architecture for SOA",
7th International Workshop on Security in Information Systems (WOSIS 2009), Milan, Italy, Springer, 05/2009.
"An Access Control Model Based Testing Approach for Smart Card Applications: Results of the POSÉ Project",
JIAS, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 335–351, 2010.
"An Extended Ontology for Security Requirements",
Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011.
Abstract
10.1007/978-3-642-22056-2_64
"Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox",
International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
"Orchestrating Security and System Engineering for Evolving Systems",
ServiceWave, pp. 134-143, 2011.
"Optimizing IRM with Automata Modulo Theory",
In the 5th International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.
"Secure Collaborative Systems",
In Trustworthy Internet: Springer, 2011.
"After-Life Vulnerabilities: A Study on Firefox Evolution, its Vulnerabilities and Fixes",
Proceeding of the International Symposium on Engineering Secure Software and Systems (ESSoS)'11, Madrid, Spain, 2/2011.