Security Engineering for Lifelong Evolvable Systems

Publications

Export 46 results:
Sort by: Author Title [ Type  (Desc)] Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
Miscellaneous
Mühlberg, J. T., and L. Freitas, Combining Formal Methods and Testing: A Case Study on FreeRTOS, , 2011.

Invited talk at the 10th International Conference on Software QA and Testing on Embedded Systems (QA&Test 2011), Bilbao, Spain.

Mühlberg, J. T., A Quick Tour of the VeriFast Program Verifier, , 2011.

Talk at a Departmental Seminar of the School of Computing, Newcastle University, UK.

Journal Article
Paci, F., M. Mecella, M. Ouzzani, and E. Bertino, "ACConv-An access control model for conversational Web services", ACM Transactions on the Web , vol. Volume 5 , issue Issue 3, 07/2011 .
Mouratidis, H., and J. Jürjens, "From Goal-Driven Security Requirements Engineering to Secure Design", International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
Julliand, J., P. - A. Masson, R. Tissot, and P. - C. Bué, "Generating Tests from B Specifications and Dynamic Selection Criteria", FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.

Revised and extended version of a paper from the ABZ'08 conference

Conference Proceedings
Conference Paper
Gander, M., M. Hafner, H. Yu, and M. Memon, "Architectural Patterns for Model Driven Security in SOA", Communications and Multimedia Security - CMS 2010, Linz, Austria, 05/2010.
Dragoni, N., O. Gadyatskaya, and F. Massacci, "Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?", Security and Privacy of Pervasive Systems and Small Devices, Passau, Germany, Springer, Submitted.
Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Felici, M., V. Meduri, B. Solhaug, and A. Tedeschi, "Evolutionary risk analysis: Expert judgement", Computer safety, reliability, and security (SAFECOMP), Italy, Springer, 09/2011.
Jürjens, J., L. Marchal, M. Ochoa, and H. Schmidt, "Incremental Security Verification for Evolving UMLsec models", Proc. of the 7th European Conference on Modelling Foundations and Applications (ECMFA'11), Birmingham, UK, pp. 52-68, 2011.
Innerhofer-Oberperfler, F., D. Bachlechner, R. Maier, V. Hahn, M. Weitlaner, and R. Breu, "Information Security Management: A Collaborative Approach", International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.