Publications
Filters: First Letter Of Last Name is M [Clear All Filters]
Combining Formal Methods and Testing: A Case Study on FreeRTOS,
, 2011.
Invited talk at the 10th International Conference on Software QA and Testing on Embedded Systems (QA&Test 2011), Bilbao, Spain.
A Quick Tour of the VeriFast Program Verifier,
, 2011.
Talk at a Departmental Seminar of the School of Computing, Newcastle University, UK.
"An Access Control Model Based Testing Approach for Smart Card Applications: Results of the POSÉ Project",
JIAS, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 335–351, 2010.
"ACConv-An access control model for conversational Web services",
ACM Transactions on the Web, vol. Vol. x, No. y,, 01/2011.
"ACConv-An access control model for conversational Web services",
ACM Transactions on the Web , vol. Volume 5 , issue Issue 3, 07/2011 .
"Algorithms for Security-by-Contract on Multi-Application Java Cards",
Journal of Critical Computer-Based Systems, 2011.
"Evolving Embedded Systems",
IEEE Computer, vol. 43, issue 5, 5/2010.
"From Goal-Driven Security Requirements Engineering to Secure Design",
International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
"Generating Tests from B Specifications and Dynamic Selection Criteria",
FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.
Revised and extended version of a paper from the ABZ'08 conference
"SeAAS - A Reference Architecture for Security Services in SOA",
Journal of Universal Computer Science, 2010.
"After-Life Vulnerabilities: A Study on Firefox Evolution, its Vulnerabilities and Fixes",
Proceeding of the International Symposium on Engineering Secure Software and Systems (ESSoS)'11, Madrid, Spain, 2/2011.
"Maintaining invariant traceability through bidirectional transformations",
34th International Conference on Software Engineering, 2012.
"Orchestrating Security and System Engineering for Evolving Systems",
ServiceWave, pp. 134-143, 2011.
"A Tool for Managing Evolving Security Requirements",
CAiSE Forum , London, Springer-Verlag, pp. 49-56, 2011.
"Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox",
International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
"Architectural Patterns for Model Driven Security in SOA",
Communications and Multimedia Security - CMS 2010, Linz, Austria, 05/2010.
"Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?",
Security and Privacy of Pervasive Systems and Small Devices, Passau, Germany, Springer, Submitted.
"Challenges in Model-Based Evolution and Merging of Access Control Policies",
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
"Challenges in Model-Based Evolution and Merging of Access Control Policies",
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
"Ecore to Genmodel case study solution using the Viatra2 framework",
Transformation Tool Contest (TTC ’10), Malaga, Spain, 07/2010.
"Evolutionary risk analysis: Expert judgement",
Computer safety, reliability, and security (SAFECOMP), Italy, Springer, 09/2011.
"Incremental Security Verification for Evolving UMLsec models",
Proc. of the 7th European Conference on Modelling Foundations and Applications (ECMFA'11), Birmingham, UK, pp. 52-68, 2011.
"Information Security Management: A Collaborative Approach",
International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.
"Java Card Architecture for Autonomous yet Secure Evolution of Smart Cards Applications",
Nordsec 2010 Conference Program, Aalto University, Espoo, Finland, 10/2010.
"A Load Time Policy Checker for Open Multi-application Smart Cards",
Policy symposium 2011, Pisa, 2011.