Security Engineering for Lifelong Evolvable Systems

Publications

Export 46 results:
Sort by: Author Title Type [ Year  (Desc)]
Filters: First Letter Of Last Name is M  [Clear All Filters]
Submitted
Dragoni, N., O. Gadyatskaya, and F. Massacci, "Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?", Security and Privacy of Pervasive Systems and Small Devices, Passau, Germany, Springer, Submitted.
2012
2011
Massacci, F., S. Neuhaus, and V. H. Nguyen, "After-Life Vulnerabilities: A Study on Firefox Evolution, its Vulnerabilities and Fixes", Proceeding of the International Symposium on Engineering Secure Software and Systems (ESSoS)'11, Madrid, Spain, 2/2011.
Hegedüs, A., Z. Ujhelyi, and G. Bergmann, "Saying Hello World with VIATRA2 - A Solution to the TTC 2011 Instructive Case", TTC 2011: Fifth Transformation Tool Contest, Zürich, Switzerland, June 29-30 2011, Post-Proceedings, vol. 74, Zürich, Switzerland, Open Publishing Association, pp. 302-324, 11/2011. Abstract
Hegedüs, A., Z. Ujhelyi, and G. Bergmann, "Solving the TTC 2011 Reengineering Case with VIATRA2", TTC 2011: Fifth Transformation Tool Contest, Zürich, Switzerland, June 29-30 2011, Post-Proceedings, vol. 74, Zürich, Switzerland, Open Publishing Association, pp. 136-148, 11/2011. Abstract
Felici, M., V. Meduri, B. Solhaug, and A. Tedeschi, "Evolutionary risk analysis: Expert judgement", Computer safety, reliability, and security (SAFECOMP), Italy, Springer, 09/2011.
Paci, F., M. Mecella, M. Ouzzani, and E. Bertino, "ACConv-An access control model for conversational Web services", ACM Transactions on the Web , vol. Volume 5 , issue Issue 3, 07/2011 .
Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Mühlberg, J. T., and L. Freitas, Combining Formal Methods and Testing: A Case Study on FreeRTOS, , 2011.

Invited talk at the 10th International Conference on Software QA and Testing on Embedded Systems (QA&Test 2011), Bilbao, Spain.

Massacci, F., J. Mylopoulos, F. Paci, T. T. Tun, and Y. Yu, "An Extended Ontology for Security Requirements", Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011. Abstract

10.1007/978-3-642-22056-2_64

Julliand, J., P. - A. Masson, R. Tissot, and P. - C. Bué, "Generating Tests from B Specifications and Dynamic Selection Criteria", FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.

Revised and extended version of a paper from the ABZ'08 conference

Jürjens, J., L. Marchal, M. Ochoa, and H. Schmidt, "Incremental Security Verification for Evolving UMLsec models", Proc. of the 7th European Conference on Modelling Foundations and Applications (ECMFA'11), Birmingham, UK, pp. 52-68, 2011.
Mühlberg, J. T., A Quick Tour of the VeriFast Program Verifier, , 2011.

Talk at a Departmental Seminar of the School of Computing, Newcastle University, UK.

Bergmann, G., F. Massacci, F. Paci, T. Tun, D. Varró, and Y. Yu, "SeCMER: A Tool to Gain Control of Security Requirements Evolution", Towards a Service-Based Internet, vol. 6994: Springer Berlin / Heidelberg, pp. 321-322, 2011. Abstract

10.1007/978-3-642-24755-2_35

Massacci, F., and F. Paci, "Secure Collaborative Systems", In Trustworthy Internet: Springer, 2011.
Dragoni, N., O. Gadyatskaya, and F. Massacci, "Supporting Software Evolution for Open Smart Cards by Security-by-Contract", Dependability and Computer Engineering: Concepts for Software-Intensive Systems: IGI , 2011.