Security Engineering for Lifelong Evolvable Systems

Publications

Export 42 results:
Sort by: Author [ Title  (Asc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R [S] T U V W X Y Z   [Show ALL]
R
S
Bergmann, G., F. Massacci, F. Paci, T. Tun, D. Varró, and Y. Yu, "SeCMER: A Tool to Gain Control of Security Requirements Evolution", Towards a Service-Based Internet, vol. 6994: Springer Berlin / Heidelberg, pp. 321-322, 2011. Abstract

10.1007/978-3-642-24755-2_35

Bouquet, F., R. Breu, J. Jurjens, F. Massacci, V. Meduri, Z. Micskei, F. Piessens, K. Stolen, and D. Varró, "SecureChange: Security Engineering for Lifelong Evolvable Systems", European Future Technologies Conference and Exhibition (FET09), Prague, Czech Republic, 04/2009. Abstract
Bandara, A., H. Shinpei, J. Jurjens, H. Kaiya, A. Kubo, R. Laney, H. Mouratidis, A. Nhlabatsi, B. Nuseibeh, Y. Tahara, et al., "Security Patterns: Comparing Modeling Approaches", Software Engineering for Security Systems: Industrial and Research Perspectives: IGI Global, 2010.
Heyman, T., K. Yskout, R. Scandariato, H. Schmidt, and Y. Yu, "The Security Twin Peaks", International Symposium on Engineering Secure Software and Systems, 2011.
Knauss, E., S. Houmb, K. Schneider, S. Islam, and J. Jürjens, "Supporting Requirements Engineers in Recognising Security Issues", 17th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2011), Essen, 28-30 Mar. 2011, Springer, 2011.
Hatebur, D., M. Heisel, J. Jürjens, and H. Schmidt, "Systematic Development of UMLsec Design Models Based On Security Requirements", 14th International Conference on Fundamental Approaches to Software Engineering (FASE 2011), Saarbrücken, Germany, 26 March - 3 April, 2011, Springer, 2011.
T
Montrieux, L., J. Jürjens, C. B. Haley, Y. Yu, P. - Y. Schobbens, and H. Toussaint, "Tool Support for Code Generation from a UMLsec Property", 25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
Montrieux, L., J. Jürjens, C. B. Haley, Y. Yu, P. - Y. Schobbens, and H. Toussaint, "Tool support for code generation from a UMLsec property", Proceedings of the IEEE/ACM international conference on Automated software engineering, New York, NY, USA, ACM, pp. 357–358, 2010.
U
V
Fontaine, A., S. Hym, and I. Simplot-Ryl, "Verifiable control flow properties for Java bytecode", FAST 2011: Springer Berlin / Heidelberg, to appear, 2011.
Jacobs, B., J. Smans, and F. Piessens, "Verification of unloadable modules", 17th International Symposium on Formal Methods (FM 2011), vol. 6664: Springer, pp. 402–416, 2011.

Limerick (Ireland), 20-24 June 2011

W
Massacci, F., and V. H. Nguyen, "Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox", International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.