Publications
Filters: First Letter Of Last Name is S [Clear All Filters]
"Systematic Development of UMLsec Design Models Based On Security Requirements",
14th International Conference on Fundamental Approaches to Software Engineering (FASE 2011), Saarbrücken, Germany, 26 March - 3 April, 2011, Springer, 2011.
"Using CORAS to Support Change Management",
Model-Driven Risk Analysis: The CORAS Approach: Springer, 2011.
"Verification of unloadable modules",
17th International Symposium on Formal Methods (FM 2011), vol. 6664: Springer, pp. 402–416, 2011.
Limerick (Ireland), 20-24 June 2011
"A quick tour of the VeriFast program verifier",
Programming Languages and Systems (APLAS 2010): Springer-Verlag, pp. 304–311, November, 2010.
"Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox",
International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
"Evolving Embedded Systems",
IEEE Computer, vol. 43, issue 5, 5/2010.
"Java Card Architecture for Autonomous yet Secure Evolution of Smart Cards Applications",
Nordsec 2010 Conference Program, Aalto University, Espoo, Finland, 10/2010.
Change patterns: Co-evolving requirements and architecture,
: K.U.Leuven, 08/2010.
"Evolution in Relation to Risk and Trust Management",
IEEE Computer, vol. 43, issue 5, 05/2010.
"Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec",
Requirements Engineering Journal, vol. 15(1), 2010.
"An NFR Pattern Approach to Dealing with NFRs",
IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.
"Security Patterns: Comparing Modeling Approaches",
Software Engineering for Security Systems: Industrial and Research Perspectives: IGI Global, 2010.
"Tool Support for Code Generation from a UMLsec Property",
25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
"Tool support for code generation from a UMLsec property",
Proceedings of the IEEE/ACM international conference on Automated software engineering, New York, NY, USA, ACM, pp. 357–358, 2010.
"SecureChange: Security Engineering for Lifelong Evolvable Systems",
European Future Technologies Conference and Exhibition (FET09), Prague, Czech Republic, 04/2009.
Abstract
"Optimizing IRM with Automata Modulo Theory",
In the 5th International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.