Security Engineering for Lifelong Evolvable Systems

Publications

Export 42 results:
Sort by: Author Title Type [ Year  (Asc)]
Filters: First Letter Of Last Name is S  [Clear All Filters]
2009
Massacci, F., and I. Siahaan, "Optimizing IRM with Automata Modulo Theory", In the 5th International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.
Bouquet, F., R. Breu, J. Jurjens, F. Massacci, V. Meduri, Z. Micskei, F. Piessens, K. Stolen, and D. Varró, "SecureChange: Security Engineering for Lifelong Evolvable Systems", European Future Technologies Conference and Exhibition (FET09), Prague, Czech Republic, 04/2009. Abstract
2010
Supakkul, S., T. Hill, L. Chung, T. T. Tun, and J. C. S. P. do Leite, "An NFR Pattern Approach to Dealing with NFRs", IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.
Bandara, A., H. Shinpei, J. Jurjens, H. Kaiya, A. Kubo, R. Laney, H. Mouratidis, A. Nhlabatsi, B. Nuseibeh, Y. Tahara, et al., "Security Patterns: Comparing Modeling Approaches", Software Engineering for Security Systems: Industrial and Research Perspectives: IGI Global, 2010.
Montrieux, L., J. Jürjens, C. B. Haley, Y. Yu, P. - Y. Schobbens, and H. Toussaint, "Tool Support for Code Generation from a UMLsec Property", 25th IEEE/ACM International Conference on Automated Software Engineering (ASE'10), 2010.
Montrieux, L., J. Jürjens, C. B. Haley, Y. Yu, P. - Y. Schobbens, and H. Toussaint, "Tool support for code generation from a UMLsec property", Proceedings of the IEEE/ACM international conference on Automated software engineering, New York, NY, USA, ACM, pp. 357–358, 2010.
Massacci, F., and V. H. Nguyen, "Which is the Right Source of Vulnerability Studies? An Empirical Analysis on Mozilla Firefox", International Workshop on Security Measurement and Metrics (MetriSec)'10, Bolzano-Bozen, Italy, 9/2010.
Jacobs, B., J. Smans, and F. Piessens, "A quick tour of the VeriFast program verifier", Programming Languages and Systems (APLAS 2010): Springer-Verlag, pp. 304–311, November, 2010.
2011
Vogels, F., B. Jacobs, F. Piessens, and J. Smans, "Annotation inference for separation logic based verifiers", Formal Techniques for Distributed Systems (FMOODS/FORTE 2011), vol. 6722: Springer, pp. 319–333, 2011.

Reykjavik, Iceland, 6-9 June 2011

Philippaerts, P., F. Vogels, J. Smans, B. Jacobs, and F. Piessens, "The Belgian electronic identity card: a verification case study", Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.

Newcastle (UK), 12-14 September 2011, to appear

Massacci, F., J. Mylopoulos, F. Paci, T. T. Tun, and Y. Yu, "An Extended Ontology for Security Requirements", Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011. Abstract

10.1007/978-3-642-22056-2_64

Jürjens, J., L. Marchal, M. Ochoa, and H. Schmidt, "Incremental Security Verification for Evolving UMLsec models", Proc. of the 7th European Conference on Modelling Foundations and Applications (ECMFA'11), Birmingham, UK, pp. 52-68, 2011.
Butler, S., M. Wermelinger, Y. Yu, and H. Sharp, "Mining Java class naming conventions", 27th IEEE International Conference on Software Maintenance: IEEE, 2011. Abstract
Jürjens, J., and H. Schmidt, "Model-Based Secure Software Development", 8th International Workshop on Security in Information Systems (WOSIS 2011), 13th International Conference on Enterprise Information Systems (ICEIS 2011), Beijing, June 2011, 2011.