Publications
Filters: First Letter Of Last Name is S [Clear All Filters]
"Change Patterns: Co-evolving Requirements and Architecture",
Software and Systems Modeling: Springer, Submitted.
"Verifiable control flow properties for Java bytecode",
FAST 2011: Springer Berlin / Heidelberg, to appear, 2011.
"Evolutionary risk analysis: Expert judgement",
Computer safety, reliability, and security (SAFECOMP), Italy, Springer, 09/2011.
"Evaluation of experiences from applying the PREDIQT method in an industrial case study",
Secure System Integration and Reliability Improvement (SSIRI), Korea, IEEE Computer Society, 06/2011.
UMLsec4UML2 - Adopting UMLsec to Support UML2,
, 02/2011.
"Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study",
SINTEF report: SINTEF, 01/2011.
"Annotation inference for separation logic based verifiers",
Formal Techniques for Distributed Systems (FMOODS/FORTE 2011), vol. 6722: Springer, pp. 319–333, 2011.
Reykjavik, Iceland, 6-9 June 2011
"The Belgian electronic identity card: a verification case study",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.
Newcastle (UK), 12-14 September 2011, to appear
"Change Patterns: Co-evolving Requirements and Architecture",
Software and Systems Modeling: Springer, 2011.
to appear
"An Extended Ontology for Security Requirements",
Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011.
Abstract
10.1007/978-3-642-22056-2_64
"Incremental Security Verification for Evolving UMLsec models",
Proc. of the 7th European Conference on Modelling Foundations and Applications (ECMFA'11), Birmingham, UK, pp. 52-68, 2011.
"Mining Java class naming conventions",
27th IEEE International Conference on Software Maintenance: IEEE, 2011.
Abstract
"Model-Based Secure Software Development",
8th International Workshop on Security in Information Systems (WOSIS 2011), 13th International Conference on Enterprise Information Systems (ICEIS 2011), Beijing, June 2011, 2011.
"Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications (invited lecture)",
11th School on Formal Methods (SFM 2011), Bertinoro, Italy, 2011.
"On-Device Control Flow Verification for Java Programs",
Proc. of ESSoS’11, ACM/IEEE 3rd International Symposium on Engineering Secure Software and Systems, 2011.
"Orchestrating Security and System Engineering for Evolving Systems",
ServiceWave, pp. 134-143, 2011.
"Risk analysis of changing and evolving systems using CORAS",
Foundations of security analysis and design VI, vol. 6858: Springer, pp. 231-274, 2011.
"SeCMER: A Tool to Gain Control of Security Requirements Evolution",
Towards a Service-Based Internet, vol. 6994: Springer Berlin / Heidelberg, pp. 321-322, 2011.
Abstract
10.1007/978-3-642-24755-2_35
"The Security Twin Peaks",
International Symposium on Engineering Secure Software and Systems, 2011.
"Supporting Requirements Engineers in Recognising Security Issues",
17th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2011), Essen, 28-30 Mar. 2011, Springer, 2011.