Publications
Filters: First Letter Of Last Name is Y [Clear All Filters]
Change patterns: Co-evolving requirements and architecture,
: K.U.Leuven, 08/2010.
"Analyzing evolution of variability in a software product line: From contexts and requirements to features",
Information and Software Technology, vol. 53, no. 7, pp. 707 - 721, 2011.
Abstract
"Assessing architectural evolution: a case study",
Empirical Software Engineering, vol. 16, no. 5, pp. 623–666, June, 2011.
Abstract
The final version is available at the DOI given above. The zip file is the web companion mentioned in the paper.
"Change Patterns: Co-evolving Requirements and Architecture",
Software and Systems Modeling: Springer, 2011.
to appear
"Change Patterns: Co-evolving Requirements and Architecture",
Software and Systems Modeling: Springer, Submitted.
"Enhancing Argumentation with Risk Assessment for Achieving Good-Enough Security",
Requirements Engineering Journal , Submitted.
"Run-time Security Traceability for Evolving Systems",
The Computer Journal: Oxford Univ. Press, 2010.
"Security Requirements Engineering for Evolving Software Systems: A Survey",
Journal of Secure Software Engineering, vol. 1, issue 1, pp. 54--73, 2009.
"Security Requirements Engineering for Evolving Software Systems: A Survey",
IJSSE, vol. 1, no. 1, pp. 54-73, 2010.
"Maintaining invariant traceability through bidirectional transformations",
34th International Conference on Software Engineering, 2012.
"Problem Analysis of Traditional IT-Security Risk Assessment Methods – An Experience Report",
IFIP SEC 2011, 2011.
"A Tool for Managing Evolving Security Requirements",
CAiSE Forum , London, Springer-Verlag, pp. 49-56, 2011.
"Architectural Patterns for Model Driven Security in SOA",
Communications and Multimedia Security - CMS 2010, Linz, Austria, 05/2010.
"Are your sites down? Requirements-driven self-tuning for the survivability of Web systems",
Requirements Engineering Conference (RE), 2011 19th IEEE International, pp. 219 -228, 29 2011-sept. 2.
Abstract
"Challenges in Model-Based Evolution and Merging of Access Control Policies",
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
"Challenges in Model-Based Evolution and Merging of Access Control Policies",
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
"Miki: a wiki for synchronous modeling of software requirements",
4th FlexiTools workshop ? ICSE 2011, 2011.
Abstract
"Mining Java class naming conventions",
27th IEEE International Conference on Software Maintenance: IEEE, 2011.
Abstract
"Model-Based Argument Analysis for Evolving Security Requirements",
Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, IEEE Computer Society, pp. 88-97, 06/10, 2010.
"Model-Based Security Verification and Testing for Smart-cards",
6th Intl. Conf. on Availability, Reliability and Security (ARES 2011), Vienna, Austria, 2011.
"OpenArgue: supporting argumentation to evolve secure software systems",
2011 IEEE 19th International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 351–352, August 2011.
Abstract
ISBN: 978-1-4577-0924-1
"PrimAndroid: privacy policy modelling and analysis for Android applications",
IEEE International Symposium on Policies for Distributed Systems and Networks, June, 2011.
Abstract
"Risk and argument: A risk-based argumentation method for practical security",
19th IEEE International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 239-248, August 29 2011.
Abstract
"The Security Twin Peaks",
International Symposium on Engineering Secure Software and Systems, 2011.