Security Engineering for Lifelong Evolvable Systems

Publications

Export 34 results:
Sort by: Author Title [ Type  (Desc)] Year
Filters: First Letter Of Last Name is Y  [Clear All Filters]
Report
Journal Article
Wermelinger, M., Y. Yu, A. Lozano, and A. Capiluppi, "Assessing architectural evolution: a case study", Empirical Software Engineering, vol. 16, no. 5, pp. 623–666, June, 2011. Abstract

The final version is available at the DOI given above. The zip file is the web companion mentioned in the paper.

Jürjens, J., A. Bauer, and Y. Yu, "Run-time Security Traceability for Evolving Systems", The Computer Journal: Oxford Univ. Press, 2010.
Nhlabatsi, A., B. Nuseibeh, and Y. Yu, "Security Requirements Engineering for Evolving Software Systems: A Survey", Journal of Secure Software Engineering, vol. 1, issue 1, pp. 54--73, 2009.
Conference Proceedings
Conference Paper
Gander, M., M. Hafner, H. Yu, and M. Memon, "Architectural Patterns for Model Driven Security in SOA", Communications and Multimedia Security - CMS 2010, Linz, Austria, 05/2010.
Chen, B., X. Peng, Y. Yu, and W. Zhao, "Are your sites down? Requirements-driven self-tuning for the survivability of Web systems", Requirements Engineering Conference (RE), 2011 19th IEEE International, pp. 219 -228, 29 2011-sept. 2. Abstract
Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Butler, S., M. Wermelinger, Y. Yu, and H. Sharp, "Mining Java class naming conventions", 27th IEEE International Conference on Software Maintenance: IEEE, 2011. Abstract
Tun, T. T., Y. Yu, C. B. Haley, and B. Nuseibeh, "Model-Based Argument Analysis for Evolving Security Requirements", Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, IEEE Computer Society, pp. 88-97, 06/10, 2010.
Fourneret, E., M. Ochoa, F. Bouquet, J. Botella, J. Jürjens, and P. Yousefi, "Model-Based Security Verification and Testing for Smart-cards", 6th Intl. Conf. on Availability, Reliability and Security (ARES 2011), Vienna, Austria, 2011.
Yu, Y., T. Tun, A. Tedeschi, V. N. L. Franqueira, and B. Nuseibeh, "OpenArgue: supporting argumentation to evolve secure software systems", 2011 IEEE 19th International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 351–352, August 2011. Abstract

ISBN: 978-1-4577-0924-1

Benats, G., A. Bandara, Y. Yu, J. - N. Colin, and B. Nuseibeh, "PrimAndroid: privacy policy modelling and analysis for Android applications", IEEE International Symposium on Policies for Distributed Systems and Networks, June, 2011. Abstract
Franqueira, V. N. L., T. T. Tun, Y. Yu, R. Wieringa, and B. Nuseibeh, "Risk and argument: A risk-based argumentation method for practical security", 19th IEEE International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 239-248, August 29 2011. Abstract
Heyman, T., K. Yskout, R. Scandariato, H. Schmidt, and Y. Yu, "The Security Twin Peaks", International Symposium on Engineering Secure Software and Systems, 2011.