Security Engineering for Lifelong Evolvable Systems

Publications

Export 28 results:
Sort by: Author Title Type [ Year  (Desc)]
Filters: Author is Yijun Yu  [Clear All Filters]
Submitted
2012
2011
Yu, Y., T. T. Tun, and B. Nuseibeh, "Specifying and detecting meaningful changes in programs", 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), IEEE, Lawrence, KS, USA, pp. 273-282, November 6-10, 2011. Abstract
Yu, Y., A. Bandara, T. T. Tun, and B. Nuseibeh, "Towards learning to detect meaningful changes in software", Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering, New York, NY, USA, ACM, pp. 51–54, November, 2011. Abstract
Wermelinger, M., Y. Yu, A. Lozano, and A. Capiluppi, "Assessing architectural evolution: a case study", Empirical Software Engineering, vol. 16, no. 5, pp. 623–666, June, 2011. Abstract

The final version is available at the DOI given above. The zip file is the web companion mentioned in the paper.

Benats, G., A. Bandara, Y. Yu, J. - N. Colin, and B. Nuseibeh, "PrimAndroid: privacy policy modelling and analysis for Android applications", IEEE International Symposium on Policies for Distributed Systems and Networks, June, 2011. Abstract
Franqueira, V. N. L., T. T. Tun, Y. Yu, R. Wieringa, and B. Nuseibeh, "Risk and argument: A risk-based argumentation method for practical security", 19th IEEE International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 239-248, August 29 2011. Abstract
Yu, Y., T. Tun, A. Tedeschi, V. N. L. Franqueira, and B. Nuseibeh, "OpenArgue: supporting argumentation to evolve secure software systems", 2011 IEEE 19th International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 351–352, August 2011. Abstract

ISBN: 978-1-4577-0924-1

Chen, B., X. Peng, Y. Yu, and W. Zhao, "Are your sites down? Requirements-driven self-tuning for the survivability of Web systems", Requirements Engineering Conference (RE), 2011 19th IEEE International, pp. 219 -228, 29 2011-sept. 2. Abstract
Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Massacci, F., J. Mylopoulos, F. Paci, T. T. Tun, and Y. Yu, "An Extended Ontology for Security Requirements", Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011. Abstract

10.1007/978-3-642-22056-2_64

Butler, S., M. Wermelinger, Y. Yu, and H. Sharp, "Mining Java class naming conventions", 27th IEEE International Conference on Software Maintenance: IEEE, 2011. Abstract
Bergmann, G., F. Massacci, F. Paci, T. Tun, D. Varró, and Y. Yu, "SeCMER: A Tool to Gain Control of Security Requirements Evolution", Towards a Service-Based Internet, vol. 6994: Springer Berlin / Heidelberg, pp. 321-322, 2011. Abstract

10.1007/978-3-642-24755-2_35

Heyman, T., K. Yskout, R. Scandariato, H. Schmidt, and Y. Yu, "The Security Twin Peaks", International Symposium on Engineering Secure Software and Systems, 2011.
Montrieux, L., M. Wermelinger, and Y. Yu, "Tool support for UML-based specification and verification of role-based access control properties", 8th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2011. Abstract

The UML profile and example described in this paper can be downloaded from the Related URL given below. Pages: 456-459 ISBN: 978-1-4503-0443-6

2010
Tun, T. T., Y. Yu, C. B. Haley, and B. Nuseibeh, "Model-Based Argument Analysis for Evolving Security Requirements", Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, IEEE Computer Society, pp. 88-97, 06/10, 2010.
Jürjens, J., A. Bauer, and Y. Yu, "Run-time Security Traceability for Evolving Systems", The Computer Journal: Oxford Univ. Press, 2010.
Bandara, A., H. Shinpei, J. Jurjens, H. Kaiya, A. Kubo, R. Laney, H. Mouratidis, A. Nhlabatsi, B. Nuseibeh, Y. Tahara, et al., "Security Patterns: Comparing Modeling Approaches", Software Engineering for Security Systems: Industrial and Research Perspectives: IGI Global, 2010.