@conference {88, title = {Can We Support Applications{\textquoteright} Evolution in Multi-Application Smart Cards by Security-by-Contract?}, booktitle = {Security and Privacy of Pervasive Systems and Small Devices}, year = {Submitted}, publisher = {Springer}, organization = {Springer}, address = {Passau, Germany}, keywords = {illegal information exchange, multi-application smart card, security policy enforcemen, Security-by-Contract}, author = {Nicola Dragoni and Olga Gadyatskaya and Massacci, Fabio} } @article {211, title = {Change Patterns: Co-evolving Requirements and Architecture}, journal = {Software and Systems Modeling}, year = {Submitted}, publisher = {Springer}, author = {Koen Yskout and Riccardo Scandariato and Wouter Joosen} } @article {214, title = {Enhancing Argumentation with Risk Assessment for Achieving Good-Enough Security}, journal = {Requirements Engineering Journal }, year = {Submitted}, author = {Virginia N. L. Franqueira and Thein Than Tun and Yijun Yu and Roel Wieringa and Bashar Nuseibeh} } @conference {ujhelyi-icst12, title = {Dynamic Backwards Slicing of Model Transformations}, booktitle = {Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on}, year = {2012}, note = {Accepted}, month = {04/2012}, author = {Zolt{\'a}n Ujhelyi and {\'A}kos Horv{\'a}th and D{\'a}niel Varr{\'o}} } @proceedings {199, title = {An Idea of an Independent Validation of Vulnerability Discovery Models}, journal = {International Symposium on Engineering Secure Software and Systems (ESSoS)}, year = {2012}, address = {Eindhoven}, author = {V.H.Nguyen and F.Massacci} } @proceedings {238, title = {Maintaining invariant traceability through bidirectional transformations}, journal = {34th International Conference on Software Engineering}, year = {2012}, author = {Yijun Yu and Yu Lin and Zhenjiang Hu and Soichiro Hidaka and Hiroyuki Kato and Lionel Montrieux} } @conference {225, title = {A Sound Decision Procedure for the Compositionality of Secrecy}, booktitle = {4th International Symposium on Engineering Secure Software and Systems (ESSOS 2012)}, year = {2012}, publisher = {Springer}, organization = {Springer}, author = {Martin Ochoa and J{\"u}rjens, Jan and Daniel Warzecha} } @conference {penninckx:usbkbd, title = {Sound Formal Verification of Linux{\textquoteright}s USB BP Keyboard Driver}, booktitle = {The 4th NASA Formal Methods Symposium (NFM 2012)}, year = {2012}, note = {to appear}, author = {Willem Penninckx and Jan Tobias M{\"u}hlberg and Jan Smans, Bart Jacobs and Piessens, Frank} } @inbook {IGIFAB, title = {State-based Evolution Management of Risk-based System Tests for Service-centric Systems.}, booktitle = {Emerging Technologies for the Evolution and Maintenance of Software Models.}, year = {2012}, pages = {298-318.}, publisher = {IGI Global}, organization = {IGI Global}, author = {Felderer, M. and Agreiter, B. and Breu, R.} } @conference {fboj+12:np, title = {V{\'e}rification et Test pour des syst{\`e}mes {\'e}volutifs}, booktitle = {AFADL{\textquoteright}12, Congr{\`e}s Approches Formelles dans l{\textquoteright}Assistance au D{\'e}veloppement de Logiciels}, year = {2012}, pages = {150{\textendash}164}, address = {Grenoble, France}, author = {Elizabeta Fourneret and Bouquet, Fabrice and Martin Ochoa and J{\"u}rjens, Jan and Sven Wenzel} }