Security Engineering for Lifelong Evolvable Systems

Publications

Export 149 results:
Sort by: Author Title Type [ Year  (Desc)]
2011
Mühlberg, J. T., and L. Freitas, Combining Formal Methods and Testing: A Case Study on FreeRTOS, , 2011.

Invited talk at the 10th International Conference on Software QA and Testing on Embedded Systems (QA&Test 2011), Bilbao, Spain.

L.M.S.Tran, and F.Massacci, "Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution", 23rd International Conference on Advanced Information Systems Engineering (CAiSE'11), London, Sringer-Verlag , 2011.
Massacci, F., J. Mylopoulos, F. Paci, T. T. Tun, and Y. Yu, "An Extended Ontology for Security Requirements", Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011. Abstract

10.1007/978-3-642-22056-2_64

Julliand, J., P. - A. Masson, R. Tissot, and P. - C. Bué, "Generating Tests from B Specifications and Dynamic Selection Criteria", FAC, Formal Aspects of Computing, vol. 23, no. 1, pp. 3–19, 2011.

Revised and extended version of a paper from the ABZ'08 conference

Bergmann, G., Z. Ujhelyi, I. Ráth, and D. Varró, "A Graph Query Language for EMF models", Theory and Practice of Model Transformations, Fourth International Conference, ICMT 2011, Zurich, Switzerland, June 27-28, 2011. Proceedings, vol. 6707: Springer, pp. 167-182, 2011. Abstract
Bergmann, G., A. Horváth, I. Ráth, and D. Varró, "Incremental Evaluation of Model Queries over EMF Models: A Tutorial on EMF-IncQuery", Modelling Foundations and Applications, vol. 6698: Springer Berlin / Heidelberg, pp. 389-390, 2011. Abstract
Jürjens, J., L. Marchal, M. Ochoa, and H. Schmidt, "Incremental Security Verification for Evolving UMLsec models", Proc. of the 7th European Conference on Modelling Foundations and Applications (ECMFA'11), Birmingham, UK, pp. 52-68, 2011.
Butler, S., M. Wermelinger, Y. Yu, and H. Sharp, "Mining Java class naming conventions", 27th IEEE International Conference on Software Maintenance: IEEE, 2011. Abstract
Jürjens, J., and H. Schmidt, "Model-Based Secure Software Development", 8th International Workshop on Security in Information Systems (WOSIS 2011), 13th International Conference on Enterprise Information Systems (ICEIS 2011), Beijing, June 2011, 2011.
Jürjens, J., "Model-Based Security Engineering for Evolving Systems", 11th School on Formal Methods (SFM 2011), Bertinoro (Italy) 13-18 June 2011, Springer, 2011.
Fourneret, E., M. Ochoa, F. Bouquet, J. Botella, J. Jürjens, and P. Yousefi, "Model-Based Security Verification and Testing for Smart-cards", 6th Intl. Conf. on Availability, Reliability and Security (ARES 2011), Vienna, Austria, 2011.
Breu, M., R. Breu, and S. Loew, "MoVEing Forward: Towards an Architecture and Processes for a Living Models Infrastructure", International Journal On Advances in Life Sciences, vol. 3, no. 1 and 2, pp. 12–22, 2011.
Fontaine, A., S. Hym, and I. Simplot-Ryl, "On-Device Control Flow Verification for Java Programs", Proc. of ESSoS’11, ACM/IEEE 3rd International Symposium on Engineering Secure Software and Systems, 2011.