Publications
"Challenges in Model-Based Evolution and Merging of Access Control Policies",
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
"From Goal-Driven Security Requirements Engineering to Secure Design",
International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
A Quick Tour of the VeriFast Program Verifier,
, 2011.
Talk at a Departmental Seminar of the School of Computing, Newcastle University, UK.
Combining Formal Methods and Testing: A Case Study on FreeRTOS,
, 2011.
Invited talk at the 10th International Conference on Software QA and Testing on Embedded Systems (QA&Test 2011), Bilbao, Spain.
"Verifying FreeRTOS: from requirements to binary code",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11), vol. CS-TR-1272, 2011.
Short paper
"Algorithms for Security-by-Contract on Multi-Application Java Cards",
Journal of Critical Computer-Based Systems, 2011.
"Security Requirements Engineering for Evolving Software Systems: A Survey",
IJSSE, vol. 1, no. 1, pp. 54-73, 2010.
"Security Requirements Engineering for Evolving Software Systems: A Survey",
Journal of Secure Software Engineering, vol. 1, issue 1, pp. 54--73, 2009.
"Securing the Skies: In Requirements We Trust.",
IEEE Computer, vol. 42, no. 9, pp. 64-72, 2009.
"Java Card Architecture for Autonomous yet Secure Evolution of Smart Cards Applications",
Nordsec 2010 Conference Program, Aalto University, Espoo, Finland, 10/2010.
"A Sound Decision Procedure for the Compositionality of Secrecy",
4th International Symposium on Engineering Secure Software and Systems (ESSOS 2012): Springer, 2012.
"Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study",
SINTEF report: SINTEF, 01/2011.
"Evaluation of experiences from applying the PREDIQT method in an industrial case study",
Secure System Integration and Reliability Improvement (SSIRI), Korea, IEEE Computer Society, 06/2011.
"ACConv-An access control model for conversational Web services",
ACM Transactions on the Web, vol. Vol. x, No. y,, 01/2011.
"ACConv-An access control model for conversational Web services",
ACM Transactions on the Web , vol. Volume 5 , issue Issue 3, 07/2011 .
"Analyzing evolution of variability in a software product line: From contexts and requirements to features",
Information and Software Technology, vol. 53, no. 7, pp. 707 - 721, 2011.
Abstract
"Sound Formal Verification of Linux's USB BP Keyboard Driver",
The 4th NASA Formal Methods Symposium (NFM 2012), 2012.
to appear
"The Belgian electronic identity card: a verification case study",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.
Newcastle (UK), 12-14 September 2011, to appear
"Automated UML models merging for web services testing",
Journal on Web and Grid Services, vol. 5, issue 2, pp. 107--129, 2009.
"Change-driven Model Transformations",
Proc. of MODELS'09, ACM/IEEE 12th International Conference On Model Driven Engineering Languages and Systems, vol. 5795/2009, pp. 342-356, 2009.
Abstract
"Synchronization of abstract and concrete syntax in domain-specific modeling languages",
Software and Systems Modeling, vol. 9, pp. 453-471, 2010.
Abstract
UMLsec4UML2 - Adopting UMLsec to Support UML2,
, 02/2011.