Security Engineering for Lifelong Evolvable Systems

Publications

Export 8 results:
Sort by: Author [ Title  (Desc)] Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B [C] D E F G H I J K L M N O P Q R S T U V W X Y Z   [Show ALL]
S
P
Benats, G., A. Bandara, Y. Yu, J. - N. Colin, and B. Nuseibeh, "PrimAndroid: privacy policy modelling and analysis for Android applications", IEEE International Symposium on Policies for Distributed Systems and Networks, June, 2011. Abstract
N
Supakkul, S., T. Hill, L. Chung, T. T. Tun, and J. C. S. P. do Leite, "An NFR Pattern Approach to Dealing with NFRs", IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.
G
Bergmann, G., Z. Ujhelyi, I. Ráth, and D. Varró, "A Graph Query Language for EMF models", Theory and Practice of Model Transformations, Fourth International Conference, ICMT 2011, Zurich, Switzerland, June 27-28, 2011. Proceedings, vol. 6707: Springer, pp. 167-182, 2011. Abstract
A
Wermelinger, M., Y. Yu, A. Lozano, and A. Capiluppi, "Assessing architectural evolution: a case study", Empirical Software Engineering, vol. 16, no. 5, pp. 623–666, June, 2011. Abstract

The final version is available at the DOI given above. The zip file is the web companion mentioned in the paper.

Chen, B., X. Peng, Y. Yu, and W. Zhao, "Are your sites down? Requirements-driven self-tuning for the survivability of Web systems", Requirements Engineering Conference (RE), 2011 19th IEEE International, pp. 219 -228, 29 2011-sept. 2. Abstract