Security Engineering for Lifelong Evolvable Systems

Publications

Export 43 results:
Sort by: Author Title Type [ Year  (Desc)]
Filters: First Letter Of Last Name is H  [Clear All Filters]
2012
Ujhelyi, Z., A. Horváth, and D. Varró, "Dynamic Backwards Slicing of Model Transformations", Software Testing, Verification and Validation (ICST), 2012 IEEE Fifth International Conference on, 04/2012.

Accepted

2011
Fontaine, A., S. Hym, and I. Simplot-Ryl, "Verifiable control flow properties for Java bytecode", FAST 2011: Springer Berlin / Heidelberg, to appear, 2011.
Bergmann, G., A. Hegedüs, A. Horváth, I. Ráth, Z. Ujhelyi, and D. Varró, "Implementing Efficient Model Validation in EMF Tools: Tool Demonstration", 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, USA, IEEE Computer Society, 11/2011. Abstract
Hegedüs, A., A. Horváth, I. Ráth, and D. Varró, "A Model-driven Framework for Guided Design Space Exploration", 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, USA, IEEE Computer Society, 11/2011. Abstract

ACM Distinguished Paper Award, Acceptance rate: 15%

Hegedüs, A., Z. Ujhelyi, and G. Bergmann, "Saying Hello World with VIATRA2 - A Solution to the TTC 2011 Instructive Case", TTC 2011: Fifth Transformation Tool Contest, Zürich, Switzerland, June 29-30 2011, Post-Proceedings, vol. 74, Zürich, Switzerland, Open Publishing Association, pp. 302-324, 11/2011. Abstract
Hegedüs, A., Z. Ujhelyi, and G. Bergmann, "Solving the TTC 2011 Reengineering Case with VIATRA2", TTC 2011: Fifth Transformation Tool Contest, Zürich, Switzerland, June 29-30 2011, Post-Proceedings, vol. 74, Zürich, Switzerland, Open Publishing Association, pp. 136-148, 11/2011. Abstract
Ujhelyi, Z., A. Horváth, and D. Varró, "Towards Dynamic Backward Slicing of Model Transformations", 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, Kansas, IEEE Computer Society, 11/2011.
Bergmann, G., D. Horváth, and A. Horváth, "Graph Transformation with Incremental Pattern Matching on a Relational Database", International Symposium on Applications of Graph Transformation With Industrial Relevance (AGTIVE 2011), Budapest, Hungary, 10/2011.

In Review for Post-proceedings.

Hegedüs, A., A. Horváth, I. Ráth, M. C. Branco, and D. Varró, "Quick fix generation for DSMLs", IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2011, Pittsbourgh, PA, USA, IEEE Computer Society, 09/2011. Abstract

Acceptance rate: 33%

Ujhelyi, Z., A. Horváth, and D. Varró, "Static Type Checking of Model Transformation Programs", Electronic Communications of the EASST, International Conference on Graph Transformation 2010 - Doctoral Symposium, vol. 38, 09/2011. Abstract

Accepted

Hegedüs, A., A. Horváth, and D. Varró, "Towards Guided Trajectory Exploration of Graph Transformation Systems", Electronic Communications of the EASST, Petri Nets and Graph Transformations 2010, vol. 40, 08/2011. Abstract
Hegedüs, A., Z. Ujhelyi, I. Ráth, and A. Horváth, "Visualization of Traceability Models with Domain-specific Layouting", Electronic Communications of the EASST, Proceedings of the Fourth International Workshop on Graph-Based Tools, vol. 32, 04/2011. Abstract
Innerhofer-Oberperfler, F., M. Hafner, and R. Breu, "Living Security — Collaborative Security Management in a Changing World", Tenth IASTED International Conference on Software Engineering SE 2011, Innsbruck, Austria, ACTA Press, 02/2011.
Bergmann, G., A. Horváth, I. Ráth, and D. Varró, "Incremental Evaluation of Model Queries over EMF Models: A Tutorial on EMF-IncQuery", Modelling Foundations and Applications, vol. 6698: Springer Berlin / Heidelberg, pp. 389-390, 2011. Abstract
Fontaine, A., S. Hym, and I. Simplot-Ryl, "On-Device Control Flow Verification for Java Programs", Proc. of ESSoS’11, ACM/IEEE 3rd International Symposium on Engineering Secure Software and Systems, 2011.
Heyman, T., K. Yskout, R. Scandariato, H. Schmidt, and Y. Yu, "The Security Twin Peaks", International Symposium on Engineering Secure Software and Systems, 2011.
Knauss, E., S. Houmb, K. Schneider, S. Islam, and J. Jürjens, "Supporting Requirements Engineers in Recognising Security Issues", 17th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2011), Essen, 28-30 Mar. 2011, Springer, 2011.
Hatebur, D., M. Heisel, J. Jürjens, and H. Schmidt, "Systematic Development of UMLsec Design Models Based On Security Requirements", 14th International Conference on Fundamental Approaches to Software Engineering (FASE 2011), Saarbrücken, Germany, 26 March - 3 April, 2011, Springer, 2011.
2010
Bergmann, G., A. Horváth, I. Ráth, D. Varró, A. Balogh, Z. Balogh, and A. Ökrös, "Incremental Evaluation of Model Queries over EMF Models", Model Driven Engineering Languages and Systems, 13th International Conference, MODELS’10: Springer, 10/2010.

Acceptance rate: 21%

Bergmann, G., A. Horvath, I. Ráth, D. Varró, and al., "Incremental query evaluation over EMF models", ACM/IEEE 13th International Conference On Model Driven Engineering Languages and Systems, Oslo, Norway, ACM/IEEE , 10/2010.
Hafner, M., "Modeling and Managing System Evolution Description of EternalS Task Force 2", Leveraging Applications of Formal Methods, Verification, and Validation 4th International Symposium on Leveraging Applications, Isola 2010, Heraklion, Greece, 10/2010.