Security Engineering for Lifelong Evolvable Systems

Publications

Export 13 results:
Sort by: Author Title Type [ Year  (Desc)]
Filters: First Letter Of Last Name is W  [Clear All Filters]
Submitted
2012
Ochoa, M., J. Jürjens, and D. Warzecha, "A Sound Decision Procedure for the Compositionality of Secrecy", 4th International Symposium on Engineering Secure Software and Systems (ESSOS 2012): Springer, 2012.
Fourneret, E., F. Bouquet, M. Ochoa, J. Jürjens, and S. Wenzel, "Vérification et Test pour des systèmes évolutifs", AFADL'12, Congrès Approches Formelles dans l'Assistance au Développement de Logiciels, Grenoble, France, pp. 150–164, 2012.
2011
Wermelinger, M., Y. Yu, A. Lozano, and A. Capiluppi, "Assessing architectural evolution: a case study", Empirical Software Engineering, vol. 16, no. 5, pp. 623–666, June, 2011. Abstract

The final version is available at the DOI given above. The zip file is the web companion mentioned in the paper.

Franqueira, V. N. L., T. T. Tun, Y. Yu, R. Wieringa, and B. Nuseibeh, "Risk and argument: A risk-based argumentation method for practical security", 19th IEEE International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 239-248, August 29 2011. Abstract
Felderer, M., B. Agreiter, and R. Breu, "Evolution of Security Requirements Tests for Service-Centric Systems", International Symposium on Engineering Secure Software and Systems, Madrid, Spain, Springer-Verlag, 02/2011. Abstract
Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Montrieux, L., M. Wermelinger, and Y. Yu, "Challenges in Model-Based Evolution and Merging of Access Control Policies", Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011. Abstract

ISBN: 978-1-4503-0848-9 Pages: 116-120

Butler, S., M. Wermelinger, Y. Yu, and H. Sharp, "Mining Java class naming conventions", 27th IEEE International Conference on Software Maintenance: IEEE, 2011. Abstract
Montrieux, L., M. Wermelinger, and Y. Yu, "Tool support for UML-based specification and verification of role-based access control properties", 8th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2011. Abstract

The UML profile and example described in this paper can be downloaded from the Related URL given below. Pages: 456-459 ISBN: 978-1-4503-0443-6

2010
Bandara, A., H. Shinpei, J. Jurjens, H. Kaiya, A. Kubo, R. Laney, H. Mouratidis, A. Nhlabatsi, B. Nuseibeh, Y. Tahara, et al., "Security Patterns: Comparing Modeling Approaches", Software Engineering for Security Systems: Industrial and Research Perspectives: IGI Global, 2010.
2009
Innerhofer-Oberperfler, F., D. Bachlechner, R. Maier, V. Hahn, M. Weitlaner, and R. Breu, "Information Security Management: A Collaborative Approach", International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.