Publications
Filters: First Letter Of Last Name is W [Clear All Filters]
"Enhancing Argumentation with Risk Assessment for Achieving Good-Enough Security",
Requirements Engineering Journal , Submitted.
"A Sound Decision Procedure for the Compositionality of Secrecy",
4th International Symposium on Engineering Secure Software and Systems (ESSOS 2012): Springer, 2012.
"Vérification et Test pour des systèmes évolutifs",
AFADL'12, Congrès Approches Formelles dans l'Assistance au Développement de Logiciels, Grenoble, France, pp. 150–164, 2012.
"Assessing architectural evolution: a case study",
Empirical Software Engineering, vol. 16, no. 5, pp. 623–666, June, 2011.
Abstract
The final version is available at the DOI given above. The zip file is the web companion mentioned in the paper.
"Risk and argument: A risk-based argumentation method for practical security",
19th IEEE International Requirements Engineering Conference, Trento, Italy, IEEE, pp. 239-248, August 29 2011.
Abstract
"Evolution of Security Requirements Tests for Service-Centric Systems",
International Symposium on Engineering Secure Software and Systems, Madrid, Spain, Springer-Verlag, 02/2011.
Abstract
"Challenges in Model-Based Evolution and Merging of Access Control Policies",
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
"Challenges in Model-Based Evolution and Merging of Access Control Policies",
Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 2011.
Abstract
ISBN: 978-1-4503-0848-9 Pages: 116-120
"Mining Java class naming conventions",
27th IEEE International Conference on Software Maintenance: IEEE, 2011.
Abstract
"Orchestrating Security and System Engineering for Evolving Systems",
ServiceWave, pp. 134-143, 2011.
"Tool support for UML-based specification and verification of role-based access control properties",
8th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2011.
Abstract
The UML profile and example described in this paper can be downloaded from the Related URL given below. Pages: 456-459 ISBN: 978-1-4503-0443-6
"Security Patterns: Comparing Modeling Approaches",
Software Engineering for Security Systems: Industrial and Research Perspectives: IGI Global, 2010.
"Information Security Management: A Collaborative Approach",
International Workshop on Security and Trust Management (STM 2009), in conjunction with ESORICS 2009, Saint-Malo, 2009.