Ontology-driven evolution of software security

[1]  Jens Bürger,et al.  Ontology Evolution in the Context of Model-Based Secure Software Engineering , 2020, RCIS.

[2]  Tuure Tuunanen,et al.  Design Science Research Process: A Model for Producing and Presenting Information Systems Research , 2020, ArXiv.

[3]  Sven Peldszus Model-driven Development of Evolving Secure Software Systems , 2020, Software Engineering.

[4]  Jan Jürjens,et al.  Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings , 2019, 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems (MODELS).

[5]  Riccardo Scandariato,et al.  Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis , 2019, 2019 IEEE International Conference on Software Architecture (ICSA).

[6]  Udo Kelter,et al.  Learning from Evolution for Evolution , 2019, Managed Software Evolution.

[7]  Sarah Smith Heckman,et al.  10+ Years of Teaching Software Engineering with iTrust: The Good, the Bad, and the Ugly , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET).

[8]  Xue Qin,et al.  GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).

[9]  Jens Bürger,et al.  A framework for semi-automated co-evolution of security knowledge and system models , 2018, J. Syst. Softw..

[10]  Malte Lochau,et al.  Controlling the Attack Surface of Object-Oriented Refactorings , 2018, FASE.

[11]  Ahmad Ashari,et al.  Review of Ontology Evolution Process , 2018 .

[12]  Mira Mezini,et al.  CogniCrypt: Supporting developers in using cryptography , 2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE).

[13]  Timo Kehrer,et al.  Henshin: A Usability-Focused Framework for EMF Model Transformation Development , 2017, ICGT.

[14]  Reiko Heckel,et al.  Automatic Inference of Rule-Based Specifications of Complex In-place Model Transformations , 2017, ICMT.

[15]  Malte Lochau,et al.  Continuous detection of design flaws in evolving object-oriented programs using incremental multi-pattern matching , 2016, 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).

[16]  Udo Kelter,et al.  Automatically Deriving the Specification of Model Editing Operations from Meta-Models , 2016, ICMT.

[17]  Malte Lochau,et al.  Incremental Co-Evolution of Java Programs based on Bidirectional Graph Transformation , 2015, PPPJ.

[18]  Frank Piessens,et al.  All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS , 2015, USENIX Annual Technical Conference.

[19]  Bashar Nuseibeh,et al.  Managing Security Control Assumptions Using Causal Traceability , 2015, 2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability.

[20]  Camille Salinesi,et al.  A Security Ontology for Security Requirements Elicitation , 2015, ESSoS.

[21]  Lorena Otero-Cerdeira,et al.  Ontology matching: A literature review , 2015, Expert Syst. Appl..

[22]  Malte Lochau,et al.  A Solution to the Java Refactoring Case Study using eMoflon , 2015, TTC@STAF.

[23]  Jens Bürger,et al.  Restoring security of evolving software models using graph transformation , 2014, International Journal on Software Tools for Technology Transfer.

[24]  Jens Bürger,et al.  Maintaining requirements for long-living software systems by incorporating security knowledge , 2014, 2014 IEEE 22nd International Requirements Engineering Conference (RE).

[25]  Bernd Brügge,et al.  Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring , 2014, 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE).

[26]  Andy Schürr,et al.  Developing eMoflon with eMoflon , 2014, ICMT.

[27]  Paolo Giorgini,et al.  Modeling and Verifying Security Policies in Business Processes , 2014, BMMDS/EMMSAD.

[28]  Jacques Klein,et al.  FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.

[29]  Ian Horrocks,et al.  Handbook of Knowledge Representation Edited Description Logics 3.1 Introduction , 2022 .

[30]  Jens Bürger,et al.  Versioning and Evolution Requirements for Model-Based System Development , 2014, Softwaretechnik-Trends.

[31]  Udo Kelter,et al.  Automatic Generation of Consistency-Preserving Edit Operations for MDE Tools , 2014, MoDELS.

[32]  Jens Bürger,et al.  Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models , 2013, FOSAD.

[33]  Enrico Motta,et al.  Ontology evolution: a process-centric survey , 2013, The Knowledge Engineering Review.

[34]  Max E. Kramer,et al.  View-centric engineering with synchronized heterogeneous models , 2013 .

[35]  Claus Pahl,et al.  Ontology Change Management and Identification of Change Patterns , 2013, Journal on Data Semantics.

[36]  Vassilis Christophides,et al.  High-level change detection in RDF(S) KBs , 2013, TODS.

[37]  Sungyoung Lee,et al.  Ontology Evolution and Challenges , 2013, J. Inf. Sci. Eng..

[38]  Barton P. Miller,et al.  Automated tracing and visualization of software security structure and properties , 2012, VizSec '12.

[39]  Udo Kelter,et al.  Understanding model evolution through semantically lifting model differences with SiLift , 2012, 2012 28th IEEE International Conference on Software Maintenance (ICSM).

[40]  Udo Kelter,et al.  Adaptability of model comparison tools , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.

[41]  Ernesto Damiani,et al.  A Low-Cost Security Certification Scheme for Evolving Services , 2012, 2012 IEEE 19th International Conference on Web Services.

[42]  Udo Kelter,et al.  A rule-based approach to the semantic lifting of model differences in the context of model versioning , 2011, 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011).

[43]  David Brumley,et al.  All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.

[44]  Jens von Pilgrim,et al.  A survey of traceability in requirements engineering and model-driven development , 2010, Software & Systems Modeling.

[45]  Claus Pahl,et al.  A Pattern-Based Framework of Change Operators for Ontology Evolution , 2009, OTM Workshops.

[46]  Vassilis Christophides,et al.  On Detecting High-Level Changes in RDF/S KBs , 2009, SEMWEB.

[47]  Rim Djedidi,et al.  Ontology Change Management , 2009, I-SEMANTICS.

[48]  Richard F. Paige,et al.  Different models for model matching: An analysis of approaches to support model differencing , 2009, 2009 ICSE Workshop on Comparison and Versioning of Software Models.

[49]  Colin Atkinson,et al.  Orthographic Software Modeling: A Practical Approach to View-Based Development , 2009, ENASE.

[50]  Gregor Engels,et al.  Detecting and Resolving Process Model Differences in the Absence of a Change Log , 2008, BPM.

[51]  Tom Mens,et al.  Ontology Evolution: State of the Art & Future Directions , 2008 .

[52]  Xiang Fu,et al.  A Static Analysis Framework For Detecting SQL Injection Vulnerabilities , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[53]  Olga De Troyer,et al.  Understanding ontology evolution: A change detection approach , 2007, J. Web Semant..

[54]  Bernd Brügge,et al.  Sysiphus: Enabling informal collaboration in global software development , 2006, 2006 IEEE International Conference on Global Software Engineering (ICGSE'06).

[55]  Olga De Troyer,et al.  Ontology Change Detection Using a Version Log , 2005, SEMWEB.

[56]  Alan R. Hevner,et al.  Design Science in Information Systems Research , 2004, MIS Q..

[57]  Gerd Wagner,et al.  A Unified Foundational Ontology and some Applications of it in Business Modeling , 2004, CAiSE Workshops.

[58]  C. Schneider CoObRA - a small step for development tools to collaborative environments , 2004, ICSE 2004.

[59]  Eleni Stroulia,et al.  A study on the current state of the art in tool-supported UML-based static reverse engineering , 2002, Ninth Working Conference on Reverse Engineering, 2002. Proceedings..

[60]  David Clark,et al.  Safety and Security Analysis of Object-Oriented Models , 2002, SAFECOMP.

[61]  Boris Motik,et al.  Managing Multiple Ontologies and Ontology Evolution in Ontologging , 2002, Intelligent Information Processing.

[62]  Andy Schürr,et al.  Specification of Graph Translators with Triple Graph Grammars , 1994, WG.

[63]  Thomas R. Gruber,et al.  A translation approach to portable ontology specifications , 1993, Knowl. Acquis..

[64]  Ernst Lippe,et al.  Operation-based merging , 1992, SDE 5.