Ontology-driven evolution of software security
暂无分享,去创建一个
Jens Bürger | Jan Jürjens | Timo Kehrer | Sven Peldszus | J. Jürjens | Sven Peldszus | Timo Kehrer | J. Bürger
[1] Jens Bürger,et al. Ontology Evolution in the Context of Model-Based Secure Software Engineering , 2020, RCIS.
[2] Tuure Tuunanen,et al. Design Science Research Process: A Model for Producing and Presenting Information Systems Research , 2020, ArXiv.
[3] Sven Peldszus. Model-driven Development of Evolving Secure Software Systems , 2020, Software Engineering.
[4] Jan Jürjens,et al. Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings , 2019, 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems (MODELS).
[5] Riccardo Scandariato,et al. Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis , 2019, 2019 IEEE International Conference on Software Architecture (ICSA).
[6] Udo Kelter,et al. Learning from Evolution for Evolution , 2019, Managed Software Evolution.
[7] Sarah Smith Heckman,et al. 10+ Years of Teaching Software Engineering with iTrust: The Good, the Bad, and the Ugly , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET).
[8] Xue Qin,et al. GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE).
[9] Jens Bürger,et al. A framework for semi-automated co-evolution of security knowledge and system models , 2018, J. Syst. Softw..
[10] Malte Lochau,et al. Controlling the Attack Surface of Object-Oriented Refactorings , 2018, FASE.
[11] Ahmad Ashari,et al. Review of Ontology Evolution Process , 2018 .
[12] Mira Mezini,et al. CogniCrypt: Supporting developers in using cryptography , 2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[13] Timo Kehrer,et al. Henshin: A Usability-Focused Framework for EMF Model Transformation Development , 2017, ICGT.
[14] Reiko Heckel,et al. Automatic Inference of Rule-Based Specifications of Complex In-place Model Transformations , 2017, ICMT.
[15] Malte Lochau,et al. Continuous detection of design flaws in evolving object-oriented programs using incremental multi-pattern matching , 2016, 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).
[16] Udo Kelter,et al. Automatically Deriving the Specification of Model Editing Operations from Meta-Models , 2016, ICMT.
[17] Malte Lochau,et al. Incremental Co-Evolution of Java Programs based on Bidirectional Graph Transformation , 2015, PPPJ.
[18] Frank Piessens,et al. All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS , 2015, USENIX Annual Technical Conference.
[19] Bashar Nuseibeh,et al. Managing Security Control Assumptions Using Causal Traceability , 2015, 2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability.
[20] Camille Salinesi,et al. A Security Ontology for Security Requirements Elicitation , 2015, ESSoS.
[21] Lorena Otero-Cerdeira,et al. Ontology matching: A literature review , 2015, Expert Syst. Appl..
[22] Malte Lochau,et al. A Solution to the Java Refactoring Case Study using eMoflon , 2015, TTC@STAF.
[23] Jens Bürger,et al. Restoring security of evolving software models using graph transformation , 2014, International Journal on Software Tools for Technology Transfer.
[24] Jens Bürger,et al. Maintaining requirements for long-living software systems by incorporating security knowledge , 2014, 2014 IEEE 22nd International Requirements Engineering Conference (RE).
[25] Bernd Brügge,et al. Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring , 2014, 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE).
[26] Andy Schürr,et al. Developing eMoflon with eMoflon , 2014, ICMT.
[27] Paolo Giorgini,et al. Modeling and Verifying Security Policies in Business Processes , 2014, BMMDS/EMMSAD.
[28] Jacques Klein,et al. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.
[29] Ian Horrocks,et al. Handbook of Knowledge Representation Edited Description Logics 3.1 Introduction , 2022 .
[30] Jens Bürger,et al. Versioning and Evolution Requirements for Model-Based System Development , 2014, Softwaretechnik-Trends.
[31] Udo Kelter,et al. Automatic Generation of Consistency-Preserving Edit Operations for MDE Tools , 2014, MoDELS.
[32] Jens Bürger,et al. Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models , 2013, FOSAD.
[33] Enrico Motta,et al. Ontology evolution: a process-centric survey , 2013, The Knowledge Engineering Review.
[34] Max E. Kramer,et al. View-centric engineering with synchronized heterogeneous models , 2013 .
[35] Claus Pahl,et al. Ontology Change Management and Identification of Change Patterns , 2013, Journal on Data Semantics.
[36] Vassilis Christophides,et al. High-level change detection in RDF(S) KBs , 2013, TODS.
[37] Sungyoung Lee,et al. Ontology Evolution and Challenges , 2013, J. Inf. Sci. Eng..
[38] Barton P. Miller,et al. Automated tracing and visualization of software security structure and properties , 2012, VizSec '12.
[39] Udo Kelter,et al. Understanding model evolution through semantically lifting model differences with SiLift , 2012, 2012 28th IEEE International Conference on Software Maintenance (ICSM).
[40] Udo Kelter,et al. Adaptability of model comparison tools , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[41] Ernesto Damiani,et al. A Low-Cost Security Certification Scheme for Evolving Services , 2012, 2012 IEEE 19th International Conference on Web Services.
[42] Udo Kelter,et al. A rule-based approach to the semantic lifting of model differences in the context of model versioning , 2011, 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011).
[43] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[44] Jens von Pilgrim,et al. A survey of traceability in requirements engineering and model-driven development , 2010, Software & Systems Modeling.
[45] Claus Pahl,et al. A Pattern-Based Framework of Change Operators for Ontology Evolution , 2009, OTM Workshops.
[46] Vassilis Christophides,et al. On Detecting High-Level Changes in RDF/S KBs , 2009, SEMWEB.
[47] Rim Djedidi,et al. Ontology Change Management , 2009, I-SEMANTICS.
[48] Richard F. Paige,et al. Different models for model matching: An analysis of approaches to support model differencing , 2009, 2009 ICSE Workshop on Comparison and Versioning of Software Models.
[49] Colin Atkinson,et al. Orthographic Software Modeling: A Practical Approach to View-Based Development , 2009, ENASE.
[50] Gregor Engels,et al. Detecting and Resolving Process Model Differences in the Absence of a Change Log , 2008, BPM.
[51] Tom Mens,et al. Ontology Evolution: State of the Art & Future Directions , 2008 .
[52] Xiang Fu,et al. A Static Analysis Framework For Detecting SQL Injection Vulnerabilities , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[53] Olga De Troyer,et al. Understanding ontology evolution: A change detection approach , 2007, J. Web Semant..
[54] Bernd Brügge,et al. Sysiphus: Enabling informal collaboration in global software development , 2006, 2006 IEEE International Conference on Global Software Engineering (ICGSE'06).
[55] Olga De Troyer,et al. Ontology Change Detection Using a Version Log , 2005, SEMWEB.
[56] Alan R. Hevner,et al. Design Science in Information Systems Research , 2004, MIS Q..
[57] Gerd Wagner,et al. A Unified Foundational Ontology and some Applications of it in Business Modeling , 2004, CAiSE Workshops.
[58] C. Schneider. CoObRA - a small step for development tools to collaborative environments , 2004, ICSE 2004.
[59] Eleni Stroulia,et al. A study on the current state of the art in tool-supported UML-based static reverse engineering , 2002, Ninth Working Conference on Reverse Engineering, 2002. Proceedings..
[60] David Clark,et al. Safety and Security Analysis of Object-Oriented Models , 2002, SAFECOMP.
[61] Boris Motik,et al. Managing Multiple Ontologies and Ontology Evolution in Ontologging , 2002, Intelligent Information Processing.
[62] Andy Schürr,et al. Specification of Graph Translators with Triple Graph Grammars , 1994, WG.
[63] Thomas R. Gruber,et al. A translation approach to portable ontology specifications , 1993, Knowl. Acquis..
[64] Ernst Lippe,et al. Operation-based merging , 1992, SDE 5.