Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper)
暂无分享,去创建一个
Fabrice Bouquet | Jan Jürjens | Frank Piessens | Fabio Massacci | Elizabeta Fourneret | Mass Soldal Lund | Bjørnar Solhaug | Federica Paci | Stéphane Paul | Sven Wenzel | Jan Tobias Mühlberg | Sébastien Madelénat
[1] David Lee,et al. Formal Techniques for Distributed Systems, Joint 11th IFIP WG 6.1 International Conference FMOODS 2009 and 29th IFIP WG 6.1 International Conference FORTE 2009, Lisboa, Portugal, June 9-12, 2009. Proceedings , 2009, FMOODS/FORTE.
[2] Frank Piessens,et al. The Belgian Electronic Identity Card: a Verification Case Study , 2011, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..
[3] Bashar Nuseibeh,et al. Early Identification of Problem Interactions: A Tool-Supported Approach , 2009, REFSQ.
[4] John Mylopoulos,et al. Requirements engineering for trust management: model, methodology, and reasoning , 2006, International Journal of Information Security.
[5] Bashar Nuseibeh,et al. Security Requirements Engineering: A Framework for Representation and Analysis , 2008, IEEE Transactions on Software Engineering.
[6] John Mylopoulos,et al. Computer-aided Support for Secure Tropos , 2007, Automated Software Engineering.
[7] Dániel Varró,et al. Change-driven model transformations - Change (in) the rule to rule the change , 2012, Softw. Syst. Model..
[8] Jan Jürjens,et al. Secure systems development with UML , 2004 .
[9] De WinBart,et al. On the secure software development process , 2009 .
[10] Charles B. Haley,et al. D.3.2 METHOLOGY FOR EVOLUTIONARY REQUIREMENTS , 2010 .
[11] Axel van Lamsweerde,et al. Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.
[12] Dániel Varró,et al. Change-driven model transformations , 2011, Software & Systems Modeling.
[13] Frank Piessens,et al. Annotation Inference for Separation Logic Based Verifiers , 2011, FMOODS/FORTE.
[14] Fabio Massacci,et al. Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution , 2011, CAiSE.
[15] Frank Piessens,et al. The Belgian Electronic Identity Card: a Verification Case Study , 2011 .
[16] Frank Piessens,et al. A Quick Tour of the VeriFast Program Verifier , 2010, APLAS.
[17] Ruth Breu,et al. Living on the MoVE: Towards an Architecture for a Living Models Infrastructure , 2010, 2010 Fifth International Conference on Software Engineering Advances.
[18] Fabio Massacci,et al. Managing changes with legacy security engineering processes , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.
[19] Brian Campbell,et al. Amortised Memory Analysis Using the Depth of Data Structures , 2009, ESOP.
[20] Bashar Nuseibeh,et al. Model-Based Argument Analysis for Evolving Security Requirements , 2010, 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement.
[21] Ketil Stølen,et al. Risk Analysis of Changing and Evolving Systems Using CORAS , 2011, FOSAD.
[22] Frank Piessens,et al. Expressive modular fine-grained concurrency specification , 2011, POPL '11.
[23] Kevin Lano,et al. Slicing of UML models using model transformations , 2010, MODELS'10.
[24] Julien Botella,et al. Model-Based Security Verification and Testing for Smart-cards , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[25] Fabrizio Di Crosta. GUIDE FOR ISO/IEC 12207 (SOFTWARE LIFE CYCLE PROCESSES) , 2010 .
[26] Véronique Normand,et al. Toward model-based security engineering : developing a security analysis DSML , 2009 .
[27] Jan Jürjens,et al. Incremental Security Verification for Evolving UMLsec models , 2011, ECMFA.
[28] Rick Salay,et al. Relationship-based change propagation: A case study , 2009, 2009 ICSE Workshop on Modeling in Software Engineering.
[29] Ruth Breu,et al. Living Security - Collaborative Security Management in a Changing World , 2011 .
[30] Fabio Massacci,et al. A Load Time Policy Checker for Open Multi-application Smart Cards , 2011, 2011 IEEE International Symposium on Policies for Distributed Systems and Networks.
[31] Yijun Yu,et al. An Extended Ontology for Security Requirements , 2011, CAiSE Workshops.
[32] Ketil Stølen,et al. Model-Driven Risk Analysis - The CORAS Approach , 2010 .
[33] Jameleddine Hassine,et al. Change impact analysis for requirement evolution using use case maps , 2005, Eighth International Workshop on Principles of Software Evolution (IWPSE'05).
[34] Ákos Horváth,et al. Incremental evaluation of model queries over EMF models , 2010, MODELS'10.
[35] Eric S. K. Yu,et al. A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities , 2010, Requirements Engineering.
[36] Wouter Joosen,et al. On the secure software development process: CLASP, SDL and Touchpoints compared , 2009, Inf. Softw. Technol..
[37] Fabrice Bouquet,et al. Selective Test Generation Method for Evolving Critical Systems , 2011, 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops.