-
1
-
-
0033116147
-
Graph transformation for specification and programming
-
Andries, M., Engels, G., Habel, A., Hoffmann, B., Kreowski, H.-J., Kuske, S., Plump, D., Schürr, A., Taentzer, G.: Graph transformation for specification and programming. Science of Computer Programming 34(1), 1-54 (1999)
-
(1999)
Science of Computer Programming
, vol.34
, Issue.1
, pp. 1-54
-
-
Andries, M.1
Engels, G.2
Habel, A.3
Hoffmann, B.4
Kreowski, H.-J.5
Kuske, S.6
Plump, D.7
Schürr, A.8
Taentzer, G.9
-
2
-
-
33750370954
-
Model transformations? Transformation models!
-
Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. Springer, Heidelberg
-
Bézivin, J., Büttner, F., Gogolla, M., Jouault, F., Kurtev, I., Lindow, A.: Model transformations? Transformation models! In: Wang, J., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. LNCS, vol. 4199, pp. 440-453. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4199
, pp. 440-453
-
-
Bézivin, J.1
Büttner, F.2
Gogolla, M.3
Jouault, F.4
Kurtev, I.5
Lindow, A.6
-
4
-
-
0024943291
-
Compositional model checking
-
June
-
Clarke, E., Long, D., McMillan, K.: Compositional model checking. In: Proceedings of the Annual Symposium on Logic in Computer Science (LICS), pp. 353-362 (June 1989)
-
(1989)
Proceedings of the Annual Symposium on Logic in Computer Science (LICS)
, pp. 353-362
-
-
Clarke, E.1
Long, D.2
McMillan, K.3
-
6
-
-
18944394652
-
Modelling and verification of layered security protocols: A bank application
-
Anderson, S., Felici, M., Littlewood, B. (eds.) SAFECOMP 2003. Springer, Heidelberg
-
Grünbauer, J., Hollmann, H., Jürjens, J., Wimmel, G.: Modelling and verification of layered security protocols: A bank application. In: Anderson, S., Felici, M., Littlewood, B. (eds.) SAFECOMP 2003. LNCS, vol. 2788, pp. 116-129. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2788
, pp. 116-129
-
-
Grünbauer, J.1
Hollmann, H.2
Jürjens, J.3
Wimmel, G.4
-
7
-
-
84957107637
-
Compositional verification of reactive systems specified by graph transformation
-
Astesiano, E. (ed.) ETAPS 1998 and FASE 1998. Springer, Heidelberg
-
Heckel, R.: Compositional verification of reactive systems specified by graph transformation. In: Astesiano, E. (ed.) ETAPS 1998 and FASE 1998. LNCS, vol. 1382, pp. 138-153. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1382
, pp. 138-153
-
-
Heckel, R.1
-
8
-
-
57349158625
-
Rubacon: Automated support for model-based compliance engineering
-
Robby [26]
-
Höhn, S., Jürjens, J.: Rubacon: automated support for model-based compliance engineering. In: Robby [26], pp. 875-878
-
30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 1018. ACM, New York (2008)
, pp. 875-878
-
-
Höhn, S.1
Jürjens, J.2
-
11
-
-
33750060125
-
Model-based security engineering with UML
-
Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. Springer, Heidelberg
-
Jürjens, J.: Model-based security engineering with UML. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol. 3655, pp. 42-77. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3655
, pp. 42-77
-
-
Jürjens, J.1
-
12
-
-
33846318194
-
Code security analysis of a biometric authentication system using automated theorem provers
-
IEEE Computer Society, Los Alamitos
-
Jürjens, J.: Code security analysis of a biometric authentication system using automated theorem provers. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), pp. 138-149. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
, pp. 138-149
-
-
Jürjens, J.1
-
14
-
-
33244457785
-
Sound methods and effective tools for model-based security engineering with UML
-
Roman, G.-C., Griswold, W.G., Nuseibeh, B. (eds.) ACM Press, New York
-
Jürjens, J.: Sound methods and effective tools for model-based security engineering with UML. In: Roman, G.-C., Griswold, W.G., Nuseibeh, B. (eds.) Proceedings of the International Conference on Software Engineering (ICSE), pp. 322-331. ACM Press, New York (2005)
-
(2005)
Proceedings of the International Conference on Software Engineering (ICSE)
, pp. 322-331
-
-
Jürjens, J.1
-
15
-
-
33745178885
-
Verification of low-level crypto-protocol implementations using automated theorem proving
-
IEEE, Los Alamitos
-
Jürjens, J.: Verification of low-level crypto-protocol implementations using automated theorem proving. In: MEMOCODE, pp. 89-98. IEEE, Los Alamitos (2005)
-
(2005)
MEMOCODE
, pp. 89-98
-
-
Jürjens, J.1
-
17
-
-
57349126199
-
Model-based security analysis for mobile communications
-
Robby [26]
-
Jürjens, J., Schreck, J., Bartmann, P.: Model-based security analysis for mobile communications. In: Robby [26], pp. 683-692
-
30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 1018. ACM, New York (2008)
, pp. 683-692
-
-
Jürjens, J.1
Schreck, J.2
Bartmann, P.3
-
18
-
-
35348959376
-
Tools for secure systems development with UML. Intern
-
Invited submission to the special issue for FASE 2004/05
-
Jürjens, J., Shabalin, P.: Tools for secure systems development with UML. Intern. Journal on Software Tools for Technology Transfer 9(5-6), 527-544 (2007); Invited submission to the special issue for FASE 2004/05
-
(2007)
Journal on Software Tools for Technology Transfer
, vol.9
, Issue.5-6
, pp. 527-544
-
-
Jürjens, J.1
Shabalin, P.2
-
20
-
-
36048961543
-
Update transformations in the small with the epsilon wizard language
-
Kolovos, D.S., Paige, R.F., Polack, F., Rose, L.M.: Update transformations in the small with the epsilon wizard language. Journal of Object Technology 6(9), 53-69 (2007)
-
(2007)
Journal of Object Technology
, vol.6
, Issue.9
, pp. 53-69
-
-
Kolovos, D.S.1
Paige, R.F.2
Polack, F.3
Rose, L.M.4
-
21
-
-
0031648261
-
Software's future: Managing evolution
-
Lehman, M.: Software's future: Managing evolution. IEEE Software 15(1), 40-44 (1998)
-
(1998)
IEEE Software
, vol.15
, Issue.1
, pp. 40-44
-
-
Lehman, M.1
-
22
-
-
79959215532
-
Evolutionary systems design: Recognizing changes in security and survivability risks
-
Carnegie Mellon Software Engineering Institute September
-
Lipson, H.: Evolutionary systems design: Recognizing changes in security and survivability risks. Technical Report CMU/SEI-2006-TN-027, Carnegie Mellon Software Engineering Institute (September 2006)
-
(2006)
Technical Report CMU/SEI-2006-TN-027
-
-
Lipson, H.1
-
23
-
-
0036083020
-
On the composition of secure systems
-
IEEE Computer Society, Los Alamitos
-
Mantel, H.: On the composition of secure systems. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 88-101. IEEE Computer Society, Los Alamitos (2002)
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA
, pp. 88-101
-
-
Mantel, H.1
-
24
-
-
34748846883
-
Performance analysis of security aspects in UML models
-
DOI 10.1145/1216993.1217010, 1217010, Proceedings of the 6th International Workshop on Software and Performance, WOPS'07
-
Petriu, D.C., Woodside, C.M., Petriu, D.B., Xu, J., Israr, T., Georg, G., France, R.B., Bieman, J.M., Houmb, S.H., Jürjens, J.: Performance analysis of security aspects in UML models. In: Cortellessa, V., Uchitel, S., Yankelevich, D. (eds.) WOSP, pp. 91-102. ACM, New York (2007) (Pubitemid 47485718)
-
(2007)
Proceedings of the 6th International Workshop on Software and Performance, WOPS'07
, pp. 91-102
-
-
Petriu, D.C.1
Woodside, C.M.2
Petriu, D.B.3
Xu, J.4
Israr, T.5
Georg, G.6
France, R.7
Bieman, J.M.8
Houmb, S.H.9
Jurjens, J.10
-
25
-
-
35048897606
-
Model checking graph transformations: A comparison of two approaches
-
Ehrig, H., Engels, G., Parisi-Presicce, F., Rozenberg, G. (eds.) ICGT 2004. Springer, Heidelberg
-
Rensink, A., Schmidt, Á., Varró, D.: Model checking graph transformations: A comparison of two approaches. In: Ehrig, H., Engels, G., Parisi-Presicce, F., Rozenberg, G. (eds.) ICGT 2004. LNCS, vol. 3256, pp. 226-241. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3256
, pp. 226-241
-
-
Rensink, A.1
Schmidt, Á.2
Varró, D.3
-
27
-
-
79959259026
-
-
Secure Change Project
-
Secure Change Project. Deliverable 4.2., http://www-jj.cs.tu-dortmund.de/ jj/deliverable-4-2.pdf
-
Deliverable 4.2
-
-
-
28
-
-
0003624662
-
-
UML Revision Task Force. September
-
UML Revision Task Force. OMG Unified Modeling Language: Specification. Object Management Group (OMG) (September 2001), http://www.omg.org/spec/UML/1.4/ PDF/index.htm
-
(2001)
OMG Unified Modeling Language: Specification
-
-
-
29
-
-
79959200417
-
-
UMLsec group. UMLsec Tool Suite (2001-2011), http://www.umlsec.de
-
(2001)
UMLsec Tool Suite
-
-
-
31
-
-
55249114157
-
Performance analysis of security aspects by weaving scenarios extracted from UML models
-
Woodside, C.M., Petriu, D.C., Petriu, D.B., Xu, J., Israr, T.A., Georg, G., France, R.B., Bieman, J.M., Houmb, S.H., Jürjens, J.: Performance analysis of security aspects by weaving scenarios extracted from UML models. Journal of Systems and Software 82(1), 56-74 (2009)
-
(2009)
Journal of Systems and Software
, vol.82
, Issue.1
, pp. 56-74
-
-
Woodside, C.M.1
Petriu, D.C.2
Petriu, D.B.3
Xu, J.4
Israr, T.A.5
Georg, G.6
France, R.B.7
Bieman, J.M.8
Houmb, S.H.9
Jürjens, J.10
|