Achim D. Brucker

According to our database1, Achim D. Brucker
  • authored at least 76 papers between 2001 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.
Data Science and Engineering, 2017

Formal Network Models and Their Application to Firewall Policies.
Archive of Formal Proofs, 2017

2016
Security Testing: A Survey.
Advances in Computers, 2016

Monadic Sequence Testing and Explicit Test-Refinements.
Proceedings of the Tests and Proofs - 10th International Conference, 2016

Recent Developments in OCL and Textual Modelling.
Proceedings of the 16th International Workshop on OCL and Textual Modelling co-located with 19th International Conference on Model Driven Engineering Languages and Systems (MODELS 2016), 2016

On the Security Cost of Using a Free and Open Source Component in a Proprietary Product.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

On the Static Analysis of Hybrid Mobile Apps - A Report on the State of Apache Cordova Nation.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

2015
Formal firewall conformance testing: an application of test and proof techniques.
Softw. Test., Verif. Reliab., 2015

Testing the IPC Protocol for a Real-Time Operating System.
Proceedings of the Verified Software: Theories, Tools, and Experiments, 2015

Factors Impacting the Effort Required to Fix Security Vulnerabilities - An Industrial Case Study.
Proceedings of the Information Security - 18th International Conference, 2015

From Secure Business Process Models to Secure Artifact-Centric Specifications.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2015

2014
The Aniketos Platform.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Compliance Validation of Secure Service Compositions.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Using SecureBPMN for Modelling Security-Aware Service Compositions.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Security Policy Monitoring of Composite Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Editorial for the special issue of STVR on tests and proofs volume 2: tests and proofs for improving the generation time and quality of test data suites.
Softw. Test., Verif. Reliab., 2014

Editorial for the special issue of STVR on tests and proofs volume 1: tests and proofs in model-based testing.
Softw. Test., Verif. Reliab., 2014

Developing secure software.
Datenschutz und Datensicherheit, 2014

Report on the Aachen OCL Meeting.
CoRR, 2014

Featherweight OCL: A Proposal for a Machine-Checked Formal Semantics for OCL 2.5.
Archive of Formal Proofs, 2014

The Unified Policy Framework (UPF).
Archive of Formal Proofs, 2014

Deploying Static Application Security Testing on a Large Scale.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Panel Discussion: Proposals for Improving OCL.
Proceedings of the 14th International Workshop on OCL and Textual Modelling co-located with 17th International Conference on Model Driven Engineering Languages and Systems (MODELS 2014), 2014

2013
Integrating Security Aspects into Business Process Models.
it - Information Technology, 2013

On theorem prover-based testing.
Formal Asp. Comput., 2013

Test Program Generation for a Microprocessor - A Case-Study.
Proceedings of the Tests and Proofs - 7th International Conference, 2013

A Framework for Secure Service Composition.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

On the Semantics of Object-Oriented Data Structures and Path Expressions.
Proceedings of the MODELS 2013 OCL Workshop co-located with the 16th International ACM/IEEE Conference on Model Driven Engineering Languages and Systems (MODELS 2013), 2013

Report on the Aachen OCL Meeting.
Proceedings of the MODELS 2013 OCL Workshop co-located with the 16th International ACM/IEEE Conference on Model Driven Engineering Languages and Systems (MODELS 2013), 2013

hol-TestGen/fw - An Environment for Specification-Based Firewall Conformance Testing.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2013, 2013

Business Process Compliance via Security Validation as a Service.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

2012
SecureBPMN: modeling and enforcing access control requirements in business processes.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Security and safety of assets in business processes.
Proceedings of the ACM Symposium on Applied Computing, 2012

Featherweight OCL: a study for the consistent semantics of OCL 2.3 in HOL.
Proceedings of the 12th Workshop on OCL and Textual Modelling, 2012

Monitoring Security and Safety of Assets in Supply Chains.
Proceedings of the Future Security - 7th Security Research Conference, 2012

Secure and Compliant Implementation of Business Process-Driven Systems.
Proceedings of the Business Process Management Workshops, 2012

Service Levels, Security, and Trust.
Proceedings of the Handbook of Service Description - USDL and Its Methods, 2012

2011
Extending OCL Operation Contracts with Objective Functions.
ECEASST, 2011

A Service-oriented Architecture for Emergency Management Systems.
Proceedings of the Software Engineering 2011, 2011

An approach to modular and testable security models of real-world health-care applications.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

A Framework for Managing and Analyzing Changes of Security Policies.
Proceedings of the POLICY 2011, 2011

2010
Efficient analysis of pattern-based constraint specifications.
Software and System Modeling, 2010

Attribute-Based Encryption with Break-Glass.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

A Specification-Based Test Case Generation Method for UML/OCL.
Proceedings of the Models in Software Engineering, 2010

Verified Firewall Policy Transformations for Test Case Generation.
Proceedings of the Third International Conference on Software Testing, 2010

Practical Issues with Formal Specifications - Lessons Learned from an Industrial Case Study.
Proceedings of the Formal Methods for Industrial Critical Systems, 2010

Idea: Efficient Evaluation of Access Control Constraints.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

Information Flow in Disaster Management Systems.
Proceedings of the ARES 2010, 2010

2009
Semantics, calculi, and analysis for object-oriented specifications.
Acta Inf., 2009

Extending access control models with break-glass.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Delegation Assistance.
Proceedings of the POLICY 2009, 2009

Extending OCL with Null-References.
Proceedings of the Models in Software Engineering, 2009

Integrating Automated and Interactive Protocol Verification.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

hol-TestGen.
Proceedings of the Fundamental Approaches to Software Engineering, 2009

ProActive Caching: Generating Caching Heuristics for Business Process Environments.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
An Extensible Encoding of Object-oriented Data Models in hol.
J. Autom. Reasoning, 2008

Verifying Test-Hypotheses: An Experiment in Test and Proof.
Electr. Notes Theor. Comput. Sci., 2008

Model-Based Firewall Conformance Testing.
Proceedings of the Testing of Software and Communicating Systems, 2008

HOL-OCL: A Formal Proof Environment for UML/OCL.
Proceedings of the Fundamental Approaches to Software Engineering, 2008

Extensible Universes for Object-Oriented Data Models.
Proceedings of the ECOOP 2008, 2008

2007
Test-Sequence Generation with Hol-TestGen with an Application to Firewall Testing.
Proceedings of the Tests and Proofs, First International Conference, 2007

2006
Model-Driven Constraint Engineering.
ECEASST, 2006

Semantic Issues of OCL: Past, Present, and Future.
ECEASST, 2006

An MDA Framework Supporting OCL.
ECEASST, 2006

A Model Transformation Semantics and Analysis Methodology for SecureUML.
Proceedings of the Model Driven Engineering Languages and Systems, 2006

2005
A verification approach to applied system security.
STTT, 2005

Interactive Testing with HOL-TestGen.
Proceedings of the Formal Approaches to Software Testing, 5th International Workshop, 2005

2004
Symbolic Test Case Generation for Primitive Recursive Functions.
Proceedings of the Formal Approaches to Software Testing, 4th International Workshop, 2004

2003
HOL-Z 2.0: A Proof Environment for Z-Specifications.
J. UCS, 2003

A Case Study of a Formalized Security Architecture.
Electr. Notes Theor. Comput. Sci., 2003

2002
HOL-OCL: Experiences, Consequences and Design Choices.
Proceedings of the UML 2002 - The Unified Modeling Language, 5th International Conference, Dresden, Germany, September 30, 2002

Using Theory Morphisms for Implementing Formal Methods Tools.
Proceedings of the Types for Proofs and Programs, Second International Workshop, 2002

A Proposal for a Formal OCL Semantics in Isabelle/HOL.
Proceedings of the Theorem Proving in Higher Order Logics, 15th International Conference, 2002

2001
Testing Distributed Component Based Systems Using UML/OCL.
GI Jahrestagung (1), 2001


  Loading...