Nina Moebius

According to our database1, Nina Moebius authored at least 20 papers between 2007 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Formal verification of QVT transformations for code generation.
Softw. Syst. Model., 2015

Integrating a Model-Driven Approach and Formal Verification for the Development of Secure Service Applications.
Proceedings of the Correct Software in Web Applications and Web Services, 2015

2014
Modeling test cases for security protocols with SecureMDD.
Comput. Networks, 2014

2013
Modellgetriebene Entwicklung sicherer Smart Card-Anwendungen.
PhD thesis, 2013

Model Checking of Security-Critical Applications in a Model-Driven Approach.
Proceedings of the Software Engineering and Formal Methods - 11th International Conference, 2013

Security requirements formalized with OCL in a model-driven approach.
Proceedings of the International Workshop on Model-Driven Requirements Engineering, 2013

2012
Model-Driven Development of Secure Service Applications.
Proceedings of the 35th Annual IEEE Software Engineering Workshop, 2012

Model-Driven Testing of Security Protocols with SecureMDD.
Proceedings of the 5th International Conference on New Technologies, 2012

Incremental development of large, secure smart card applications.
Proceedings of the Model-Driven Security Workshop, 2012

Evaluation of Jif and Joana as Information Flow Analyzers in a Model-Driven Approach.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2011
Mondex: Engineering a Provable Secure Electronic Purse.
Int. J. Softw. Informatics, 2011

A cryptographically <i>t</i>-private auction system.
Concurr. Comput. Pract. Exp., 2011

2010
Formal Verification of Application-Specific Security Properties in a Model-Driven Approach.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

Pitfalls in Formal Reasoning about Security Protocols.
Proceedings of the ARES 2010, 2010

2009
A Cryptographically t-Private Auction System.
Proceedings of the Third International Conference on Network and System Security, 2009

Generating formal specifications for security-critical applications - A model-driven approach.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

A Systematic Verification Approach for Mondex Electronic Purses Using ASMs.
Proceedings of the Rigorous Methods for Software Construction and Analysis, 2009

Model-Driven Code Generation for Secure Smart Card Applications.
Proceedings of the 20th Australian Software Engineering Conference (ASWEC 2009), 2009

SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications.
Proceedings of the The Forth International Conference on Availability, 2009

2007
A Modeling Framework for the Development of Provably Secure E-Commerce Applications.
Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), 2007


  Loading...