Volgen
Achim D. Brucker
Achim D. Brucker
University of Exeter, Exeter, UK
Geverifieerd e-mailadres voor exeter.ac.uk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Security testing: A survey
M Felderer, M Büchler, M Johns, AD Brucker, R Breu, A Pretschner
Advances in Computers 101, 1-51, 2016
2532016
Extending access control models with break-glass
AD Brucker, H Petritsch
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1882009
SecureBPMN: Modeling and enforcing access control requirements in business processes
AD Brucker, I Hang, G Lückemeyer, R Ruparel
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
1382012
HOL-OCL: a formal proof environment for UML/OCL
AD Brucker, B Wolff
Proceedings of the Theory and practice of software, 11th international …, 2008
1222008
The HOL-OCL Book
AD Brucker, B Wolff
Swiss Federal Institute of Technology (ETH) 525, 2006
1122006
A proposal for a formal OCL semantics in Isabelle/HOL
AD Brucker, B Wolff
Theorem Proving in Higher Order Logics, 147-175, 2002
932002
On Theorem Prover-based Testing
AD Brucker, B Wolff
Formal Aspects of Computing 25 (5), 683-721, 2013
822013
A specification-based test case generation method for UML/OCL
AD Brucker, M Krieger, D Longuet, B Wolff
Models in Software Engineering, 334-348, 2011
732011
HOL-Z 2.0: A proof environment for Z-specifications
AD Brucker, F Rittinger, B Wolff
Journal of Universal Computer Science 9 (2), 152-172, 2003
592003
On the static analysis of hybrid mobile apps
AD Brucker, M Herzberg
Symposium on Engineering Secure Software and Systems, 72-88, 2016
55*2016
Metamodel-based UML notations for domain-specific languages
AD Brucker, J Doser
4th International Workshop on Software Language Engineering (ATEM 2007), 2007
542007
Attribute-based encryption with break-glass
AD Brucker, H Petritsch, SG Weber
Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010
532010
An approach to modular and testable security models of real-world health-care applications
AD Brucker, L Brügger, P Kearney, B Wolff
Proceedings of the 16th ACM symposium on Access control models and …, 2011
522011
Symbolic test case generation for primitive recursive functions
AD Brucker, B Wolff
Formal Approaches to Software Testing: 4th International Workshop, FATES …, 2005
512005
Verified firewall policy transformations for test case generation
AD Brucker, L Brügger, P Kearney, B Wolff
2010 Third International Conference on Software Testing, Verification and …, 2010
492010
A model transformation semantics and analysis methodology for SecureUML
AD Brucker, J Doser, B Wolff
Model Driven Engineering Languages and Systems, 306-320, 2006
472006
Test-sequence generation with HOL-TestGen with an application to firewall testing
AD Brucker, B Wolff
Proceedings of the 1st international conference on Tests and proofs, 149-168, 2007
432007
A screening test for disclosed vulnerabilities in foss components
S Dashevskyi, AD Brucker, F Massacci
IEEE Transactions on Software Engineering 45 (10), 945-966, 2018
412018
An extensible encoding of object-oriented data models in HOL
AD Brucker, B Wolff
Journal of Automated Reasoning 41 (3), 219-249, 2008
412008
HOL-TestGen: An Interactive Test-case Generation Framework.
AD Brucker, B Wolff
Fundamental Approaches to Software Engineering, 417-420, 2009
402009
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20