Information Security
Achim Brucker is interested a wide range of security topics in general and security engineering in particular. This includes the use of formal methods for, e.g., analyzing security architectures [
brucker.ea:verification:2005,
brucker.ea:case:2003], modeling of security policies [
brucker.ea:model-based:2011], security conformance testing of systems [
brucker.ea:test-sequence:2007,
brucker.ea:model-based:2011,
brucker.ea:firewall:2010], and protocol verification [
brucker.ea:integrating:2009]. More applied, he works on model-driven security [
brucker.ea:mda:2006-b] approaches such as SecureUML (based on UML/OCL) [
brucker.ea:transformation:2006,
brucker.ea:extending:2009] and SecureBPMN (based on BPMN) [
brucker:securebpmn:2013,
brucker.ea:securebpmn:2012,
brucker.ea:framework:2013,
compagna.ea:bp-compliance:2013]. The latter includes also a various other business-process security topics, e.g., [
brucker.ea:secure:2012,
brucker.ea:securebpmn:2012,
monakova.ea:securing:2012,
monakova.ea:monitoring:2012,
kohler.ea:proactive:2009,
brucker.ea:modellierung:2010,
kohler.ea:caching:2010]. Moreover, he works security for services (i.e., cloud-based and service-oriented systems), e.g., [
marienfeld.ea:usdl-security:2012,
brucker.ea:secure:2012,
brucker.ea:framework:2011] and on various aspects of access control policies including performance improvements of access control enforcement infrastructures [
kohler.ea:proactive:2009,
kohler.ea:caching:2010,
brucker.ea:efficient:2010], management of access control infrastructures (e.g. using XACML) [
brucker.ea:framework:2011], as well as access control for exceptional situations, called break-(the)-glass access control [
brucker.ea:attribute-based:2010,
brucker.ea:extending:2009] or access control for disaster management systems [
brucker.ea:information:2010].
[-] Publications
(Click To Expand)
[57]
A. D. Brucker, “Theorem prover-based testing: Combining verification and testing,” presented at the Midlands graduate school, Leicester, UK, Apr. 09, 2017.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[56]
A. D. Brucker, B. Zhou, F. Malmignati, Q. Shi, and M. Merabti, “Modelling, validating, and ranking of secure service compositions,” Software: Practice and Expierence (SPE), vol. 47, pp. 1912–1943, Dec. 2017, doi: 10.1002/spe.2513. Author copy: https://logicalhacking.com/publications/brucker.ea-secure-services-2017/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[55]
L. ben Othmane, A. D. Brucker, S. Dashevskyi, and P. Tsalovski, “An introduction to data analytics for software security,” in Empirical research for software security: Foundations and experience, L. ben Othmane, M. G. Jaatun, and E. Weippl, Eds. CRC Press, 2017, pp. 69–94. Author copy: https://logicalhacking.com/publications/othmane.ea-data-analytics-2017/
[
Abstract |
PDF |
BibTeX |
RIS |
EndNote |
Word]
[54]
L. ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, and A. D. Brucker, “Time for addressing software security issues: Prediction models and impacting factors,” Data Science and Engineering (DSEJ), vol. 2, no. 2, pp. 107–124, 2017, doi: 10.1007/s41019-016-0019-8. Author copy: https://logicalhacking.com/publications/othmane.ea-fix-effort-2016/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[49]
M. Felderer, M. Büchler, M. Johns, A. D. Brucker, R. Breu, and A. Pretschner, “Security testing: A survey,” Advances in Computers, vol. 101, pp. 1–51, Mar. 2016, doi: 10.1016/bs.adcom.2015.11.003. Author copy: https://logicalhacking.com/publications/felderer.ea-security-testing-2016/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[47]
L. ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, A. D. Brucker, and P. Miseldine, “Factors impacting the effort required to fix security vulnerabilities: An industrial case study,” in Information security conference (ISC 2015), C. Boyd and D. Gligoriski, Eds. Heidelberg: Springer-Verlag, 2015. doi: 10.1007/978-3-319-23318-5_6. Author copy: https://logicalhacking.com/publications/othmane.ea-fix-effort-2015/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[45]
A. D. Brucker, L. Brügger, and B. Wolff, “Formal firewall conformance testing: An application of test and proof techniques,” Software Testing, Verification & Reliability (STVR), vol. 25, no. 1, pp. 34–71, 2015, doi: 10.1002/stvr.1544. Author copy: https://logicalhacking.com/publications/brucker.ea-formal-fw-testing-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[42]
M. Asim, A. Yautsiukhin, A. D. Brucker, B. Lempereur, and Q. Shi, “Security policy monitoring of composite services,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014, pp. 192–202. doi: 10.1007/978-3-319-13518-2_13. Author copy: https://logicalhacking.com/publications/asim.ea-aniketos-monitoring-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[41]
A. D. Brucker, L. Compagna, and P. Guilleminot, “Compliance validation of secure service compositions,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014, pp. 136–149. doi: 10.1007/978-3-319-13518-2_10. Author copy: https://logicalhacking.com/publications/brucker.ea-aniketos-compliance-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[40]
A. D. Brucker, F. Malmignati, M. Merabti, Q. Shi, and B. Zhou, “Aniketos service composition framework: Analysing and ranking of secure services,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014, pp. 121–135. doi: 10.1007/978-3-319-13518-2_9. Author copy: https://logicalhacking.com/publications/brucker.ea-aniketos-scf-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[39]
A. D. Brucker, “Using SecureBPMN for modelling security-aware service compositions,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014, pp. 110–120. doi: 10.1007/978-3-319-13518-2_8. Author copy: https://logicalhacking.com/publications/brucker-aniketos-securebpmn-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[38]
P. H. Meland, E. Rios, V. Tountopoulos, and A. D. Brucker, “The aniketos platform,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014. doi: 10.1007/978-3-319-13518-2_4. Author copy: https://logicalhacking.com/publications/meland.ea-aniketos-platform-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[34]
A. D. Brucker, “Model-based testing for secure services,” presented at the Aniketos spring ph.d. School on “trustworthy & secure service composition,” Malaga, Spain, May 30, 2013.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[32]
A. D. Brucker, F. Malmignati, M. Merabti, Q. Shi, and B. Zhou, “A framework for secure service composition,” in International conference on information privacy, security, risk and trust (PASSAT), Los Alamitos, CA, USA: IEEE Computer Society, 2013, pp. 647–652. doi: 10.1109/SocialCom.2013.97. Author copy: https://logicalhacking.com/publications/brucker.ea-framework-2013/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[31]
A. D. Brucker, L. Brügger, and B. Wolff, “HOL-TestGen/FW: An environment for specification-based firewall conformance testing,” in International colloquium on theoretical aspects of computing (ICTAC), Z. Liu, J. Woodcock, and H. Zhu, Eds. Heidelberg: Springer-Verlag, 2013, pp. 112–121. doi: 10.1007/978-3-642-39718-9_7. Author copy: https://logicalhacking.com/publications/brucker.ea-hol-testgen-fw-2013/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[25]
F. Marienfeld et al., “Service levels, security, and trust,” in Handbook of service description: USDL and its methods, A. Barros and D. Oberle, Eds. New York, NY, USA: Springer-Verlag, 2012, pp. 295–326. doi: 10.1007/978-1-4614-1864-1_12. Author copy: https://logicalhacking.com/publications/marienfeld.ea-usdl-security-2012/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[21]
A. D. Brucker, H. Petritsch, and S. G. Weber, “Attribute-based encryption with break-glass,” in Workshop in information security theory and practice (WISTP), P. Samarati, M. Tunstall, and J. Posegga, Eds. Heidelberg: Springer-Verlag, 2010, pp. 237–244. doi: 10.1007/978-3-642-12368-9_18. Author copy: https://logicalhacking.com/publications/brucker.ea-attribute-based-2010/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[20]
A. D. Brucker, L. Brügger, P. Kearney, and B. Wolff, “Verified firewall policy transformations for test-case generation,” in Third international conference on software testing, verification, and validation (ICST), Los Alamitos, CA, USA: IEEE Computer Society, 2010, pp. 345–354. doi: 10.1109/ICST.2010.50. Author copy: https://logicalhacking.com/publications/brucker.ea-firewall-2010/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[17]
A. D. Brucker, A. Schaad, and C. Wolter, “Prozessmodellierung: Einbinden von Sicherheitsregeln in Geschäftsprozesse,” iX special – Sicher im Netz, vol. 3, pp. 152–155, Oct. 2010.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[14]
M. Kohler, A. D. Brucker, and A. Schaad, “ProActive Caching: Generating caching heuristics for business process environments,” in International conference on computational science and engineering (CSE), vol. 3, Los Alamitos, CA, USA: IEEE Computer Society, 2009, pp. 207–304. doi: 10.1109/CSE.2009.177. Author copy: https://logicalhacking.com/publications/kohler.ea-proactive-2009/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[13]
A. D. Brucker, A. Schaad, and C. Wolter, “Prozessmodellierung: Einbinden von Sicherheitsregeln in Geschäftsprozesse,” iX, vol. 3, pp. 118–121, Mar. 2009. Eine aktualisierte Version des Artikels ist im iX special – Sicher im Netz (Oktober 2010) erschienen.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[5]
A. D. Brucker, J. Doser, and B. Wolff, “A model transformation semantics and analysis methodology for SecureUML,” in MoDELS 2006: Model driven engineering languages and systems, O. Nierstrasz, J. Whittle, D. Harel, and G. Reggio, Eds. Heidelberg: Springer-Verlag, 2006, pp. 306–320. doi: 10.1007/11880240_22. An extended version of this paper is available as ETH Technical Report, no. 524.
[
Abstract |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[1]
A. D. Brucker, F. Rittinger, and B. Wolff, “The CVS-server case study: A formalized security architecture,” in FM-TOOLS 2002, D. Haneberg, G. Schellhorn, and W. Reif, Eds. Augsburg: University Augsburg, 2002, pp. 47–52. Available as Technical Report, University Augsburg, number 2002–11.. Author copy: https://logicalhacking.com/publications/brucker.ea-cvs-server-2002/
[
Abstract |
PDF |
BibTeX |
RIS |
EndNote |
Word]
Formal Methods
Formal methods are an important technique that helps to build safe, secure, and reliable systems. Since his studies [
brucker:verifikation:2000], Achim Brucker is developing formal techniques (e.g., verification and testing) and tools (e.g., HOL-OCL) [
brucker.ea:semantics:2009,
brucker.ea:extensible:2008-b,
brucker.ea:hol-ocl:2008 brucker:interactive:2007], HOL-TestGen [
brucker.ea:theorem-prover:2012,
brucker.ea:hol-testgen:2010], HOL-Z [
brucker.ea:hol-z:2003,
brucker.ea:verification:2005]) as well as applying them to real world problems (e.g., [
brucker.ea:verification:2005,
brucker.ea:firewall:2010,
altenhofen.ea:issues:2010]). Focus areas of his work are specification-based testing (e.g., [
brucker.ea:theorem-prover:2012,
brucker.ea:test-sequence:2007,
brucker.ea:symbolic:2005]), formal semantics and verification of object-oriented languages and systems (e.g., [
brucker.ea:semantics:2009,
brucker.ea:extensible:2008-b,
brucker.ea:featherweight:2012,
brucker.ea:ocl-null:2009,
brucker:interactive:2007,
brucker.ea:hol-ocl-book:2006,
brucker.ea:ocl-testing:2010]), and the integration of formal methods into model-driven development (including UML/OCL-based approaches, e.g., [
wahler.ea:efficient:2010,
brucker.ea:mda:2006-b,
brucker.ea:transformation:2006] as well as business-process-driven approaches, e.g., [
compagna.ea:bp-compliance:2013]). More recently, he started on (formal) application security testing approaches that combine static (i.e., SAST) and dynamic (i.e., DAST) aspects to tackle the challenges of modern programming languages and programming paradigms.
[-] Publications
(Click To Expand)
[72]
A. D. Brucker, G. Daniel, and F. Jouault, Eds., 19th international workshop on OCL and textual modeling, OCL 2019. proceedings, vol. 2513. CEUR-WS.org, 2019.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[70]
M. Foster, A. D. Brucker, R. G. Taylor, S. North, and J. Derrick, “Incorporating data into EFSM inference,” in Software engineering and formal methods (SEFM), P. C. Ölveczky and G. Salaün, Eds. Heidelberg: Springer-Verlag, 2019, pp. 257–272. doi: 10.1007/978-3-030-30446-1_14. Author copy: https://logicalhacking.com/publications/foster.ea-incorporating-2019/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[58]
A. D. Brucker, J. Cabot, and A. S.-B. Herrera, Eds., 16th international workshop on OCL and textual modeling, OCL 2016, saint-malo, france, october 2, 2016. proceedings, vol. 1756. CEUR-WS.org, 2016.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[57]
A. D. Brucker, F. Tuong, and B. Wolff, “Featherweight OCL: A proposal for a machine-checked formal semantics for OCL 2.5,” LRI, Univ Paris Sud, CNRS, Centrale Supélec, Université Paris-Saclay, France, 1582, Sep. 2015. Author copy: https://logicalhacking.com/publications/brucker.ea-formal-semantics-ocl-2.5-2015/
[
Abstract |
PDF |
BibTeX |
RIS |
EndNote |
Word]
[56]
A. D. Brucker, O. Havle, Y. Nemouchi, and B. Wolff, “Testing the IPC protocol for a real-time operating system,” in Working conference on verified software: Theories, tools, and experiments, A. Gurfinkel and S. A. Seshia, Eds. Heidelberg: Springer-Verlag, 2015. doi: 10.1007/978-3-319-29613-5_3. Author copy: https://logicalhacking.com/publications/brucker.ea-ipc-testing-2015/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[55]
A. D. Brucker, M. Egea, M. Gogolla, and F. Tuong, Eds., 15th international workshop on OCL and textual modeling, OCL 2015, ottawa, canada, september 28, 2015. proceedings, vol. 1512. CEUR-WS.org, 2015.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[54]
A. D. Brucker, L. Brügger, and B. Wolff, “Formal firewall conformance testing: An application of test and proof techniques,” Software Testing, Verification & Reliability (STVR), vol. 25, no. 1, pp. 34–71, 2015, doi: 10.1002/stvr.1544. Author copy: https://logicalhacking.com/publications/brucker.ea-formal-fw-testing-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[52]
A. D. Brucker, C. Dania, G. Georg, and M. Gogolla, Eds., 14th international workshop on OCL and textual modeling, OCL 2014, valencia, spain, september 30, 2014. proceedings, vol. 1285. CEUR-WS.org, 2014.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[50]
A. D. Brucker, L. Brügger, and B. Wolff, “HOL-TestGen/FW: An environment for specification-based firewall conformance testing,” in International colloquium on theoretical aspects of computing (ICTAC), Z. Liu, J. Woodcock, and H. Zhu, Eds. Heidelberg: Springer-Verlag, 2013, pp. 112–121. doi: 10.1007/978-3-642-39718-9_7. Author copy: https://logicalhacking.com/publications/brucker.ea-hol-testgen-fw-2013/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[43]
A. D. Brucker and J. Julliand, Eds., Tests and proofs - 6th international conference, TAP 2012, praque, czech republic, mai 31 – june 1, 2012. proceedings, vol. 7305. Heidelberg: Springer-Verlag, 2012. doi: 10.1007/978-3-642-30473-6.
[
Abstract |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[37]
A. D. Brucker, L. Brügger, P. Kearney, and B. Wolff, “Verified firewall policy transformations for test-case generation,” in Third international conference on software testing, verification, and validation (ICST), Los Alamitos, CA, USA: IEEE Computer Society, 2010, pp. 345–354. doi: 10.1109/ICST.2010.50. Author copy: https://logicalhacking.com/publications/brucker.ea-firewall-2010/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[36]
M. Wahler, D. Basin, A. D. Brucker, and J. Koehler, “Efficient analysis of pattern-based constraint specifications,” Software and Systems Modeling, vol. 9, no. 2, pp. 225–255, Apr. 2010, doi: 10.1007/s10270-009-0123-6. Author copy: https://logicalhacking.com/publications/wahler.ea-efficient-2010/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[16]
A. D. Brucker, J. Doser, and B. Wolff, “A model transformation semantics and analysis methodology for SecureUML,” in MoDELS 2006: Model driven engineering languages and systems, O. Nierstrasz, J. Whittle, D. Harel, and G. Reggio, Eds. Heidelberg: Springer-Verlag, 2006, pp. 306–320. doi: 10.1007/11880240_22. An extended version of this paper is available as ETH Technical Report, no. 524.
[
Abstract |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[5]
A. D. Brucker, S. Friedrich, F. Rittinger, and B. Wolff, “HOL-Z 2.0: A proof environment for Z-specifications,” in FM-TOOLS 2002, D. Haneberg, G. Schellhorn, and W. Reif, Eds. Augsburg: University Augsburg, 2002, pp. 33–38. Available as Technical Report, University Augsburg, number 2002–11.. Author copy: https://logicalhacking.com/publications/brucker.ea-hol-z-2002/
[
Abstract |
PDF |
BibTeX |
RIS |
EndNote |
Word]
[4]
A. D. Brucker and B. Wolff, “HOL-OCL: Experiences, consequences and design choices,” in UML 2002: Model engineering, concepts and tools, J.-M. Jézéquel, H. Hussmann, and S. Cook, Eds. Heidelberg: Springer-Verlag, 2002, pp. 196–211. doi: 10.1007/3-540-45800-X_17. Author copy: https://logicalhacking.com/publications/brucker.ea-hol-ocl-2002/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[2]
A. D. Brucker, F. Rittinger, and B. Wolff, “The CVS-server case study: A formalized security architecture,” in FM-TOOLS 2002, D. Haneberg, G. Schellhorn, and W. Reif, Eds. Augsburg: University Augsburg, 2002, pp. 47–52. Available as Technical Report, University Augsburg, number 2002–11.. Author copy: https://logicalhacking.com/publications/brucker.ea-cvs-server-2002/
[
Abstract |
PDF |
BibTeX |
RIS |
EndNote |
Word]
Software Engineering
Since the beginning of his PhD studies, Achim Brucker is working on formal (e.g., [
brucker.ea:theorem-prover:2012,
brucker.ea:hol-z:2003,
brucker.ea:featherweight:2012,
brucker.ea:hol-ocl:2008,
brucker.ea:extensible:2008-b]) and applied (e.g., [
monakova.ea:securing:2012,
kohler.ea:caching:2010,
marienfeld.ea:usdl-security:2012,
probst.ea:soknos:2010,
braune.ea:service-oriented:2011,
brucker.ea:extending:2009]) aspects of software engineering and system engineering. In general, he is interested in (formal) software processes that help to build safe, secure, and reliable systems. In particular, he worked on the formal semantics of object-oriented languages [
brucker.ea:featherweight:2012,
brucker.ea:ocl-null:2009,
brucker.ea:extensible:2008-b,
brucker:interactive:2007] as well as developing formal verification techniques for object-oriented systems [
brucker.ea:hol-ocl:2008,
brucker:interactive:2007,
brucker.ea:semantics:2009]. Moreover, he worked on theorem-prover-based testing techniques [
brucker.ea:hol-testgen:2012,
brucker.ea:theorem-prover:2012,
brucker.ea:testing:2001,
brucker.ea:hol-testgen:2010] that allow for combining verification (i.e., formal proofs) and testing. He integrated these techniques into model-driven development processes (e.g., [
wahler.ea:model-driven:2006-b brucker.ea:transformation:2006]) and CASE tools [
brucker.ea:mda:2006-b], e.g., for enterprise systems [
brucker.ea:securebpmn:2012]. This also includes meta-model-based language engineering [
brucker.ea:metamodel:2007] to integrate security aspects in standard modeling languages such as SecureUML (extending UML) [
brucker.ea:extending:2009,
brucker.ea:transformation:2006] or SecureBPMN (extending BPMN) [
brucker:securebpmn:2013,
brucker.ea:securebpmn:2012,
brucker.ea:framework:2013,
compagna.ea:bp-compliance:2013]. Moreover, he works on various techniques for securing service-oriented and cloud-based systems [
braune.ea:service-oriented:2011,
marienfeld.ea:usdl-security:2012,
probst.ea:soknos:2010,
brucker.ea:checking:2001,
brucker.ea:efficient:2010,
brucker.ea:secure:2012] as well as business-process-driven systems [
compagna.ea:bp-compliance:2013,
brucker.ea:securebpmn:2012,
monakova.ea:securing:2012,
kohler.ea:caching:2010].
[-] Publications
(Click To Expand)
[99]
A. D. Brucker, G. Daniel, and F. Jouault, Eds., 19th international workshop on OCL and textual modeling, OCL 2019. proceedings, vol. 2513. CEUR-WS.org, 2019.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[96]
M. Foster, A. D. Brucker, R. G. Taylor, S. North, and J. Derrick, “Incorporating data into EFSM inference,” in Software engineering and formal methods (SEFM), P. C. Ölveczky and G. Salaün, Eds. Heidelberg: Springer-Verlag, 2019, pp. 257–272. doi: 10.1007/978-3-030-30446-1_14. Author copy: https://logicalhacking.com/publications/foster.ea-incorporating-2019/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[87]
A. D. Brucker, “Theorem prover-based testing: Combining verification and testing,” presented at the Midlands graduate school, Leicester, UK, Apr. 09, 2017.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[85]
A. D. Brucker, B. Zhou, F. Malmignati, Q. Shi, and M. Merabti, “Modelling, validating, and ranking of secure service compositions,” Software: Practice and Expierence (SPE), vol. 47, pp. 1912–1943, Dec. 2017, doi: 10.1002/spe.2513. Author copy: https://logicalhacking.com/publications/brucker.ea-secure-services-2017/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[84]
L. ben Othmane, A. D. Brucker, S. Dashevskyi, and P. Tsalovski, “An introduction to data analytics for software security,” in Empirical research for software security: Foundations and experience, L. ben Othmane, M. G. Jaatun, and E. Weippl, Eds. CRC Press, 2017, pp. 69–94. Author copy: https://logicalhacking.com/publications/othmane.ea-data-analytics-2017/
[
Abstract |
PDF |
BibTeX |
RIS |
EndNote |
Word]
[83]
L. ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, and A. D. Brucker, “Time for addressing software security issues: Prediction models and impacting factors,” Data Science and Engineering (DSEJ), vol. 2, no. 2, pp. 107–124, 2017, doi: 10.1007/s41019-016-0019-8. Author copy: https://logicalhacking.com/publications/othmane.ea-fix-effort-2016/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[77]
M. Felderer, M. Büchler, M. Johns, A. D. Brucker, R. Breu, and A. Pretschner, “Security testing: A survey,” Advances in Computers, vol. 101, pp. 1–51, Mar. 2016, doi: 10.1016/bs.adcom.2015.11.003. Author copy: https://logicalhacking.com/publications/felderer.ea-security-testing-2016/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[76]
A. D. Brucker, J. Cabot, and A. S.-B. Herrera, Eds., 16th international workshop on OCL and textual modeling, OCL 2016, saint-malo, france, october 2, 2016. proceedings, vol. 1756. CEUR-WS.org, 2016.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[74]
A. D. Brucker, F. Tuong, and B. Wolff, “Featherweight OCL: A proposal for a machine-checked formal semantics for OCL 2.5,” LRI, Univ Paris Sud, CNRS, Centrale Supélec, Université Paris-Saclay, France, 1582, Sep. 2015. Author copy: https://logicalhacking.com/publications/brucker.ea-formal-semantics-ocl-2.5-2015/
[
Abstract |
PDF |
BibTeX |
RIS |
EndNote |
Word]
[73]
L. ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, A. D. Brucker, and P. Miseldine, “Factors impacting the effort required to fix security vulnerabilities: An industrial case study,” in Information security conference (ISC 2015), C. Boyd and D. Gligoriski, Eds. Heidelberg: Springer-Verlag, 2015. doi: 10.1007/978-3-319-23318-5_6. Author copy: https://logicalhacking.com/publications/othmane.ea-fix-effort-2015/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[71]
A. D. Brucker, M. Egea, M. Gogolla, and F. Tuong, Eds., 15th international workshop on OCL and textual modeling, OCL 2015, ottawa, canada, september 28, 2015. proceedings, vol. 1512. CEUR-WS.org, 2015.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[69]
A. D. Brucker, C. Dania, G. Georg, and M. Gogolla, Eds., 14th international workshop on OCL and textual modeling, OCL 2014, valencia, spain, september 30, 2014. proceedings, vol. 1285. CEUR-WS.org, 2014.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[67]
M. Asim, A. Yautsiukhin, A. D. Brucker, B. Lempereur, and Q. Shi, “Security policy monitoring of composite services,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014, pp. 192–202. doi: 10.1007/978-3-319-13518-2_13. Author copy: https://logicalhacking.com/publications/asim.ea-aniketos-monitoring-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[66]
A. D. Brucker, L. Compagna, and P. Guilleminot, “Compliance validation of secure service compositions,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014, pp. 136–149. doi: 10.1007/978-3-319-13518-2_10. Author copy: https://logicalhacking.com/publications/brucker.ea-aniketos-compliance-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[65]
A. D. Brucker, F. Malmignati, M. Merabti, Q. Shi, and B. Zhou, “Aniketos service composition framework: Analysing and ranking of secure services,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014, pp. 121–135. doi: 10.1007/978-3-319-13518-2_9. Author copy: https://logicalhacking.com/publications/brucker.ea-aniketos-scf-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[64]
A. D. Brucker, “Using SecureBPMN for modelling security-aware service compositions,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014, pp. 110–120. doi: 10.1007/978-3-319-13518-2_8. Author copy: https://logicalhacking.com/publications/brucker-aniketos-securebpmn-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[63]
P. H. Meland, E. Rios, V. Tountopoulos, and A. D. Brucker, “The aniketos platform,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014. doi: 10.1007/978-3-319-13518-2_4. Author copy: https://logicalhacking.com/publications/meland.ea-aniketos-platform-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[59]
A. D. Brucker, “Model-based testing for secure services,” presented at the Aniketos spring ph.d. School on “trustworthy & secure service composition,” Malaga, Spain, May 30, 2013.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[57]
A. D. Brucker, F. Malmignati, M. Merabti, Q. Shi, and B. Zhou, “A framework for secure service composition,” in International conference on information privacy, security, risk and trust (PASSAT), Los Alamitos, CA, USA: IEEE Computer Society, 2013, pp. 647–652. doi: 10.1109/SocialCom.2013.97. Author copy: https://logicalhacking.com/publications/brucker.ea-framework-2013/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[49]
A. D. Brucker and J. Julliand, Eds., Tests and proofs - 6th international conference, TAP 2012, praque, czech republic, mai 31 – june 1, 2012. proceedings, vol. 7305. Heidelberg: Springer-Verlag, 2012. doi: 10.1007/978-3-642-30473-6.
[
Abstract |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[46]
F. Marienfeld et al., “Service levels, security, and trust,” in Handbook of service description: USDL and its methods, A. Barros and D. Oberle, Eds. New York, NY, USA: Springer-Verlag, 2012, pp. 295–326. doi: 10.1007/978-1-4614-1864-1_12. Author copy: https://logicalhacking.com/publications/marienfeld.ea-usdl-security-2012/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[38]
A. D. Brucker, A. Schaad, and C. Wolter, “Prozessmodellierung: Einbinden von Sicherheitsregeln in Geschäftsprozesse,” iX special – Sicher im Netz, vol. 3, pp. 152–155, Oct. 2010.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[37]
M. Wahler, D. Basin, A. D. Brucker, and J. Koehler, “Efficient analysis of pattern-based constraint specifications,” Software and Systems Modeling, vol. 9, no. 2, pp. 225–255, Apr. 2010, doi: 10.1007/s10270-009-0123-6. Author copy: https://logicalhacking.com/publications/wahler.ea-efficient-2010/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[34]
A. D. Brucker, A. Schaad, and C. Wolter, “Prozessmodellierung: Einbinden von Sicherheitsregeln in Geschäftsprozesse,” iX, vol. 3, pp. 118–121, Mar. 2009. Eine aktualisierte Version des Artikels ist im iX special – Sicher im Netz (Oktober 2010) erschienen.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[16]
A. D. Brucker, J. Doser, and B. Wolff, “A model transformation semantics and analysis methodology for SecureUML,” in MoDELS 2006: Model driven engineering languages and systems, O. Nierstrasz, J. Whittle, D. Harel, and G. Reggio, Eds. Heidelberg: Springer-Verlag, 2006, pp. 306–320. doi: 10.1007/11880240_22. An extended version of this paper is available as ETH Technical Report, no. 524.
[
Abstract |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[6]
A. D. Brucker, S. Friedrich, F. Rittinger, and B. Wolff, “HOL-Z 2.0: A proof environment for Z-specifications,” in FM-TOOLS 2002, D. Haneberg, G. Schellhorn, and W. Reif, Eds. Augsburg: University Augsburg, 2002, pp. 33–38. Available as Technical Report, University Augsburg, number 2002–11.. Author copy: https://logicalhacking.com/publications/brucker.ea-hol-z-2002/
[
Abstract |
PDF |
BibTeX |
RIS |
EndNote |
Word]
[5]
A. D. Brucker and B. Wolff, “HOL-OCL: Experiences, consequences and design choices,” in UML 2002: Model engineering, concepts and tools, J.-M. Jézéquel, H. Hussmann, and S. Cook, Eds. Heidelberg: Springer-Verlag, 2002, pp. 196–211. doi: 10.1007/3-540-45800-X_17. Author copy: https://logicalhacking.com/publications/brucker.ea-hol-ocl-2002/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[3]
A. D. Brucker, F. Rittinger, and B. Wolff, “The CVS-server case study: A formalized security architecture,” in FM-TOOLS 2002, D. Haneberg, G. Schellhorn, and W. Reif, Eds. Augsburg: University Augsburg, 2002, pp. 47–52. Available as Technical Report, University Augsburg, number 2002–11.. Author copy: https://logicalhacking.com/publications/brucker.ea-cvs-server-2002/
[
Abstract |
PDF |
BibTeX |
RIS |
EndNote |
Word]
Hardware
During his computer science studies, Achim Brucker specialized in hardware verification and microsystems engineering. Parallel to his studies the worked at a company and developed test tools for embedded systems. He still enjoys designing own hardware and programming embedded systems in his spare time.
[-] Publications
(Click To Expand)