[-] Journals
(Click To Expand)
[10]
A. D. Brucker, B. Zhou, F. Malmignati, Q. Shi, and M. Merabti, “Modelling, validating, and ranking of secure service compositions,” Software: Practice and Expierence (SPE), vol. 47, pp. 1912–1943, Dec. 2017, doi: 10.1002/spe.2513. Author copy: https://logicalhacking.com/publications/brucker.ea-secure-services-2017/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[9]
L. ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, and A. D. Brucker, “Time for addressing software security issues: Prediction models and impacting factors,” Data Science and Engineering (DSEJ), vol. 2, no. 2, pp. 107–124, 2017, doi: 10.1007/s41019-016-0019-8. Author copy: https://logicalhacking.com/publications/othmane.ea-fix-effort-2016/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[8]
A. D. Brucker, L. Brügger, and B. Wolff, “Formal firewall conformance testing: An application of test and proof techniques,” Software Testing, Verification & Reliability (STVR), vol. 25, no. 1, pp. 34–71, 2015, doi: 10.1002/stvr.1544. Author copy: https://logicalhacking.com/publications/brucker.ea-formal-fw-testing-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[5]
M. Wahler, D. Basin, A. D. Brucker, and J. Koehler, “Efficient analysis of pattern-based constraint specifications,” Software and Systems Modeling, vol. 9, no. 2, pp. 225–255, Apr. 2010, doi: 10.1007/s10270-009-0123-6. Author copy: https://logicalhacking.com/publications/wahler.ea-efficient-2010/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[-] Conferences
(Click To Expand)
[37]
M. Foster, A. D. Brucker, R. G. Taylor, S. North, and J. Derrick, “Incorporating data into EFSM inference,” in Software engineering and formal methods (SEFM), P. C. Ölveczky and G. Salaün, Eds. Heidelberg: Springer-Verlag, 2019, pp. 257–272. doi: 10.1007/978-3-030-30446-1_14. Author copy: https://logicalhacking.com/publications/foster.ea-incorporating-2019/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[28]
A. D. Brucker, O. Havle, Y. Nemouchi, and B. Wolff, “Testing the IPC protocol for a real-time operating system,” in Working conference on verified software: Theories, tools, and experiments, A. Gurfinkel and S. A. Seshia, Eds. Heidelberg: Springer-Verlag, 2015. doi: 10.1007/978-3-319-29613-5_3. Author copy: https://logicalhacking.com/publications/brucker.ea-ipc-testing-2015/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[27]
L. ben Othmane, G. Chehrazi, E. Bodden, P. Tsalovski, A. D. Brucker, and P. Miseldine, “Factors impacting the effort required to fix security vulnerabilities: An industrial case study,” in Information security conference (ISC 2015), C. Boyd and D. Gligoriski, Eds. Heidelberg: Springer-Verlag, 2015. doi: 10.1007/978-3-319-23318-5_6. Author copy: https://logicalhacking.com/publications/othmane.ea-fix-effort-2015/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[23]
A. D. Brucker, F. Malmignati, M. Merabti, Q. Shi, and B. Zhou, “A framework for secure service composition,” in International conference on information privacy, security, risk and trust (PASSAT), Los Alamitos, CA, USA: IEEE Computer Society, 2013, pp. 647–652. doi: 10.1109/SocialCom.2013.97. Author copy: https://logicalhacking.com/publications/brucker.ea-framework-2013/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[22]
A. D. Brucker, L. Brügger, and B. Wolff, “HOL-TestGen/FW: An environment for specification-based firewall conformance testing,” in International colloquium on theoretical aspects of computing (ICTAC), Z. Liu, J. Woodcock, and H. Zhu, Eds. Heidelberg: Springer-Verlag, 2013, pp. 112–121. doi: 10.1007/978-3-642-39718-9_7. Author copy: https://logicalhacking.com/publications/brucker.ea-hol-testgen-fw-2013/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[14]
A. D. Brucker, L. Brügger, P. Kearney, and B. Wolff, “Verified firewall policy transformations for test-case generation,” in Third international conference on software testing, verification, and validation (ICST), Los Alamitos, CA, USA: IEEE Computer Society, 2010, pp. 345–354. doi: 10.1109/ICST.2010.50. Author copy: https://logicalhacking.com/publications/brucker.ea-firewall-2010/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[11]
M. Kohler, A. D. Brucker, and A. Schaad, “ProActive Caching: Generating caching heuristics for business process environments,” in International conference on computational science and engineering (CSE), vol. 3, Los Alamitos, CA, USA: IEEE Computer Society, 2009, pp. 207–304. doi: 10.1109/CSE.2009.177. Author copy: https://logicalhacking.com/publications/kohler.ea-proactive-2009/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[3]
A. D. Brucker, J. Doser, and B. Wolff, “A model transformation semantics and analysis methodology for SecureUML,” in MoDELS 2006: Model driven engineering languages and systems, O. Nierstrasz, J. Whittle, D. Harel, and G. Reggio, Eds. Heidelberg: Springer-Verlag, 2006, pp. 306–320. doi: 10.1007/11880240_22. An extended version of this paper is available as ETH Technical Report, no. 524.
[
Abstract |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[1]
A. D. Brucker and B. Wolff, “HOL-OCL: Experiences, consequences and design choices,” in UML 2002: Model engineering, concepts and tools, J.-M. Jézéquel, H. Hussmann, and S. Cook, Eds. Heidelberg: Springer-Verlag, 2002, pp. 196–211. doi: 10.1007/3-540-45800-X_17. Author copy: https://logicalhacking.com/publications/brucker.ea-hol-ocl-2002/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[-] Workshop
(Click To Expand)
[16]
A. D. Brucker, H. Petritsch, and S. G. Weber, “Attribute-based encryption with break-glass,” in Workshop in information security theory and practice (WISTP), P. Samarati, M. Tunstall, and J. Posegga, Eds. Heidelberg: Springer-Verlag, 2010, pp. 237–244. doi: 10.1007/978-3-642-12368-9_18. Author copy: https://logicalhacking.com/publications/brucker.ea-attribute-based-2010/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[3]
A. D. Brucker, S. Friedrich, F. Rittinger, and B. Wolff, “HOL-Z 2.0: A proof environment for Z-specifications,” in FM-TOOLS 2002, D. Haneberg, G. Schellhorn, and W. Reif, Eds. Augsburg: University Augsburg, 2002, pp. 33–38. Available as Technical Report, University Augsburg, number 2002–11.. Author copy: https://logicalhacking.com/publications/brucker.ea-hol-z-2002/
[
Abstract |
PDF |
BibTeX |
RIS |
EndNote |
Word]
[2]
A. D. Brucker, F. Rittinger, and B. Wolff, “The CVS-server case study: A formalized security architecture,” in FM-TOOLS 2002, D. Haneberg, G. Schellhorn, and W. Reif, Eds. Augsburg: University Augsburg, 2002, pp. 47–52. Available as Technical Report, University Augsburg, number 2002–11.. Author copy: https://logicalhacking.com/publications/brucker.ea-cvs-server-2002/
[
Abstract |
PDF |
BibTeX |
RIS |
EndNote |
Word]
[-] Invited Publications
(Click To Expand)
[12]
L. ben Othmane, A. D. Brucker, S. Dashevskyi, and P. Tsalovski, “An introduction to data analytics for software security,” in Empirical research for software security: Foundations and experience, L. ben Othmane, M. G. Jaatun, and E. Weippl, Eds. CRC Press, 2017, pp. 69–94. Author copy: https://logicalhacking.com/publications/othmane.ea-data-analytics-2017/
[
Abstract |
PDF |
BibTeX |
RIS |
EndNote |
Word]
[10]
M. Felderer, M. Büchler, M. Johns, A. D. Brucker, R. Breu, and A. Pretschner, “Security testing: A survey,” Advances in Computers, vol. 101, pp. 1–51, Mar. 2016, doi: 10.1016/bs.adcom.2015.11.003. Author copy: https://logicalhacking.com/publications/felderer.ea-security-testing-2016/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[8]
M. Asim, A. Yautsiukhin, A. D. Brucker, B. Lempereur, and Q. Shi, “Security policy monitoring of composite services,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014, pp. 192–202. doi: 10.1007/978-3-319-13518-2_13. Author copy: https://logicalhacking.com/publications/asim.ea-aniketos-monitoring-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[7]
A. D. Brucker, L. Compagna, and P. Guilleminot, “Compliance validation of secure service compositions,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014, pp. 136–149. doi: 10.1007/978-3-319-13518-2_10. Author copy: https://logicalhacking.com/publications/brucker.ea-aniketos-compliance-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[6]
A. D. Brucker, F. Malmignati, M. Merabti, Q. Shi, and B. Zhou, “Aniketos service composition framework: Analysing and ranking of secure services,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014, pp. 121–135. doi: 10.1007/978-3-319-13518-2_9. Author copy: https://logicalhacking.com/publications/brucker.ea-aniketos-scf-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[5]
A. D. Brucker, “Using SecureBPMN for modelling security-aware service compositions,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014, pp. 110–120. doi: 10.1007/978-3-319-13518-2_8. Author copy: https://logicalhacking.com/publications/brucker-aniketos-securebpmn-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[4]
P. H. Meland, E. Rios, V. Tountopoulos, and A. D. Brucker, “The aniketos platform,” in Secure and trustworthy service composition: The aniketos approach, A. D. Brucker, F. Dalpiaz, P. Giorgini, P. H. Meland, and E. Rios, Eds. Heidelberg: Springer-Verlag, 2014. doi: 10.1007/978-3-319-13518-2_4. Author copy: https://logicalhacking.com/publications/meland.ea-aniketos-platform-2014/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[2]
F. Marienfeld et al., “Service levels, security, and trust,” in Handbook of service description: USDL and its methods, A. Barros and D. Oberle, Eds. New York, NY, USA: Springer-Verlag, 2012, pp. 295–326. doi: 10.1007/978-1-4614-1864-1_12. Author copy: https://logicalhacking.com/publications/marienfeld.ea-usdl-security-2012/
[
Abstract |
PDF |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[-] Edited
(Click To Expand)
[8]
A. D. Brucker, G. Daniel, and F. Jouault, Eds., 19th international workshop on OCL and textual modeling, OCL 2019. proceedings, vol. 2513. CEUR-WS.org, 2019.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[7]
A. D. Brucker, J. Cabot, and A. S.-B. Herrera, Eds., 16th international workshop on OCL and textual modeling, OCL 2016, saint-malo, france, october 2, 2016. proceedings, vol. 1756. CEUR-WS.org, 2016.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[6]
A. D. Brucker, M. Egea, M. Gogolla, and F. Tuong, Eds., 15th international workshop on OCL and textual modeling, OCL 2015, ottawa, canada, september 28, 2015. proceedings, vol. 1512. CEUR-WS.org, 2015.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[5]
A. D. Brucker, C. Dania, G. Georg, and M. Gogolla, Eds., 14th international workshop on OCL and textual modeling, OCL 2014, valencia, spain, september 30, 2014. proceedings, vol. 1285. CEUR-WS.org, 2014.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[4]
A. D. Brucker and J. Julliand, “Editorial for the special issue of STVR on tests and proofs volume 2: Tests and proofs for improving the generation time and quality of test data suites,” Software Testing, Verification & Reliability (STVR), vol. 24, no. 8, pp. 591–592, Dec. 2014, doi: 10.1002/stvr.1558.
[
Abstract |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[3]
A. D. Brucker and J. Julliand, “Editorial for the special issue of STVR on tests and proofs volume 1: Tests and proofs in model-based testing,” Software Testing, Verification & Reliability (STVR), vol. 24, no. 7, pp. 497–498, Nov. 2014, doi: 10.1002/stvr.1560.
[
Abstract |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[1]
A. D. Brucker and J. Julliand, Eds., Tests and proofs - 6th international conference, TAP 2012, praque, czech republic, mai 31 – june 1, 2012. proceedings, vol. 7305. Heidelberg: Springer-Verlag, 2012. doi: 10.1007/978-3-642-30473-6.
[
Abstract |
DOI |
BibTeX |
RIS |
EndNote |
Word]
[-] Technical Reports
(Click To Expand)
[12]
A. D. Brucker, F. Tuong, and B. Wolff, “Featherweight OCL: A proposal for a machine-checked formal semantics for OCL 2.5,” LRI, Univ Paris Sud, CNRS, Centrale Supélec, Université Paris-Saclay, France, 1582, Sep. 2015. Author copy: https://logicalhacking.com/publications/brucker.ea-formal-semantics-ocl-2.5-2015/
[
Abstract |
PDF |
BibTeX |
RIS |
EndNote |
Word]
[-] Thesis
(Click To Expand)
[-] Popular Magazines and Newspapers
(Click To Expand)
[2]
A. D. Brucker, A. Schaad, and C. Wolter, “Prozessmodellierung: Einbinden von Sicherheitsregeln in Geschäftsprozesse,” iX special – Sicher im Netz, vol. 3, pp. 152–155, Oct. 2010.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[1]
A. D. Brucker, A. Schaad, and C. Wolter, “Prozessmodellierung: Einbinden von Sicherheitsregeln in Geschäftsprozesse,” iX, vol. 3, pp. 118–121, Mar. 2009. Eine aktualisierte Version des Artikels ist im iX special – Sicher im Netz (Oktober 2010) erschienen.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[-] Tutorials and PhD Schools
(Click To Expand)
[5]
A. D. Brucker, “Theorem prover-based testing: Combining verification and testing,” presented at the Midlands graduate school, Leicester, UK, Apr. 09, 2017.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]
[3]
A. D. Brucker, “Model-based testing for secure services,” presented at the Aniketos spring ph.d. School on “trustworthy & secure service composition,” Malaga, Spain, May 30, 2013.
[
Abstract |
BibTeX |
RIS |
EndNote |
Word]