[go: up one dir, main page]

Follow
Achim D. Brucker
Achim D. Brucker
University of Exeter, Exeter, UK
Verified email at exeter.ac.uk - Homepage
Title
Cited by
Cited by
Year
Security testing: A survey
M Felderer, M Büchler, M Johns, AD Brucker, R Breu, A Pretschner
Advances in Computers 101, 1-51, 2016
3002016
Extending access control models with break-glass
AD Brucker, H Petritsch
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1962009
SecureBPMN: Modeling and enforcing access control requirements in business processes
AD Brucker, I Hang, G Lückemeyer, R Ruparel
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
1452012
HOL-OCL: a formal proof environment for UML/OCL
AD Brucker, B Wolff
Proceedings of the Theory and practice of software, 11th international …, 2008
1252008
The HOL-OCL Book
AD Brucker, B Wolff
Swiss Federal Institute of Technology (ETH) 525, 2006
1182006
A proposal for a formal OCL semantics in Isabelle/HOL
AD Brucker, B Wolff
Theorem Proving in Higher Order Logics, 147-175, 2002
922002
On Theorem Prover-based Testing
AD Brucker, B Wolff
Formal Aspects of Computing 25 (5), 683-721, 2013
812013
A specification-based test case generation method for UML/OCL
AD Brucker, M Krieger, D Longuet, B Wolff
Models in Software Engineering, 334-348, 2011
752011
HOL-Z 2.0: A proof environment for Z-specifications
AD Brucker, F Rittinger, B Wolff
Journal of Universal Computer Science 9 (2), 152-172, 2003
592003
On the static analysis of hybrid mobile apps
AD Brucker, M Herzberg
Symposium on Engineering Secure Software and Systems, 72-88, 2016
58*2016
Metamodel-based UML notations for domain-specific languages
AD Brucker, J Doser
4th International Workshop on Software Language Engineering (ATEM 2007), 2007
542007
An approach to modular and testable security models of real-world health-care applications
AD Brucker, L Brügger, P Kearney, B Wolff
Proceedings of the 16th ACM symposium on Access control models and …, 2011
532011
Attribute-based encryption with break-glass
AD Brucker, H Petritsch, SG Weber
IFIP International Workshop on Information Security Theory and Practices …, 2010
532010
Symbolic test case generation for primitive recursive functions
AD Brucker, B Wolff
International Workshop on Formal Approaches to Software Testing, 16-32, 2004
532004
A screening test for disclosed vulnerabilities in foss components
S Dashevskyi, AD Brucker, F Massacci
IEEE Transactions on Software Engineering 45 (10), 945-966, 2018
522018
A model transformation semantics and analysis methodology for SecureUML
AD Brucker, J Doser, B Wolff
Model Driven Engineering Languages and Systems, 306-320, 2006
502006
Verified firewall policy transformations for test case generation
AD Brucker, L Brügger, P Kearney, B Wolff
2010 Third International Conference on Software Testing, Verification and …, 2010
492010
Time for addressing software security issues: Prediction models and impacting factors
L Ben Othmane, G Chehrazi, E Bodden, P Tsalovski, AD Brucker
Data Science and Engineering 2 (2), 107-124, 2017
442017
An extensible encoding of object-oriented data models in HOL
AD Brucker, B Wolff
Journal of Automated Reasoning 41 (3), 219-249, 2008
442008
Computing optimal fix locations for security vulnerabilities in computer-readable code
AD Brucker, H Petritsch
US Patent 10,318,739, 2019
432019
The system can't perform the operation now. Try again later.
Articles 1–20