@book(Baker2007, author = "Paul Baker and Zhen Ru Dai and Jens Grabowski and Øystein Haugen and Ina Schieferdecker and Clay Williams", year = "2007", title = "Model-Driven Testing: Using the UML Testing Profile", edition = "1", publisher = "Springer, Berlin", url = "http://dx.doi.org/10.1007/978-3-540-72563-3", ) @article(Basin:2006:MDS:1125808.1125810, author = "David Basin and J\"{u}rgen Doser and Torsten Lodderstedt", year = "2006", title = "Model driven security: From UML models to access control infrastructures", journal = "ACM Trans. Softw. Eng. Methodol.", volume = "15", pages = "39--91", url = "http://doi.acm.org/10.1145/1125808.1125810", ) @inproceedings(RefWorks:887, author = "Mark Blackburn and Robert Busser and Aaron Nauman", year = "2002", title = "{Model-based approach to security test automation}", booktitle = "International Software Quality Week", ) @book(Gerrard:2002:RBE:560726, author = "Paul Gerrard and Neil Thompson", year = "2002", title = "Risk Based E-Business Testing", publisher = "Artech House, Inc.", address = "Norwood, MA, USA", ) @article(GuTian-yang2010, author = "F. Y. Gu Tian-yang, Shi Yin-sheng \& Yuan", year = "2010", title = "Research on Software Security", journal = "Testing World Academy of Science", volume = "Engineering and Technology 69 2010", ) @conference(DCCA-SCADE-SafeComp-07, author = "Matthias G{\"u}demann and Frank Ortmeier and Wolfgang Reif", year = "2007", title = "{U}sing {D}eductive {C}ause {C}onsequence {A}nalysis ({DCCA}) with {SCADE}", booktitle = "Proceedings of SAFECOMP 2007", publisher = "Springer LNCS 4680", ) @phdthesis(Hogganvik2007, author = "Ida Hogganvik", year = "2007", title = "A Graphical Approach to Security Risk Analysis", school = "Oslo : University of Oslo, Department of Informatics", ) @incollection(Jur02, author = "Jan J{\"u}rjens", year = "2002", title = "UMLsec: Extending UML for Secure Systems Development", editor = "Jean-Marc J\'{e}z\'{e}quel and Heinrich Hussmann and Stephen Cook", booktitle = "The Unified Modeling Language", series = "Lecture Notes in Computer Science", volume = "2460", publisher = "Springer Berlin / Heidelberg", pages = "1--9", url = "http://dx.doi.org/10.1007/3-540-45800-X_32", ) @book(juerjens05, author = "Jan J{\"u}rjens", year = "2005", title = "{Secure Systems Development with UML}", publisher = "Springer", url = "http://dx.doi.org/10.1007/b137706", ) @article(Jurjens:2008:MST:1467086.1467133, author = "Jan J\"{u}rjens", year = "2008", title = "Model-based Security Testing Using UMLsec", journal = "Electron. Notes Theor. Comput. Sci.", volume = "220", pages = "93--104", url = "http://dl.acm.org/citation.cfm?id=1467086.1467133", ) @inproceedings(DBLP:conf/ershov/JurjensW01, author = "Jan J{\"u}rjens and Guido Wimmel", year = "2001", title = "Specification-Based Testing of Firewalls", editor = "Dines Bj{\o }rner and Manfred Broy and Alexandre V. Zamulin", booktitle = "Ershov Memorial Conference", series = "Lecture Notes in Computer Science", volume = "2244", publisher = "Springer", pages = "308--316", url = "http://dx.doi.org/10.1007/3-540-45575-2_31", ) @book(Kaksonen2001, author = "Rauli Kaksonen", year = "2001", title = "A functional method for assessing protocol implementation security", volume = "VTT Publications 448", publisher = "VTT Technical Research Center of Finland", ) @book(Lund2011, author = "M. S. Lund and B. Solhaug and K. Stølen", year = "2011", title = "Model-Driven Risk Analysis. The CORAS Approach", volume = "ISBN: 978-3-642-12322-1", publisher = "Springer", ) @inproceedings(Mauw05, author = "Sjouke Mauw and Martijn Oostdijk", year = "2005", title = "Foundations of Attack Trees", booktitle = "International Conference on Information Security and Cryptology – ICISC 2005. LNCS 3935", publisher = "Springer", pages = "186--198", ) @inproceedings(Miller90anempirical, author = "Barton P. Miller and Lars Fredriksen and Bryan So", year = "1990", title = "An Empirical Study of the Reliability of UNIX Utilities", booktitle = "In Proceedings of the Workshop of Parallel and Distributed Debugging", publisher = "Academic Medicine", pages = "pages ix--xxi,", ) @inproceedings(MouelhiFBT08, author = "Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry and Yves Le Traon", year = "2008", title = "A Model-Based Framework for Security Policy Specification, Deployment and Testing", editor = "Krzysztof Czarnecki and Ileana Ober and Jean-Michel Bruel and Axel Uhl and Markus V{\"o}lter", booktitle = "MoDELS", series = "Lecture Notes in Computer Science", volume = "5301", publisher = "Springer", pages = "537--552", url = "http://dx.doi.org/10.1007/978-3-540-87875-9_38", ) @techreport(Nielsen1971, author = "D.S. Nielsen", year = "1971", title = "The Cause/Consequence Diagram Method as a Basis for Quantitative Accident Analysis", type = "Technical Report", number = "RISO-M-1374", institution = "Danish Atomic Energy Commission", ) @book(reay2002efficient, author = "K.A. Reay and University of Loughborough", year = "2002", title = "Efficient fault tree analysis using binary decision diagrams/", publisher = "University of Loughborough", url = "http://books.google.de/books?id=\_0SFGwAACAAJ", ) @book(takanen2008fuzzing, author = "A. Takanen and J. DeMott and C. Miller", year = "2008", title = "Fuzzing for software security testing and quality assurance", series = "Artech House information security and privacy series", publisher = "Artech House", url = "http://books.google.de/books?id=tMuAc\_y9dFYC", ) @article(Vesely_Goldberg_Roberts_Haasl_1981, author = "W E Vesely and F F Goldberg and N H Roberts and D F Haasl", year = "1981", title = "Fault Tree Handbook", journal = "Office", number = "NUREG-0492", pages = "209", url = "http://www.stormingmedia.us/37/3794/A379453.pdf", ) @inproceedings(Wang:2007, author = "Linzhang Wang and Eric Wong and Dianxiang Xu", year = "2007", title = "A Threat Model Driven Approach for Security Testing", booktitle = "Proceedings of the Third International Workshop on Software Engineering for Secure Systems", series = "SESS '07", publisher = "IEEE Computer Society", address = "Washington, DC, USA", pages = "10--", url = "http://dx.doi.org/10.1109/SESS.2007.2", ) @article(DBLP:journals/ijsi/WeiglhoferAW09, author = "Martin Weiglhofer and Bernhard K. Aichernig and Franz Wotawa", year = "2009", title = "Fault-Based Conformance Testing in Practice", journal = "Int. J. Software and Informatics", volume = "3", number = "2-3", pages = "375--411", url = "http://www.ijsi.org/IJSI/ch/reader/view_abstract.aspx?file_no=375{\&}flag=1", ) @inproceedings(Wimmel02, author = "Guido Wimmel and Jan J\"{u}rjens", year = "2002", title = "Specification-Based Test Generation for Security-Critical Systems Using Mutations", booktitle = "Proceedings of the 4th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering", series = "ICFEM '02", publisher = "Springer-Verlag", address = "London, UK, UK", pages = "471--482", url = "http://dl.acm.org/citation.cfm?id=646272.685812", )