default search action
Achim D. Brucker
Person information
- affiliation: University of Sheffield, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j39]Achim D. Brucker, Nicolas Méric, Burkhart Wolff:
Isabelle/DOF. Arch. Formal Proofs 2024 (2024) - [j38]Achim D. Brucker, Amy Stell:
(Extended) Interval Analysis. Arch. Formal Proofs 2024 (2024) - [c68]Achim D. Brucker, Teddy Cameron-Burke, Amy Stell:
Formally Verified Interval Arithmetic and Its Application to Program Verification. FormaliSE@ICSE 2024: 111-121 - [c67]Achim D. Brucker, Diego Marmsoler:
Teaching Formal Methods in Application Domains - A Case Study in Computer and Network Security. FMTea 2024: 124-140 - 2023
- [j37]Andreas V. Hess, Sebastian Alexander Mödersheim, Achim D. Brucker:
Stateful Protocol Composition in Isabelle/HOL. ACM Trans. Priv. Secur. 26(3): 25:1-25:36 (2023) - [c66]Achim D. Brucker, Amy Stell:
Verifying Feedforward Neural Networks for Classification in Isabelle/HOL. FM 2023: 427-444 - [c65]Achim D. Brucker, Idir Aït-Sadoune, Nicolas Méric, Burkhart Wolff:
Using Deep Ontologies in Formal Software Engineering. ABZ 2023: 15-32 - 2022
- [j36]Achim D. Brucker:
Nano JSON: Working with JSON formatted data in Isabelle/HOL and Isabelle/ML. Arch. Formal Proofs 2022 (2022) - [j35]Diego Marmsoler, Achim D. Brucker:
Isabelle/Solidity: A deep Embedding of Solidity in Isabelle/HOL. Arch. Formal Proofs 2022 (2022) - [c64]Diego Marmsoler, Achim D. Brucker:
Conformance Testing of Formal Semantics Using Grammar-Based Fuzzing. TAP@STAF 2022: 106-125 - 2021
- [c63]Achim D. Brucker, Sakine Yalman:
Confidentiality Enhanced Life-Cycle Assessment. Business Process Management Workshops 2021: 434-446 - [c62]Andreas V. Hess, Sebastian Mödersheim, Achim D. Brucker, Anders Schlichtkrull:
Performing Security Proofs of Stateful Protocols. CSF 2021: 1-16 - [c61]Diego Marmsoler, Achim D. Brucker:
A Denotational Semantics of Solidity in Isabelle/HOL. SEFM 2021: 403-422 - 2020
- [j34]Achim D. Brucker, Michael Herzberg:
The Safely Composable DOM. Arch. Formal Proofs 2020 (2020) - [j33]Achim D. Brucker, Michael Herzberg:
A Formalization of Safely Composable Web Components. Arch. Formal Proofs 2020 (2020) - [j32]Achim D. Brucker, Michael Herzberg:
A Formal Model of the Safely Composable Document Object Model with Shadow Roots. Arch. Formal Proofs 2020 (2020) - [j31]Achim D. Brucker, Michael Herzberg:
A Formalization of Web Components. Arch. Formal Proofs 2020 (2020) - [j30]Achim D. Brucker, Michael Herzberg:
A Formal Model of the Document Object Model with Shadow Roots. Arch. Formal Proofs 2020 (2020) - [j29]Michael Foster, Achim D. Brucker, Ramsay G. Taylor, John Derrick:
Inference of Extended Finite State Machines. Arch. Formal Proofs 2020 (2020) - [j28]Michael Foster, Achim D. Brucker, Ramsay G. Taylor, John Derrick:
A Formal Model of Extended Finite State Machines. Arch. Formal Proofs 2020 (2020) - [j27]Andreas V. Hess, Sebastian Mödersheim, Achim D. Brucker:
Stateful Protocol Composition and Typing. Arch. Formal Proofs 2020 (2020) - [j26]Andreas V. Hess, Sebastian Mödersheim, Achim D. Brucker, Anders Schlichtkrull:
Automated Stateful Protocol Verification. Arch. Formal Proofs 2020 (2020) - [j25]Achim D. Brucker, Frédéric Tuong, Burkhart Wolff:
Model Transformation as Conservative Theory-Transformation. J. Object Technol. 19(3): 3:1-16 (2020)
2010 – 2019
- 2019
- [j24]Stanislav Dashevskyi, Achim D. Brucker, Fabio Massacci:
A Screening Test for Disclosed Vulnerabilities in FOSS Components. IEEE Trans. Software Eng. 45(10): 945-966 (2019) - [c60]Achim D. Brucker, Michael Herzberg:
A Formally Verified Model of Web Components. FACS 2019: 51-71 - [c59]Achim D. Brucker, Burkhart Wolff:
Using Ontologies in Formal Developments Targeting Certification. IFM 2019: 65-82 - [c58]Achim D. Brucker, Gwendal Daniel, Martin Gogolla, Frédéric Jouault, Christophe Ponsard, Valéry Ramon, Edward D. Willink:
Emerging Topics in Textual Modelling. OCL@MoDELS 2019: 91-104 - [c57]Michael Foster, Achim D. Brucker, Ramsay G. Taylor, Siobhán North, John Derrick:
Incorporating Data into EFSM Inference. SEFM 2019: 257-272 - [c56]Achim D. Brucker, Burkhart Wolff:
Isabelle/DOF: Design and Implementation. SEFM 2019: 275-292 - [e6]Achim D. Brucker, Gwendal Daniel, Frédéric Jouault:
19th International Workshop in OCL and Textual Modeling (OCL 2019) co-located with IEEE/ACM 22nd International Conference on Model Driven Engineering Languages and Systems (MODELS 2019), Munich, Germany, September 16, 2019. CEUR Workshop Proceedings 2513, CEUR-WS.org 2019 [contents] - 2018
- [j23]Achim D. Brucker, Michael Herzberg:
A Formal Model of the Document Object Model. Arch. Formal Proofs 2018 (2018) - [j22]Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Thar Baker, Qi Shi, Brett Lempereur:
Security policy monitoring of BPMN-based service compositions. J. Softw. Evol. Process. 30(9) (2018) - [c55]Andreas V. Hess, Sebastian Alexander Mödersheim, Achim D. Brucker:
Stateful Protocol Composition. ESORICS (1) 2018: 427-446 - [c54]Michael Foster, Ramsay G. Taylor, Achim D. Brucker, John Derrick:
Formalising Extended Finite State Machine Transition Merging. ICFEM 2018: 373-387 - [c53]Achim D. Brucker, Idir Aït-Sadoune, Paolo Crisafulli, Burkhart Wolff:
Using the Isabelle Ontology Framework - Linking the Formal with the Informal. CICM 2018: 23-38 - [c52]Achim D. Brucker, Michael Herzberg:
Formalizing (Web) Standards - An Application of Test and Proof. TAP@STAF 2018: 159-166 - [c51]Achim D. Brucker, Michael Herzberg:
A Formal Semantics of the Core DOM in Isabelle/HOL. WWW (Companion Volume) 2018: 741-749 - 2017
- [j21]Achim D. Brucker, Lukas Brügger, Burkhart Wolff:
Formal Network Models and Their Application to Firewall Policies. Arch. Formal Proofs 2017 (2017) - [j20]Lotfi Ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, Achim D. Brucker:
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors. Data Sci. Eng. 2(2): 107-124 (2017) - [j19]Achim D. Brucker, Bo Zhou, Francesco Malmignati, Qi Shi, Madjid Merabti:
Modelling, validating, and ranking of secure service compositions. Softw. Pract. Exp. 47(12): 1923-1943 (2017) - [c50]Robert Bill, Achim D. Brucker, Jordi Cabot, Martin Gogolla, Antonio Vallecillo, Edward D. Willink:
Workshop in OCL and Textual Modelling - Report on Recent Trends and Panel Discussions. STAF Workshops 2017: 297-301 - 2016
- [j18]Michael Felderer, Matthias Büchler, Martin Johns, Achim D. Brucker, Ruth Breu, Alexander Pretschner:
Security Testing: A Survey. Adv. Comput. 101: 1-51 (2016) - [c49]Achim D. Brucker, Michael Herzberg:
On the Static Analysis of Hybrid Mobile Apps - A Report on the State of Apache Cordova Nation. ESSoS 2016: 72-88 - [c48]Stanislav Dashevskyi, Achim D. Brucker, Fabio Massacci:
On the Security Cost of Using a Free and Open Source Component in a Proprietary Product. ESSoS 2016: 190-206 - [c47]Achim D. Brucker, Jordi Cabot, Gwendal Daniel, Martin Gogolla, Adolfo Sánchez-Barbudo Herrera, Frank Hilken, Frédéric Tuong, Edward D. Willink, Burkhart Wolff:
Recent Developments in OCL and Textual Modelling. OCL@MoDELS 2016: 157-165 - [c46]Achim D. Brucker, Burkhart Wolff:
Monadic Sequence Testing and Explicit Test-Refinements. TAP@STAF 2016: 17-36 - [e5]Achim D. Brucker, Jordi Cabot, Adolfo Sánchez-Barbudo Herrera:
Proceedings of the 16th International Workshop on OCL and Textual Modelling co-located with 19th International Conference on Model Driven Engineering Languages and Systems (MODELS 2016), Saint-Malo, France, October 2, 2016. CEUR Workshop Proceedings 1756, CEUR-WS.org 2016 [contents] - 2015
- [j17]Achim D. Brucker, Lukas Brügger, Burkhart Wolff:
Formal firewall conformance testing: an application of test and proof techniques. Softw. Test. Verification Reliab. 25(1): 34-71 (2015) - [c45]Mattia Salnitri, Achim D. Brucker, Paolo Giorgini:
From Secure Business Process Models to Secure Artifact-Centric Specifications. BMMDS/EMMSAD 2015: 246-262 - [c44]Lotfi Ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, Achim D. Brucker, Philip Miseldine:
Factors Impacting the Effort Required to Fix Security Vulnerabilities - An Industrial Case Study. ISC 2015: 102-119 - [c43]Achim D. Brucker, Oto Havle, Yakoub Nemouchi, Burkhart Wolff:
Testing the IPC Protocol for a Real-Time Operating System. VSTTE 2015: 40-60 - [e4]Achim D. Brucker, Marina Egea, Martin Gogolla, Frédéric Tuong:
Proceedings of the 15th International Workshop on OCL and Textual Modeling co-located with 18th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2015), Ottawa, Canada, September 28, 2015. CEUR Workshop Proceedings 1512, CEUR-WS.org 2015 [contents] - 2014
- [j16]Achim D. Brucker, Lukas Brügger, Burkhart Wolff:
The Unified Policy Framework (UPF). Arch. Formal Proofs 2014 (2014) - [j15]Achim D. Brucker, Frédéric Tuong, Burkhart Wolff:
Featherweight OCL: A Proposal for a Machine-Checked Formal Semantics for OCL 2.5. Arch. Formal Proofs 2014 (2014) - [j14]Ruediger Bachmann, Achim D. Brucker:
Developing secure software. Datenschutz und Datensicherheit 38(4): 257-261 (2014) - [j13]Achim D. Brucker, Jacques Julliand:
Editorial for the special issue of STVR on tests and proofs volume 1: tests and proofs in model-based testing. Softw. Test. Verification Reliab. 24(7): 497-498 (2014) - [j12]Achim D. Brucker, Jacques Julliand:
Editorial for the special issue of STVR on tests and proofs volume 2: tests and proofs for improving the generation time and quality of test data suites. Softw. Test. Verification Reliab. 24(8): 591-592 (2014) - [c42]Achim D. Brucker, Tony Clark, Carolina Dania, Geri Georg, Martin Gogolla, Frédéric Jouault, Ernest Teniente, Burkhart Wolff:
Panel Discussion: Proposals for Improving OCL. OCL@MoDELS 2014: 83-99 - [c41]Achim D. Brucker, Uwe Sodan:
Deploying Static Application Security Testing on a Large Scale. Sicherheit 2014: 91-101 - [c40]Steffen Bartsch, Bernhard J. Berger, Eric Bodden, Achim D. Brucker, Jens Heider, Mehmet Kus, Sönke Maseberg, Karsten Sohr, Melanie Volkamer:
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen. Sicherheit 2014: 283-291 - [p6]Per Håkon Meland, Erkuden Rios, Vasilis Tountopoulos, Achim D. Brucker:
The Aniketos Platform. Secure and Trustworthy Service Composition 2014: 50-62 - [p5]Achim D. Brucker:
Using SecureBPMN for Modelling Security-Aware Service Compositions. Secure and Trustworthy Service Composition 2014: 110-120 - [p4]Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services. Secure and Trustworthy Service Composition 2014: 121-135 - [p3]Achim D. Brucker, Luca Compagna, Pierre Guilleminot:
Compliance Validation of Secure Service Compositions. Secure and Trustworthy Service Composition 2014: 136-149 - [p2]Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Brett Lempereur, Qi Shi:
Security Policy Monitoring of Composite Services. Secure and Trustworthy Service Composition 2014: 192-202 - [e3]Achim D. Brucker, Carolina Dania, Geri Georg, Martin Gogolla:
Proceedings of the 14th International Workshop on OCL and Textual Modelling co-located with 17th International Conference on Model Driven Engineering Languages and Systems (MODELS 2014), Valencia, Spain, September 30, 2014. CEUR Workshop Proceedings 1285, CEUR-WS.org 2014 [contents] - [e2]Achim D. Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Håkon Meland, Erkuden Rios:
Secure and Trustworthy Service Composition - The Aniketos Approach. Lecture Notes in Computer Science 8900, Springer 2014, ISBN 978-3-319-13517-5 [contents] - [i1]Achim D. Brucker, Dan Chiorean, Tony Clark, Birgit Demuth, Martin Gogolla, Dimitri Plotnikov, Bernhard Rumpe, Edward D. Willink, Burkhart Wolff:
Report on the Aachen OCL Meeting. CoRR abs/1408.5698 (2014) - 2013
- [j11]Achim D. Brucker, Burkhart Wolff:
On theorem prover-based testing. Formal Aspects Comput. 25(5): 683-721 (2013) - [j10]Achim D. Brucker:
Integrating Security Aspects into Business Process Models. it Inf. Technol. 55(6): 239-246 (2013) - [c39]Luca Compagna, Pierre Guilleminot, Achim D. Brucker:
Business Process Compliance via Security Validation as a Service. ICST 2013: 455-462 - [c38]Achim D. Brucker, Lukas Brügger, Burkhart Wolff:
hol-TestGen/fw - An Environment for Specification-Based Firewall Conformance Testing. ICTAC 2013: 112-121 - [c37]Achim D. Brucker, Delphine Longuet, Frédéric Tuong, Burkhart Wolff:
On the Semantics of Object-Oriented Data Structures and Path Expressions. OCL@MoDELS 2013: 23-32 - [c36]Achim D. Brucker, Dan Chiorean, Tony Clark, Birgit Demuth, Martin Gogolla, Dimitri Plotnikov, Bernhard Rumpe, Edward D. Willink, Burkhart Wolff:
Report on the Aachen OCL Meeting. OCL@MoDELS 2013: 103-111 - [c35]Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
A Framework for Secure Service Composition. SocialCom 2013: 647-652 - [c34]Achim D. Brucker, Abderrahmane Feliachi, Yakoub Nemouchi, Burkhart Wolff:
Test Program Generation for a Microprocessor - A Case-Study. TAP@STAF 2013: 76-95 - 2012
- [c33]Achim D. Brucker, Isabelle Hang:
Secure and Compliant Implementation of Business Process-Driven Systems. Business Process Management Workshops 2012: 662-674 - [c32]Ganna Monakova, Cristina Severin, Achim D. Brucker, Ulrich Flegel, Andreas Schaad:
Monitoring Security and Safety of Assets in Supply Chains. Future Security 2012: 9-20 - [c31]Achim D. Brucker, Burkhart Wolff:
Featherweight OCL: a study for the consistent semantics of OCL 2.3 in HOL. OCL@MoDELS 2012: 19-24 - [c30]Ganna Monakova, Achim D. Brucker, Andreas Schaad:
Security and safety of assets in business processes. SAC 2012: 1667-1673 - [c29]Achim D. Brucker, Isabelle Hang, Gero Lückemeyer, Raj Ruparel:
SecureBPMN: modeling and enforcing access control requirements in business processes. SACMAT 2012: 123-126 - [p1]Florian Marienfeld, Edzard Höfig, Michele Bezzi, Matthias Flügge, Jonas Pattberg, Gabriel Serme, Achim D. Brucker, Philip Robinson, Stephen Dawson, Wolfgang Theilmann:
Service Levels, Security, and Trust. Handbook of Service Description 2012: 295-326 - [e1]Achim D. Brucker, Jacques Julliand:
Tests and Proofs - 6th International Conference, TAP@TOOLS 2012, Prague, Czech Republic, May 31 - June 1, 2012. Proceedings. Lecture Notes in Computer Science 7305, Springer 2012, ISBN 978-3-642-30472-9 [contents] - 2011
- [j9]Matthias P. Krieger, Achim D. Brucker:
Extending OCL Operation Contracts with Objective Functions. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 44 (2011) - [c28]Achim D. Brucker, Helmut Petritsch:
A Framework for Managing and Analyzing Changes of Security Policies. POLICY 2011: 105-112 - [c27]Achim D. Brucker, Lukas Brügger, Paul J. Kearney, Burkhart Wolff:
An approach to modular and testable security models of real-world health-care applications. SACMAT 2011: 133-142 - [c26]Stephan Braune, Achim D. Brucker, Gerald Kleser, Keqin Li, Theo Dirk Meijler, Heiko Paulheim, Florian Probst:
A Service-oriented Architecture for Emergency Management Systems. Software Engineering (Workshops) 2011: 225-232 - 2010
- [j8]Michael Wahler, David A. Basin, Achim D. Brucker, Jana Koehler:
Efficient analysis of pattern-based constraint specifications. Softw. Syst. Model. 9(2): 225-255 (2010) - [c25]Achim D. Brucker, Dieter Hutter:
Information Flow in Disaster Management Systems. ARES 2010: 156-163 - [c24]Achim D. Brucker, Helmut Petritsch:
Idea: Efficient Evaluation of Access Control Constraints. ESSoS 2010: 157-165 - [c23]Michael Altenhofen, Achim D. Brucker:
Practical Issues with Formal Specifications - Lessons Learned from an Industrial Case Study. FMICS 2010: 17-32 - [c22]Achim D. Brucker, Lukas Brügger, Paul J. Kearney, Burkhart Wolff:
Verified Firewall Policy Transformations for Test Case Generation. ICST 2010: 345-354 - [c21]Achim D. Brucker, Matthias P. Krieger, Delphine Longuet, Burkhart Wolff:
A Specification-Based Test Case Generation Method for UML/OCL. MoDELS (Workshops) 2010: 334-348 - [c20]Achim D. Brucker, Helmut Petritsch, Stefan G. Weber:
Attribute-Based Encryption with Break-Glass. WISTP 2010: 237-244
2000 – 2009
- 2009
- [j7]Achim D. Brucker, Burkhart Wolff:
Semantics, calculi, and analysis for object-oriented specifications. Acta Informatica 46(4): 255-284 (2009) - [c19]Mathias Kohler, Achim D. Brucker, Andreas Schaad:
ProActive Caching: Generating Caching Heuristics for Business Process Environments. CSE (3) 2009: 297-304 - [c18]Achim D. Brucker, Burkhart Wolff:
hol-TestGen. FASE 2009: 417-420 - [c17]Achim D. Brucker, Sebastian Mödersheim:
Integrating Automated and Interactive Protocol Verification. Formal Aspects in Security and Trust 2009: 248-262 - [c16]Achim D. Brucker, Matthias P. Krieger, Burkhart Wolff:
Extending OCL with Null-References. MoDELS (Workshops) 2009: 261-275 - [c15]Achim D. Brucker, Helmut Petritsch, Andreas Schaad:
Delegation Assistance. POLICY 2009: 84-91 - [c14]Achim D. Brucker, Helmut Petritsch:
Extending access control models with break-glass. SACMAT 2009: 197-206 - 2008
- [j6]Achim D. Brucker, Burkhart Wolff:
An Extensible Encoding of Object-oriented Data Models in hol. J. Autom. Reason. 41(3-4): 219-249 (2008) - [c13]Achim D. Brucker, Burkhart Wolff:
Extensible Universes for Object-Oriented Data Models. ECOOP 2008: 438-462 - [c12]Achim D. Brucker, Burkhart Wolff:
HOL-OCL: A Formal Proof Environment for UML/OCL. FASE 2008: 97-100 - [c11]Achim D. Brucker, Lukas Brügger, Burkhart Wolff:
Model-Based Firewall Conformance Testing. TestCom/FATES 2008: 103-118 - [c10]Achim D. Brucker, Lukas Brügger, Burkhart Wolff:
Verifying Test-Hypotheses: An Experiment in Test and Proof. MBT@ETAPS 2008: 15-27 - 2007
- [b1]Achim D. Brucker:
An interactive proof environment for object-oriented specifications. ETH Zurich, Zürich, Switzerland, 2007 - [c9]Achim D. Brucker, Burkhart Wolff:
Test-Sequence Generation with Hol-TestGen with an Application to Firewall Testing. TAP 2007: 149-168 - 2006
- [j5]Achim D. Brucker, Jürgen Doser, Burkhart Wolff:
An MDA Framework Supporting OCL. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 5 (2006) - [j4]Achim D. Brucker, Jürgen Doser, Burkhart Wolff:
Semantic Issues of OCL: Past, Present, and Future. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 5 (2006) - [j3]Michael Wahler, Jana Koehler, Achim D. Brucker:
Model-Driven Constraint Engineering. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 5 (2006) - [c8]Achim D. Brucker, Jürgen Doser, Burkhart Wolff:
A Model Transformation Semantics and Analysis Methodology for SecureUML. MoDELS 2006: 306-320 - 2005
- [j2]Achim D. Brucker, Burkhart Wolff:
A verification approach to applied system security. Int. J. Softw. Tools Technol. Transf. 7(3): 233-247 (2005) - [c7]Achim D. Brucker, Burkhart Wolff:
Interactive Testing with HOL-TestGen. FATES 2005: 87-102 - 2004
- [c6]Achim D. Brucker, Burkhart Wolff:
Symbolic Test Case Generation for Primitive Recursive Functions. FATES 2004: 16-32 - 2003
- [j1]Achim D. Brucker, Frank Rittinger, Burkhart Wolff:
HOL-Z 2.0: A Proof Environment for Z-Specifications. J. Univers. Comput. Sci. 9(2): 152-172 (2003) - [c5]Achim D. Brucker, Burkhart Wolff:
A Case Study of a Formalized Security Architecture. FMICS 2003: 24-40 - 2002
- [c4]