Author of the publication

Automated verification of role-based access control security models recovered from dynamic web applications.

, , and . WSE, page 1-10. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SL Parses The LR Languages., and . Comput. Lang., 13 (2): 65-74 (1988)Automated conversion of table-based websites to structured stylesheets using table recognition and clone detection., , and . CASCON, page 12-26. IBM, (2007)An empirical framework for comparing effectiveness of testing and property-based formal analysis., , and . PASTE, page 2-5. ACM, (2005)A survey of self-management in dynamic software architecture specifications., , , and . WOSS, page 28-33. ACM, (2004)A Survey of Analysis Models and Methods in Website Verification and Testing., , and . ICWE, volume 4607 of Lecture Notes in Computer Science, page 306-311. Springer, (2007)A Survey of Model Comparison Approaches and Applications., and . MODELSWARD, page 265-277. SciTePress, (2013)TuringTool: A User Interface to Aid in the Software Maintenance Task., , and . IEEE Trans. Software Eng., 16 (3): 294-301 (1990)Are scripting languages really different?, and . Proceedings of the 4th International Workshop on Software Clones, page 17?24. (2010)Synthesis of state machine models., , and . MoDELS, page 274-284. ACM, (2020)Excerpts from the TXL Cookbook.. GTTSE, volume 6491 of Lecture Notes in Computer Science, page 27-91. Springer, (2009)