Author of the publication

Checking threat modeling data flow diagrams for implementation conformance and security.

, , and . ASE, page 393-396. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tool support for statically checking the structural conformance of an object-oriented system to its runtime architecture., and . OOPSLA Companion, page 741-742. ACM, (2008)Ownership Object Graphs with Dataflow Edges., and . WCRE, page 267-276. IEEE Computer Society, (2012)A case study in re-engineering to enforce architectural control flow and data sharing., , and . J. Syst. Softw., 80 (2): 240-264 (2007)Bringing ownership domains to mainstream Java., and . OOPSLA Companion, page 702-703. ACM, (2006)Finding the missing eclipse perspective: the runtime perspective., and . SPLASH (Companion Volume), page 23-24. ACM, (2013)Metrics to identify where object-oriented program comprehension benefits from the runtime structure., , and . WETSoM, page 42-48. IEEE Computer Society, (2013)A Case Study in Incremental Architecture-Based Re-engineering of a Legacy Application., and . WICSA, page 159-168. IEEE Computer Society, (2005)Enabling the Refinement of a Software Architecture into a Design., and . UML, volume 1723 of Lecture Notes in Computer Science, page 17-31. Springer, (1999)Comparative Evaluation of Architectural and Code-Level Approaches for Finding Security Vulnerabilities., , and . SIW@CCS, page 27-34. ACM, (2014)Developer refinement of runtime architectural structure., , and . SHARK@ICSE, page 80-87. ACM, (2010)