Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the notion of redundancy in access control policies., , , and . SACMAT, page 161-172. ACM, (2013)Evolutionary Testing of PHP Web Applications with WETT., , , and . SSBSE, volume 7515 of Lecture Notes in Computer Science, page 285-291. Springer, (2012)AURORA: AUtomatic RObustness coveRage Analysis Tool., , and . ICST, page 463-470. IEEE Computer Society, (2013)Model-Driven Testing for Web Applications Using Abstract State Machines., , , , and . ICWE Workshops, volume 7703 of Lecture Notes in Computer Science, page 71-78. Springer, (2012)A Model-driven Approach for Securing Software Architectures., , , , and . SECRYPT, page 595-602. SciTePress, (2013)Extending Coverage Criteria by Evaluating Their Robustness to Code Structure Changes., , and . ICTSS, volume 7641 of Lecture Notes in Computer Science, page 168-183. Springer, (2012)