Found 16 results
Filters: Author is Yijun Yu [Clear All Filters]
The case for Zero Trust Digital Forensics. Forensic Science International: Digital Investigation. 40:301352.
.
2022. Automated analysis of security requirements through risk-based argumentation. Journal of Systems and Software. 106
.
2016. Protecting Privacy in the Cloud: Current Practices, Future Directions. IEEE Computer. 49(2)
.
2016. Managing Security Control Assumptions Using Causal Traceability. 2015 IEEE/ACM 8th International Symposium on Software and Systems Traceability.
.
2015. The role of environmental assumptions in failures of DNA nano systems. Proceedings of Workshop on Complex Faults and Failures in Large Software Systems (COUFLESS 2015) co-located with ICSE 2015.
.
2015. ?Why can?t I do that??: tracing adaptive security decisions. EAI Endorsed Transactions on Self-Adaptive Systems. 1
.
2015. Requirements-Driven Adaptive Digital Forensics. 21th International Conference on Requirements Engineering (RE 2013), Posters & Demos Track.21th International Conference on Requirements Engineering (RE 2013), Posters & Demos Track..
.
2013. Resolving Vulnerability Identification Errors using Security Requirements on Business Process Models. Information Management and Computer Security. 21(3)
.
2013. Specifying Software Features for Composition: A Tool-Supported Approach. Computer Networks. 57(12)
.
2013. Analysing Monitoring and Switching Problems for Adaptive Systems. Journal of Systems and Software. 85
.
2012. Privacy Arguments: Analysing Selective Disclosure Requirements for Mobile Applications. 20th IEEE International Requirements Engineering Conference (RE).
.
2012. PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications. Proceedings of 12th IEEE International Symposium on Policies for Distributed Systems and Networks (Policy 2011).
.
2011. Problem Analysis of Traditional IT-Security Risk Assessment Methods – An Experience Report from the Insurance and Auditing Domain. Future Challenges in Security and Privacy for Academia and IndustryFuture Challenges in Security and Privacy for Academia and Industry. 354
.
2011. Risk and Arguments: A Risk-based Argumentation Method for Practical Security. 19th IEEE International Requirements Engineering Conference (RE’11)19th IEEE International Requirements Engineering Conference (RE’11).
.
2011. Specifying and Detecting Meaningful Changes in Programs. Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011)Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011).
.
2011.