pdfreaders.org

Publications sorted by year

Achim Brucker published over 55 peer-reviewed publications in international journals as well as conference and workshop proceedings. Moreover, he published several invited articles, technical reports, and articles in popular magazines. His publications reflect his research interests: formal methods (), software engineering (), information security (), and hardware design (). His Erdős Number is at most 4: Achim D. Brucker → David Basin → Matt Kaufmann → Michael Makkai → Paul Erdős. Most of his publications are also listed at: DBLP, PubZone, ACM DL, Google Scholar, CiteSeer, Arnetminer, The Collection of Computer Science Bibliographies, and Microsoft Academic Search.

This publication list is grouped by research topics. This list is also available grouped by topics as well as grouped by publication type.

2014

[89] Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Brett Lempereur, and Qi Shi. Security Policy Monitoring of Composite Services. In Secure and Trustworthy Service Composition: The Aniketos Approach. Lecture Notes in Computer Science: State of the Art Surveys (8900), pages 192-202, Springer-Verlag, 2014.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-13518-2_13) (Share article on LinkedIn. Share article on CiteULike.)
[88] Ruediger Bachmann and Achim D. Brucker. Developing Secure Software: A Holistic Approach to Security Testing. In Datenschutz und Datensicherheit (DuD), 38 (4), pages 257-261, 2014.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/s11623-014-0102-0) (Share article on LinkedIn. Share article on CiteULike.)
[87] Achim D. Brucker. Using SecureBPMN for Modelling Security-Aware Service Compositions. In Secure and Trustworthy Service Composition: The Aniketos Approach. Lecture Notes in Computer Science: State of the Art Surveys (8900), pages 110-120, Springer-Verlag, 2014.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-13518-2_8) (Share article on LinkedIn. Share article on CiteULike.)
[86] Achim D. Brucker, Lukas Brügger, and Burkhart Wolff. Formal Firewall Conformance Testing: An Application of Test and Proof Techniques. In Software Testing, Verification & Reliability (STVR), 2014.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1002/stvr.1544) (Share article on LinkedIn. Share article on CiteULike.)
[85] Achim D. Brucker, Tony Clark, Carolina Dania, Geri Georg, Martin Gogolla, Frédéric Jouault, Ernest Teniente,, and Burkhart Wolff. Panel Discussion: Proposals for Improving OCL. In Proceedings of the MODELS 2014 OCL Workshop (OCL 2014). CEUR Workshop Proceedings, 1285, pages 83-99, CEUR-WS.org, 2014.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[84] Achim D. Brucker, Luca Compagna, and Pierre Guilleminot. Compliance Validation of Secure Service Compositions. In Secure and Trustworthy Service Composition: The Aniketos Approach. Lecture Notes in Computer Science: State of the Art Surveys (8900), pages 136-149, Springer-Verlag, 2014.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-13518-2_10) (Share article on LinkedIn. Share article on CiteULike.)
[83] Achim D. Brucker and Jacques Julliand. Editorial for the special issue of STVR on tests and proofs volume 1: tests and proofs in model-based testing. In Software Testing, Verification & Reliability (STVR), 24 (7), pages 497-498, 2014.
(BibTeX) (Endnote) (RIS) (Word) (doi:10.1002/stvr.1560) (Share article on LinkedIn. Share article on CiteULike.)
[82] Achim D. Brucker and Jacques Julliand. Editorial for the special issue of STVR on tests and proofs volume 2: tests and proofs for improving the generation time and quality of test data suites. In Software Testing, Verification & Reliability (STVR), 24 (8), pages 591-592, 2014.
(BibTeX) (Endnote) (RIS) (Word) (doi:10.1002/stvr.1558) (Share article on LinkedIn. Share article on CiteULike.)
[81] Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, and Bo Zhou. Aniketos Service Composition Framework: Analysing and Ranking of Secure Services. In Secure and Trustworthy Service Composition: The Aniketos Approach. Lecture Notes in Computer Science: State of the Art Surveys (8900), pages 121-135, Springer-Verlag, 2014.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-13518-2_9) (Share article on LinkedIn. Share article on CiteULike.)
[80] Achim D. Brucker and Uwe Sodan. Deploying Static Application Security Testing on a Large Scale. In GI Sicherheit 2014. Lecture Notes in Informatics, 228, pages 91-101, GI, 2014.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[79] Achim D. Brucker, Frédéric Tuong, and Burkhart Wolff. Featherweight OCL: A Proposal for a Machine-Checked Formal Semantics for OCL 2.5. In Archive of Formal Proofs, 2014. http://afp.sf.net/entries/Featherweight_OCL.shtml, Formal proof development
Categories: ,
(abstract) (full text as PDF file) (Outline) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[78] Achim D. Brucker and Lukas Brüggerand Burkhart Wolff. The Unified Policy Framework (UPF). In Archive of Formal Proofs, 2014. http://afp.sf.net/entries/UPF.shtml, Formal proof development
Categories: ,
(abstract) (full text as PDF file) (Outline) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[77] Per Haakon Meland, Erkuden Rios, Vasilis Tountopoulos, and Achim D. Brucker. The Aniketos Platform. In Secure and Trustworthy Service Composition: The Aniketos Approach. Lecture Notes in Computer Science: State of the Art Surveys (8900), Springer-Verlag, 2014.
Categories: ,
(full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-13518-2_4) (Share article on LinkedIn. Share article on CiteULike.)
[76] Karsten Sohr, Steffen Bartsch, Melanie Volkamer, Bernhard J. Berger, Eric Bodden, Achim D. Brucker, Sönke Maseberg, Mehmet Kus, and Jens Heider. Zertifizierte Datensicherheit für mobile Anwendungen. In GI Sicherheit 2014. Lecture Notes in Informatics, 228, pages 283-291, GI, 2014.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[75] Achim D. Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Haakon Meland, and Erkuden Rios Secure and Trustworthy Service Composition: The Aniketos Approach. Springer-Verlag, 2014.
Categories: ,
(BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-13518-2) (Share article on LinkedIn. Share article on CiteULike.)
[74] Achim D. Brucker, Carolina Dania, Geri Georg, and Martin Gogolla (eds.). 14th International Workshop on OCL and Textual Modeling, OCL 2014, Valencia, Spain, September 30, 2014. Proceedings. CEUR-WS.org, 2014.
Categories: ,
(BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)

2013

[73] Achim D. Brucker. Integrating Security Aspects into Business Process Models. In it - Information Technology, 55 (6), pages 239-246, 2013. Special Issue on "Security in Business Processes."
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1524/itit.2013.2004) (Share article on LinkedIn. Share article on CiteULike.)
[72] Achim D. Brucker, Lukas Brügger, and Burkhart Wolff. HOL-TestGen/FW: An Environment for Specification-based Firewall Conformance Testing. In International Colloquium on Theoretical Aspects of Computing (ICTAC). Lecture Notes in Computer Science (8049), pages 112-121, Springer-Verlag, 2013.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-39718-9_7) (Share article on LinkedIn. Share article on CiteULike.)
[71] Achim D. Brucker, Dan Chiorean, Tony Clark, Birgit Demuth, Martin Gogolla, Dimitri Plotnikov, Bernhard Rumpe, Edward D. Willink, and Burkhart Wolff. Report on the Aachen OCL Meeting. In Proceedings of the MODELS 2013 OCL Workshop (OCL 2013). CEUR Workshop Proceedings, 1092, pages 103-111, CEUR-WS.org, 2013.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[70] Achim D. Brucker, Abderrahmane Feliachi, Yakoub Nemouchi, and Burkhart Wolff. Test Program Generation for a Microprocessor: A Case-Study. In TAP 2013: Tests And Proofs. Lecture Notes in Computer Science (7942), pages 76-95, Springer-Verlag, 2013.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-38916-0_5) (Share article on LinkedIn. Share article on CiteULike.)
[69] Achim D. Brucker, Delphine Longuet, Frédéric Tuong, and Burkhart Wolff. On the Semantics of Object-oriented Data Structures and Path Expressions. In Proceedings of the MODELS 2013 OCL Workshop (OCL 2013). CEUR Workshop Proceedings, 1092, pages 23-32, CEUR-WS.org, 2013. An extended version of this paper is available as LRI Technical Report 1565.
Categories: ,
(abstract) (full text as PDF file) (Extended Version) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[68] Achim D. Brucker, Delphine Longuet, Frédéric Tuong, and Burkhart Wolff. On the Semantics of Object-oriented Data Structures and Path Expressions (Extended Version). Laboratoire en Recherche en Informatique (LRI), Université Paris-Sud 11, France, Technical Report 1565, 2013.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[67] Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, and Bo Zhou. A Framework for Secure Service Composition. In International Conference on Information Privacy, Security, Risk and Trust (PASSAT), pages 647-652, IEEE Computer Society, 2013.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/SocialCom.2013.97) (Share article on LinkedIn. Share article on CiteULike.)
[66] Achim D. Brucker and Burkhart Wolff. On Theorem Prover-based Testing. In Formal Aspects of Computing, 25 (5), pages 683-721, 2013.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/s00165-012-0222-y) (Share article on LinkedIn. Share article on CiteULike.)
[65] Luca Compagna, Pierre Guilleminot, and Achim D. Brucker. Business Process Compliance via Security Validation as a Service. In IEEE Sixth International Conference on Software Testing, Verification and Validation (ICST). , pages 455-462, IEEE Computer Society, 2013.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)

2012

[64] Achim D. Brucker, Lukas Brügger, Matthias P. Krieger, and Burkhart Wolff. HOL-TestGen 1.7.0 User Guide. Laboratoire en Recherche en Informatique (LRI), Université Paris-Sud 11, France, Technical Report 1551, 2012.
Categories: ,
(full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[63] Achim D. Brucker and Isabelle Hang. Secure and Compliant Implementation of Business Process-driven Systems. In Joint Workshop on Security in Business Processes (SBP). Lecture Notes in Business Information Processing (LNBIP), 132, pages 662-674, Springer-Verlag, 2012.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-36285-9_66) (Share article on LinkedIn. Share article on CiteULike.)
[62] Achim D. Brucker, Isabelle Hang, Gero Lückemeyer, and Raj Ruparel. SecureBPMN: Modeling and Enforcing Access Control Requirements in Business Processes. In ACM symposium on access control models and technologies (SACMAT). , pages 123-126, ACM Press, 2012.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1145/2295136.2295160) (ACM) (Share article on LinkedIn. Share article on CiteULike.)
[61] Achim D. Brucker and Burkhart Wolff. Featherweight OCL: A study for the consistent semantics of OCL 2.3 in HOL. In Workshop on OCL and Textual Modelling (OCL 2012). , pages 19-24, 2012. The semantics for the Boolean operators proposed in this paper was adopted by the OCL 2.4 standard.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1145/2428516.2428520) (Share article on LinkedIn. Share article on CiteULike.)
[60] Florian Marienfeld, Edzard Höfig, Michele Bezzi, Matthias Flügge, Jonas Pattberg, Gabriel Serme, Achim D. Brucker, Philip Robinson, Stephen Dawson, and Wolfgang Theilmann. Service levels, Security, and Trust. In Handbook of Service Description: USDL and its Methods, pages 295-326, Springer-Verlag, 2012.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-1-4614-1864-1_12) (Share article on LinkedIn. Share article on CiteULike.)
[59] Ganna Monakova, Achim D. Brucker, and Andreas Schaad. Security and Safety of Assets in Business Processes. In ACM Symposium on Applied Computing (SAC). , pages 1667-1673, ACM Press, 2012.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1145/2245276.2232045) (ACM) (Share article on LinkedIn. Share article on CiteULike.)
[58] Ganna Monakova, Cristina Severin, Achim D. Brucker, Ulrich Flegel, and Andreas Schaad. Monitoring Security and Safety of Assets in Supply Chains. In Future Security. Communications in Computer and Information Science, 318, pages 9-20, Springer-Verlag, 2012.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-33161-9_3) (Share article on LinkedIn. Share article on CiteULike.)
[57] Achim D. Brucker and Jacques Julliand (eds.). Tests and Proofs - 6th International Conference, TAP 2012, Praque, Czech Republic, Mai 31 - June 1, 2012. Proceedings. Springer-Verlag, 2012.
Categories: ,
(BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-30473-6) (Share article on LinkedIn. Share article on CiteULike.)

2011

[56] Stephan Braune, Achim D. Brucker, Gerald Kleser, Keqin Li, Theo Dirk Meijler, Heiko Paulheim, and Florian Probst. A Service-Oriented Architecture for Emergency Management Systems. In Software Engineering 2011 - Workshopband. Lecture Notes in Informatics, P-184, pages 225-232, GI, 2011. Innovative Systeme zur Unterstützung der zivilen Sicherheit: Architekturen und Gestaltungskonzepte.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[55] Achim D. Brucker, Lukas Brügger, Paul Kearney, and Burkhart Wolff. An Approach to Modular and Testable Security Models of Real-world Health-care Applications. In ACM symposium on access control models and technologies (SACMAT). , pages 133-142, ACM Press, 2011.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1145/1998441.1998461) (ACM) (Share article on LinkedIn. Share article on CiteULike.)
[54] Achim D. Brucker and Helmut Petritsch. A Framework for Managing and Analyzing Changes of Security Policies. In IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY). , pages 105-112, IEEE Computer Society, 2011.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/POLICY.2011.47) (Share article on LinkedIn. Share article on CiteULike.)
[53] Matthias P. Krieger and Achim D. Brucker. Extending OCL Operation Contracts with Objective Functions. In Electronic Communications of the EASST, 44, 2011.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (ECEASST) (Share article on LinkedIn. Share article on CiteULike.)

2010

[52] Michael Altenhofen and Achim D. Brucker. Practical Issues with Formal Specifications: Lessons Learned from an Industrial Case Study. In International Workshop on Formal Methods for Industrial Critical Systems (FMICS). Lecture Notes in Computer Science (6371), pages 17-32, Springer-Verlag, 2010.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-15898-8_2) (Share article on LinkedIn. Share article on CiteULike.)
[51] Achim D. Brucker, Lukas Brügger, Matthias P. Krieger, and Burkhart Wolff. HOL-TestGen 1.5.0 User Guide. ETH Zurich, Technical Report 670, 2010.
Categories: ,
(full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[50] Achim D. Brucker, Lukas Brügger, Paul Kearney, and Burkhart Wolff. Verified Firewall Policy Transformations for Test-Case Generation. In Third International Conference on Software Testing, Verification, and Validation (ICST), pages 345-354, IEEE Computer Society, 2010.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/ICST.2010.50) (Share article on LinkedIn. Share article on CiteULike.)
[49] Achim D. Brucker and Dieter Hutter. Information Flow in Disaster Management Systems. In International Conference on Availability, Reliability and Security (ARES), pages 156-163, IEEE Computer Society, 2010.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/ARES.2010.107) (Share article on LinkedIn. Share article on CiteULike.)
[48] Achim D. Brucker, Matthias P. Krieger, Delphine Longuet, and Burkhart Wolff. A Specification-based Test Case Generation Method for UML/OCL. In MoDELS Workshops. Lecture Notes in Computer Science (6627), pages 334-348, Springer-Verlag, 2010. Selected best papers from all satellite events of the MoDELS 2010 conference. Workshop on OCL and Textual Modelling.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-21210-9_33) (Share article on LinkedIn. Share article on CiteULike.)
[47] Achim D. Brucker and Helmut Petritsch. Idea: Efficient Evaluation of Access Control Constraints. In International Symposium on Engineering Secure Software and Systems (ESSoS). Lecture Notes in Computer Science (5965), pages 157-165, Springer-Verlag, 2010.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-11747-3_12) (Share article on LinkedIn. Share article on CiteULike.)
[46] Achim D. Brucker, Helmut Petritsch, and Stefan G. Weber. Attribute-based Encryption with Break-glass. In Workshop In Information Security Theory And Practice (WISTP). Lecture Notes in Computer Science (6033), pages 237-244, Springer-Verlag, 2010.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-12368-9_18) (Share article on LinkedIn. Share article on CiteULike.)
[45] Achim D. Brucker, Andreas Schaad, and Christian Wolter. Prozessmodellierung: Einbinden von Sicherheitsregeln in Geschäftsprozesse. In iX special - Sicher im Netz, 3, pages 152-155, 2010.
Categories: ,
(BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[44] Mathias Kohler and Achim D. Brucker. Caching Strategies: An Empirical Evaluation. In International Workshop on Security Measurements and Metrics (MetriSec), pages 1-8, ACM Press, 2010.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1145/1853919.1853930) (ACM) (Share article on LinkedIn. Share article on CiteULike.)
[43] Florian Probst, Heiko Paulheim, Achim D. Brucker, and Stefan Schulte. SoKNOS - Informationsdienste für das Katastrophenmanagement. In VDE-Kongress 2010 - E-Mobility. , 2010.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[42] Michael Wahler, David Basin, Achim D. Brucker, and Jana Koehler. Efficient Analysis of Pattern-Based Constraint Specifications. In Software and Systems Modeling, 9 (2), pages 225-255, 2010.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/s10270-009-0123-6) (Share article on LinkedIn. Share article on CiteULike.)

2009

[41] Achim D. Brucker, Matthias P. Krieger, and Burkhart Wolff. Extending OCL with Null-References. In Models in Software Engineering. Lecture Notes in Computer Science (6002), pages 261-275, Springer-Verlag, 2009. Selected best papers from all satellite events of the MoDELS 2009 conference.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-12261-3_25) (Share article on LinkedIn. Share article on CiteULike.)
[40] Achim D. Brucker and Sebastian A. Mödersheim. Integrating Automated and Interactive Protocol Verification. In Workshop on Formal Aspects in Security and Trust (FAST 2009). Lecture Notes in Computer Science (5983), pages 248-262, Springer-Verlag, 2009. An extended version of this paper is available as IBM Research Technical Report, RZ3750.
Categories: ,
(abstract) (full text as PDF file) (Extended Version) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-12459-4_18) (Share article on LinkedIn. Share article on CiteULike.)
[39] Achim D. Brucker and Sebastian A. Mödersheim. Integrating Automated and Interactive Protocol Verification (Extended Version). IBM Research Zurich, Technical Report RZ3750, 2009.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[38] Achim D. Brucker and Helmut Petritsch. Extending Access Control Models with Break-glass. In ACM symposium on access control models and technologies (SACMAT), pages 197-206, ACM Press, 2009.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1145/1542207.1542239) (ACM) (Share article on LinkedIn. Share article on CiteULike.)
[37] Achim D. Brucker, Helmut Petritsch, and Andreas Schaad. Delegation Assistance. In IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY). , pages 84-91, IEEE Computer Society, 2009.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/POLICY.2009.35) (Share article on LinkedIn. Share article on CiteULike.)
[36] Achim D. Brucker, Andreas Schaad, and Christian Wolter. Prozessmodellierung: Einbinden von Sicherheitsregeln in Geschäftsprozesse. In iX, 3, pages 118-121, 2009. An updated version of this article was published in the “iX special - Sicher im Netz” (October 2010).
Categories: ,
(BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[35] Achim D. Brucker and Burkhart Wolff. Semantics, Calculi, and Analysis for Object-oriented Specifications. In Acta Informatica, 46 (4), pages 255-284, 2009.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/s00236-009-0093-8) (Share article on LinkedIn. Share article on CiteULike.)
[34] Achim D. Brucker and Burkhart Wolff. HOL-TestGen: An Interactive Test-case Generation Framework. In Fundamental Approaches to Software Engineering (FASE09). Lecture Notes in Computer Science (5503), pages 417-420, Springer-Verlag, 2009.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-00593-0_28) (Share article on LinkedIn. Share article on CiteULike.)
[33] Mathias Kohler, Achim D. Brucker, and Andreas Schaad. ProActive Caching: Generating Caching Heuristics for Business Process Environments. In International Conference on Computational Science and Engineering (CSE), pages 207-304, IEEE Computer Society, 2009.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/CSE.2009.177) (Share article on LinkedIn. Share article on CiteULike.)

2008

[32] Achim D. Brucker, Lukas Brügger, and Burkhart Wolff. Verifying Test-Hypotheses: An Experiment in Test and Proof. In Electronic Notes in Theoretical Computer Science, 220 (1), pages 15-27, 2008. Proceedings of the Fourth Workshop on Model Based Testing (MBT 2008)
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1016/j.entcs.2008.11.003) (Share article on LinkedIn. Share article on CiteULike.)
[31] Achim D. Brucker, Lukas Brügger, and Burkhart Wolff. Model-based Firewall Conformance Testing. In Testcom/FATES 2008. Lecture Notes in Computer Science (5047), pages 103-118, Springer-Verlag, 2008.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-540-68524-1_9) (Share article on LinkedIn. Share article on CiteULike.)
[30] Achim D. Brucker and Burkhart Wolff. HOL-OCL - A Formal Proof Environment for UML/OCL. In Fundamental Approaches to Software Engineering (FASE08). Lecture Notes in Computer Science (4961), pages 97-100, Springer-Verlag, 2008.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-540-78743-3_8) (Share article on LinkedIn. Share article on CiteULike.)
[29] Achim D. Brucker and Burkhart Wolff. Extensible Universes for Object-oriented Data Models. In ECOOP 2008 - Object-Oriented Programming. Lecture Notes in Computer Science (5142), pages 438-462, Springer-Verlag, 2008.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-540-70592-5_19) (Share article on LinkedIn. Share article on CiteULike.)
[28] Achim D. Brucker and Burkhart Wolff. An Extensible Encoding of Object-oriented Data Models in HOL. In Journal of Automated Reasoning, 41, pages 219-249, 2008.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/s10817-008-9108-3) (Share article on LinkedIn. Share article on CiteULike.)

2007

[27] Achim D. Brucker. An Interactive Proof Environment for Object-oriented Specifications. ETH Zurich,2007. ETH Dissertation No. 17097.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[26] Achim D. Brucker and Jürgen Doser. Metamodel-based UML Notations for Domain-specific Languages. In 4th International Workshop on Software Language Engineering (ATEM 2007), 2007.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[25] Achim D. Brucker and Burkhart Wolff. Test-Sequence Generation with HOL-TestGen - With an Application to Firewall Testing. In TAP 2007: Tests And Proofs. Lecture Notes in Computer Science (4454), pages 149-168, Springer-Verlag, 2007.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-540-73770-4_9) (Share article on LinkedIn. Share article on CiteULike.)

2006

[24] Achim D. Brucker, Jürgen Doser, and Burkhart Wolff. A Model Transformation Semantics and Analysis Methodology for SecureUML. In MoDELS 2006: Model Driven Engineering Languages and Systems. Lecture Notes in Computer Science (4199), pages 306-320, Springer-Verlag, 2006. An extended version of this paper is available as ETH Technical Report, no. 524.
Categories: , ,
(abstract) (full text as PDF file) (Extended Version) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/11880240_22) (Share article on LinkedIn. Share article on CiteULike.)
[23] Achim D. Brucker, Jürgen Doser, and Burkhart Wolff. A Model Transformation Semantics and Analysis Methodology for SecureUML. ETH Zurich, Technical Report 524, 2006.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[22] Achim D. Brucker, Jürgen Doser, and Burkhart Wolff. An MDA Framework Supporting OCL. In Electronic Communications of the EASST, 5, 2006.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (ECEASST) (Share article on LinkedIn. Share article on CiteULike.)
[21] Achim D. Brucker, Jürgen Doser, and Burkhart Wolff. Semantic Issues of OCL: Past, Present, and Future. In Electronic Communications of the EASST, 5, 2006.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (ECEASST) (Share article on LinkedIn. Share article on CiteULike.)
[20] Achim D. Brucker and Burkhart Wolff. A Package for Extensible Object-Oriented Data Models with an Application to IMP++. In International Workshop on Software Verification and Validation (SVV 2006), 2006.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[19] Achim D. Brucker and Burkhart Wolff. The HOL-OCL Book. ETH Zurich, Technical Report 525, 2006.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[18] Michael Wahler, Jana Koehler, and Achim D. Brucker. Model-Driven Constraint Engineering. In Electronic Communications of the EASST, 5, 2006.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (ECEASST) (Share article on LinkedIn. Share article on CiteULike.)

2005

[17] Achim D. Brucker and Burkhart Wolff. A Verification Approach for Applied System Security. In International Journal on Software Tools for Technology (STTT), 7 (3), pages 233-247, 2005.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/s10009-004-0176-3) (Share article on LinkedIn. Share article on CiteULike.)
[16] Achim D. Brucker and Burkhart Wolff. HOL-TestGen 1.0.0 User Guide. ETH Zurich, Technical Report 482, 2005.
Categories: ,
(full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[15] Achim D. Brucker and Burkhart Wolff. Interactive Testing using HOL-TestGen. In Formal Approaches to Testing of Software. Lecture Notes in Computer Science (3997), Springer-Verlag, 2005.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/11759744_7) (Share article on LinkedIn. Share article on CiteULike.)

2004

[14] Achim D. Brucker and Burkhart Wolff. Symbolic Test Case Generation for Primitive Recursive Functions. ETH Zurich, Technical Report 449, 2004.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[13] Achim D. Brucker and Burkhart Wolff. Symbolic Test Case Generation for Primitive Recursive Functions. In Formal Approaches to Testing of Software. Lecture Notes in Computer Science (3395), pages 16-32, Springer-Verlag, 2004.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/b106767) (Share article on LinkedIn. Share article on CiteULike.)

2003

[12] Achim D. Brucker, Frank Rittinger, and Burkhart Wolff. HOL-Z 2.0: A Proof Environment for Z-Specifications. In Journal of Universal Computer Science, 9 (2), pages 152-172, 2003.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.3217/jucs-009-02-0152) (J.UCS) (Share article on LinkedIn. Share article on CiteULike.)
[11] Achim D. Brucker and Burkhart Wolff. A Case Study of a Formalized Security Architecture. In Electronic Notes in Theoretical Computer Science, 80, pages 24-40, 2003. Proceedings of the Eighth International Workshop on Formal Methods for Industrial Critical Systems (FMICS'03)
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1016/S1571-0661(04)80807-7) (Share article on LinkedIn. Share article on CiteULike.)
[10] Achim D. Brucker and Burkhart Wolff. Using Theory Morphisms for Implementing Formal Methods Tools. In Types for Proof and Programs. Lecture Notes in Computer Science (2646), pages 59-77, Springer-Verlag, 2003.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/3-540-39185-1_4) (Share article on LinkedIn. Share article on CiteULike.)

2002

[9] Achim D. Brucker, Stefan Friedrich, Frank Rittinger, and Burkhart Wolff. HOL-Z 2.0: A Proof Environment for Z-Specifications. In FM-TOOLS 2002, pages 33-38, 2002. Available as Technical Report, University Augsburg, number 2002-11.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[8] Achim D. Brucker, Frank Rittinger, and Burkhart Wolff. The CVS-Server Case Study: A Formalized Security Architecture. In FM-TOOLS 2002, pages 47-52, 2002. Available as Technical Report, University Augsburg, number 2002-11.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[7] Achim D. Brucker, Frank Rittinger, and Burkhart Wolff. A CVS-Server Security Architecture - Concepts and Formal Analysis. Albert-Ludwigs-Universität Freiburg, Technical Report 182, 2002.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[6] Achim D. Brucker and Burkhart Wolff. HOL-OCL: Experiences, Consequences and Design Choices. In UML 2002: Model Engineering, Concepts and Tools. Lecture Notes in Computer Science (2460), pages 196-211, Springer-Verlag, 2002.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/3-540-45800-X_17) (Share article on LinkedIn. Share article on CiteULike.)
[5] Achim D. Brucker and Burkhart Wolff. A Proposal for a Formal OCL Semantics in Isabelle/HOL. In Theorem Proving in Higher Order Logics (TPHOLs). Lecture Notes in Computer Science (2410), pages 99-114, Springer-Verlag, 2002.
Categories: ,
(abstract) (full text as PDF file) (Extended Version) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/3-540-45685-6_8) (Share article on LinkedIn. Share article on CiteULike.)
[4] Achim D. Brucker and Burkhart Wolff. A Note on Design Decisions of a Formalization of the OCL. Albert-Ludwigs-Universität Freiburg, Technical Report 168, 2002.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)

2001

[3] Achim D. Brucker and Burkhart Wolff. Checking OCL Constraints in Distributed Systems Using J2EE/EJB. Albert-Ludwigs-Universität Freiburg, Technical Report 157, 2001.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[2] Achim D. Brucker and Burkhart Wolff. Testing Distributed Component Based Systems Using UML/OCL. In Informatik 2001. Tagungsband der GI/ÖCG Jahrestagung, 1 (157), pages 608-614, 2001.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)

2000

[1] Achim D. Brucker. Verifikation von Dividierern mit Word-Level-Decision-Diagrams. Diplomarbeit, Albert-Ludwigs-Universität Freiburg, 2000.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)

All citations in one file: brucker.bib (BibTeX), brucker.enw (Endnote), brucker.ris (RIS), brucker.word.xml (Word 2007)