pdfreaders.org

Publications grouped by type

Achim Brucker published over 65 peer-reviewed publications in international journals as well as conference and workshop proceedings. Moreover, he published several invited articles, technical reports, and articles in popular magazines. His publications reflect his research interests: formal methods (), software engineering (), information security (), and hardware design (). His Erdős Number is at most 4: Achim D. Brucker → David Basin → Matt Kaufmann → Michael Makkai → Paul Erdős. Most of his publications are also listed at: DBLP, ACM DL, Google Scholar, ORCID, Arnetminer, CSAuthors, The Collection of Computer Science Bibliographies, and Microsoft Academic Search.

This publication list is grouped by publications types. This list is also available sorted by year of publications as well as grouped by publication topic.

Articles in Journals

[14] Andreas V. Hess, Sebastian A. Mödersheim, and Achim D. Brucker. Stateful Protocol Composition in Isabelle/HOL. In ACM Transactions on Privacy and Security, 2023.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[13] Achim D. Brucker, Frééric Tuong, and Burkhart Wolff. Model Transformation as Conservative Theory-Transformation. In J. Object Technol., 2020.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[12] Stanislav Dashevskyi, Achim D. Brucker, and Fabio Massacci. A Screening Test for Disclosed Vulnerabilities in FOSS Components. In IEEE Trans. Software Eng., 45 (10), pages 945-966, 2019.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/TSE.2018.2816033) (Share article on LinkedIn. Share article on CiteULike.)
[11] Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Thar Baker, Qi Shi, and Brett Lempereur. Security Policy Monitoring of BPMN-based Service Compositions. In Journal of Software: Evolution and Process, 2018.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1002/smr.1944) (Share article on LinkedIn. Share article on CiteULike.)
[10] Achim D. Brucker, Bo Zhou, Francesco Malmignati, Qi Shi, and Madjid Merabti. Modelling, Validating, and Ranking of Secure Service Compositions. In Software: Practice and Expierence (SPE), 47, pages 1912-1943, 2017.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1002/spe.2513) (Share article on LinkedIn. Share article on CiteULike.)
[9] Lotfi ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, and Achim D. Brucker. Time for Addressing Software Security Issues: Prediction Models and Impacting Factors. In Data Science and Engineering (DSEJ), 2 (2), pages 107-124, 2017.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/s41019-016-0019-8) (Share article on LinkedIn. Share article on CiteULike.)
[8] Achim D. Brucker, Lukas Brügger, and Burkhart Wolff. Formal Firewall Conformance Testing: An Application of Test and Proof Techniques. In Software Testing, Verification & Reliability (STVR), 25 (1), pages 34-71, 2015.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1002/stvr.1544) (Share article on LinkedIn. Share article on CiteULike.)
[7] Achim D. Brucker. Integrating Security Aspects into Business Process Models. In it - Information Technology, 55 (6), pages 239-246, 2013. Special Issue on "Security in Business Processes."
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1524/itit.2013.2004) (Share article on LinkedIn. Share article on CiteULike.)
[6] Achim D. Brucker and Burkhart Wolff. On Theorem Prover-based Testing. In Formal Aspects of Computing (FAC), 25 (5), pages 683-721, 2013.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/s00165-012-0222-y) (Share article on LinkedIn. Share article on CiteULike.)
[5] Michael Wahler, David Basin, Achim D. Brucker, and Jana Koehler. Efficient Analysis of Pattern-Based Constraint Specifications. In Software and Systems Modeling, 9 (2), pages 225-255, 2010.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/s10270-009-0123-6) (Share article on LinkedIn. Share article on CiteULike.)
[4] Achim D. Brucker and Burkhart Wolff. Semantics, Calculi, and Analysis for Object-oriented Specifications. In Acta Informatica, 46 (4), pages 255-284, 2009.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/s00236-009-0093-8) (Share article on LinkedIn. Share article on CiteULike.)
[3] Achim D. Brucker and Burkhart Wolff. An Extensible Encoding of Object-oriented Data Models in HOL. In Journal of Automated Reasoning, 41, pages 219-249, 2008.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/s10817-008-9108-3) (Share article on LinkedIn. Share article on CiteULike.)
[2] Achim D. Brucker and Burkhart Wolff. A Verification Approach for Applied System Security. In International Journal on Software Tools for Technology (STTT), 7 (3), pages 233-247, 2005.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/s10009-004-0176-3) (Share article on LinkedIn. Share article on CiteULike.)
[1] Achim D. Brucker, Frank Rittinger, and Burkhart Wolff. HOL-Z 2.0: A Proof Environment for Z-Specifications. In Journal of Universal Computer Science, 9 (2), pages 152-172, 2003.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.3217/jucs-009-02-0152) (J.UCS) (Share article on LinkedIn. Share article on CiteULike.)

Articles in Conference Proceedings

[43] Achim D. Brucker and Amy Stell. Verifying Feedforward Neural Networks for Classification in Isabelle/HOL. In Formal Methods (FM 2023). Lecture Notes in Computer Science, Springer-Verlag, 2023.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[42] Diego Marmsoler and Achim D. Brucker. Conformance Testing of Formal Semantics using Grammar-based Fuzzing. In TAP 2022: Tests And Proofs. Lecture Notes in Computer Science, Springer-Verlag, 2022.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[41] Andreas V. Hess, Sebastian Mödersheim, Achim D. Brucker, and Anders Schlichtkrull. Performing Security Proofs of Stateful Protocols. In 34th IEEE Computer Security Foundations Symposium (CSF). , 1, pages 143-158, IEEE, 2021.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/CSF51468.2021.00006) (Share article on LinkedIn. Share article on CiteULike.)
[40] Diego Marmsoler and Achim D. Brucker. A Denotational Semantics of Solidity in Isabelle/HOL. In Software Engineering and Formal Methods (SEFM). Lecture Notes in Computer Science, Springer-Verlag, 2021.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[39] Achim D. Brucker and Michael Herzberg. A Formally Verified Model of Web Components. In Formal Aspects of Component Software (FACS). Lecture Notes in Computer Science (12018), Springer-Verlag, 2020.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-030-40914-2_3) (Share article on LinkedIn. Share article on CiteULike.)
[38] Achim D. Brucker and Burkhart Wolff. Isabelle/DOF: Design and Implementation. In Software Engineering and Formal Methods (SEFM). Lecture Notes in Computer Science (11724), pages 275-292, Springer-Verlag, 2019.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-030-30446-1_15) (Share article on LinkedIn. Share article on CiteULike.)
[37] Achim D. Brucker and Burkhart Wolff. Using Ontologies in Formal Developments Targeting Certification. In Integrated Formal Methods (iFM). Lecture Notes in Computer Science (11918), Springer-Verlag, 2019.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-030-34968-4_4) (Share article on LinkedIn. Share article on CiteULike.)
[36] Michael Foster, Achim D. Brucker, Ramsay G. Taylor, Siobhán North, and John Derrick. Incorporating Data into EFSM Inference. In Software Engineering and Formal Methods (SEFM). Lecture Notes in Computer Science (11724), pages 257-272, Springer-Verlag, 2019.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-030-30446-1_14) (Share article on LinkedIn. Share article on CiteULike.)
[35] Achim D. Brucker, Idir Ait-Sadoune, Paolo Crisafulli, and Burkhart Wolff. Using the Isabelle Ontology Framework: Linking the Formal with the Informal. In Conference on Intelligent Computer Mathematics (CICM). Lecture Notes in Computer Science (11006), Springer-Verlag, 2018.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-96812-4_3) (Share article on LinkedIn. Share article on CiteULike.)
[34] Achim D. Brucker and Michael Herzberg. Formalizing (Web) Standards: An Application of Test and Proof. In TAP 2018: Tests And Proofs. Lecture Notes in Computer Science (10889), pages 159-166, Springer-Verlag, 2018.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-92994-1_9) (Share article on LinkedIn. Share article on CiteULike.)
[33] Michael Foster, Ramsay G. Taylor, Achim D. Brucker, and John Derrick. Formalising Extended Finite State Machine Transition Merging. In ICFEM. Lecture Notes in Computer Science (11232), pages 373-387, Springer-Verlag, 2018.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-030-02450-5) (Share article on LinkedIn. Share article on CiteULike.)
[32] Andreas V. Hess, Sebastian A. Mödersheim, and Achim D. Brucker. Stateful Protocol Composition. In ESORICS. Lecture Notes in Computer Science (11098), pages 427-446, Springer-Verlag, 2018.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-99073-6) (Share article on LinkedIn. Share article on CiteULike.)
[31] Achim D. Brucker and Michael Herzberg. On the Static Analysis of Hybrid Mobile Apps: A Report on the State of Apache Cordova Nation. In International Symposium on Engineering Secure Software and Systems (ESSoS). Lecture Notes in Computer Science (9639), pages 72-88, Springer-Verlag, 2016.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-30806-7_5) (Share article on LinkedIn. Share article on CiteULike.)
[30] Achim D. Brucker and Burkhart Wolff. Monadic Sequence Testing and Explicit Test-Refinements. In TAP 2016: Tests And Proofs. Lecture Notes in Computer Science (9762), Springer-Verlag, 2016.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-41135-4_2) (Share article on LinkedIn. Share article on CiteULike.)
[29] Stanislav Dashevskyi, Achim D. Brucker, and Fabio Massacci. On the Security Cost of Using a Free and Open Source Component in a Proprietary Product. In International Symposium on Engineering Secure Software and Systems (ESSoS). Lecture Notes in Computer Science (9639), pages 190-206, Springer-Verlag, 2016.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-30806-7_12) (Share article on LinkedIn. Share article on CiteULike.)
[28] Achim D. Brucker, Oto Havle, Yakoub Nemouchi, and Burkhart Wolff. Testing the IPC Protocol for a Real-Time Operating System. In Working Conference on Verified Software: Theories, Tools, and Experiments. Lecture Notes in Computer Science, Springer-Verlag, 2015.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-29613-5_3) (Share article on LinkedIn. Share article on CiteULike.)
[27] Lotfi ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, Achim D. Brucker, and Philip Miseldine. Factors Impacting the Effort Required to Fix Security Vulnerabilities: An Industrial Case Study. In Information Security Conference (ISC 2015). Lecture Notes in Computer Science, Springer-Verlag, 2015.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-23318-5_6) (Share article on LinkedIn. Share article on CiteULike.)
[26] Mattia Salnitri, Achim D. Brucker, and Paolo Giorgini. From Secure Business Process Models to Secure Artifact-Centric Specifications. In Enterprise, Business-Process and Information Systems Modeling BPMDS. Lecture Notes in Business Information Processing, 214, pages 246-262, Springer-Verlag, 2015.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-19237-6_16) (Share article on LinkedIn. Share article on CiteULike.)
[25] Achim D. Brucker and Uwe Sodan. Deploying Static Application Security Testing on a Large Scale. In GI Sicherheit 2014. Lecture Notes in Informatics, 228, pages 91-101, GI, 2014.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[24] Karsten Sohr, Steffen Bartsch, Melanie Volkamer, Bernhard J. Berger, Eric Bodden, Achim D. Brucker, Sönke Maseberg, Mehmet Kus, and Jens Heider. Zertifizierte Datensicherheit für mobile Anwendungen. In GI Sicherheit 2014. Lecture Notes in Informatics, 228, pages 283-291, GI, 2014.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[23] Achim D. Brucker, Lukas Brügger, and Burkhart Wolff. HOL-TestGen/FW: An Environment for Specification-based Firewall Conformance Testing. In International Colloquium on Theoretical Aspects of Computing (ICTAC). Lecture Notes in Computer Science (8049), pages 112-121, Springer-Verlag, 2013.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-39718-9_7) (Share article on LinkedIn. Share article on CiteULike.)
[22] Achim D. Brucker, Abderrahmane Feliachi, Yakoub Nemouchi, and Burkhart Wolff. Test Program Generation for a Microprocessor: A Case-Study. In TAP 2013: Tests And Proofs. Lecture Notes in Computer Science (7942), pages 76-95, Springer-Verlag, 2013.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-38916-0_5) (Share article on LinkedIn. Share article on CiteULike.)
[21] Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, and Bo Zhou. A Framework for Secure Service Composition. In International Conference on Information Privacy, Security, Risk and Trust (PASSAT), pages 647-652, IEEE Computer Society, 2013.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/SocialCom.2013.97) (Share article on LinkedIn. Share article on CiteULike.)
[20] Luca Compagna, Pierre Guilleminot, and Achim D. Brucker. Business Process Compliance via Security Validation as a Service. In IEEE Sixth International Conference on Software Testing, Verification and Validation (ICST). , pages 455-462, IEEE Computer Society, 2013.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/ICST.2013.63) (Share article on LinkedIn. Share article on CiteULike.)
[19] Achim D. Brucker, Isabelle Hang, Gero Lückemeyer, and Raj Ruparel. SecureBPMN: Modeling and Enforcing Access Control Requirements in Business Processes. In ACM symposium on access control models and technologies (SACMAT). , pages 123-126, ACM Press, 2012.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1145/2295136.2295160) (ACM) (Share article on LinkedIn. Share article on CiteULike.)
[18] Ganna Monakova, Achim D. Brucker, and Andreas Schaad. Security and Safety of Assets in Business Processes. In ACM Symposium on Applied Computing (SAC). , pages 1667-1673, ACM Press, 2012.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1145/2245276.2232045) (ACM) (Share article on LinkedIn. Share article on CiteULike.)
[17] Ganna Monakova, Cristina Severin, Achim D. Brucker, Ulrich Flegel, and Andreas Schaad. Monitoring Security and Safety of Assets in Supply Chains. In Future Security. Communications in Computer and Information Science, 318, pages 9-20, Springer-Verlag, 2012.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-33161-9_3) (Share article on LinkedIn. Share article on CiteULike.)
[16] Achim D. Brucker, Lukas Brügger, Paul Kearney, and Burkhart Wolff. An Approach to Modular and Testable Security Models of Real-world Health-care Applications. In ACM symposium on access control models and technologies (SACMAT). , pages 133-142, ACM Press, 2011.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1145/1998441.1998461) (ACM) (Share article on LinkedIn. Share article on CiteULike.)
[15] Achim D. Brucker and Helmut Petritsch. A Framework for Managing and Analyzing Changes of Security Policies. In IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY). , pages 105-112, IEEE Computer Society, 2011.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/POLICY.2011.47) (Share article on LinkedIn. Share article on CiteULike.)
[14] Achim D. Brucker, Lukas Brügger, Paul Kearney, and Burkhart Wolff. Verified Firewall Policy Transformations for Test-Case Generation. In Third International Conference on Software Testing, Verification, and Validation (ICST), pages 345-354, IEEE Computer Society, 2010.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/ICST.2010.50) (Share article on LinkedIn. Share article on CiteULike.)
[13] Achim D. Brucker and Dieter Hutter. Information Flow in Disaster Management Systems. In International Conference on Availability, Reliability and Security (ARES), pages 156-163, IEEE Computer Society, 2010.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/ARES.2010.107) (Share article on LinkedIn. Share article on CiteULike.)
[12] Achim D. Brucker and Helmut Petritsch. Idea: Efficient Evaluation of Access Control Constraints. In International Symposium on Engineering Secure Software and Systems (ESSoS). Lecture Notes in Computer Science (5965), pages 157-165, Springer-Verlag, 2010.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-11747-3_12) (Share article on LinkedIn. Share article on CiteULike.)
[11] Achim D. Brucker and Helmut Petritsch. Extending Access Control Models with Break-glass. In ACM symposium on access control models and technologies (SACMAT), pages 197-206, ACM Press, 2009.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1145/1542207.1542239) (ACM) (Share article on LinkedIn. Share article on CiteULike.)
[10] Achim D. Brucker, Helmut Petritsch, and Andreas Schaad. Delegation Assistance. In IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY). , pages 84-91, IEEE Computer Society, 2009.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/POLICY.2009.35) (Share article on LinkedIn. Share article on CiteULike.)
[9] Achim D. Brucker and Burkhart Wolff. HOL-TestGen: An Interactive Test-case Generation Framework. In Fundamental Approaches to Software Engineering (FASE09). Lecture Notes in Computer Science (5503), pages 417-420, Springer-Verlag, 2009.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-00593-0_28) (Share article on LinkedIn. Share article on CiteULike.)
[8] Mathias Kohler, Achim D. Brucker, and Andreas Schaad. ProActive Caching: Generating Caching Heuristics for Business Process Environments. In International Conference on Computational Science and Engineering (CSE), pages 207-304, IEEE Computer Society, 2009.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1109/CSE.2009.177) (Share article on LinkedIn. Share article on CiteULike.)
[7] Achim D. Brucker, Lukas Brügger, and Burkhart Wolff. Model-based Firewall Conformance Testing. In Testcom/FATES 2008. Lecture Notes in Computer Science (5047), pages 103-118, Springer-Verlag, 2008.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-540-68524-1_9) (Share article on LinkedIn. Share article on CiteULike.)
[6] Achim D. Brucker and Burkhart Wolff. HOL-OCL - A Formal Proof Environment for UML/OCL. In Fundamental Approaches to Software Engineering (FASE08). Lecture Notes in Computer Science (4961), pages 97-100, Springer-Verlag, 2008.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-540-78743-3_8) (Share article on LinkedIn. Share article on CiteULike.)
[5] Achim D. Brucker and Burkhart Wolff. Extensible Universes for Object-oriented Data Models. In ECOOP 2008 - Object-Oriented Programming. Lecture Notes in Computer Science (5142), pages 438-462, Springer-Verlag, 2008.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-540-70592-5_19) (Share article on LinkedIn. Share article on CiteULike.)
[4] Achim D. Brucker and Burkhart Wolff. Test-Sequence Generation with HOL-TestGen - With an Application to Firewall Testing. In TAP 2007: Tests And Proofs. Lecture Notes in Computer Science (4454), pages 149-168, Springer-Verlag, 2007.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-540-73770-4_9) (Share article on LinkedIn. Share article on CiteULike.)
[3] Achim D. Brucker, Jürgen Doser, and Burkhart Wolff. A Model Transformation Semantics and Analysis Methodology for SecureUML. In MoDELS 2006: Model Driven Engineering Languages and Systems. Lecture Notes in Computer Science (4199), pages 306-320, Springer-Verlag, 2006. An extended version of this paper is available as ETH Technical Report, no. 524.
Categories: , ,
(abstract) (full text as PDF file) (Extended Version) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/11880240_22) (Share article on LinkedIn. Share article on CiteULike.)
[2] Achim D. Brucker and Burkhart Wolff. HOL-OCL: Experiences, Consequences and Design Choices. In UML 2002: Model Engineering, Concepts and Tools. Lecture Notes in Computer Science (2460), pages 196-211, Springer-Verlag, 2002.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/3-540-45800-X_17) (Share article on LinkedIn. Share article on CiteULike.)
[1] Achim D. Brucker and Burkhart Wolff. A Proposal for a Formal OCL Semantics in Isabelle/HOL. In Theorem Proving in Higher Order Logics (TPHOLs). Lecture Notes in Computer Science (2410), pages 99-114, Springer-Verlag, 2002.
Categories: ,
(abstract) (full text as PDF file) (Extended Version) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/3-540-45685-6_8) (Share article on LinkedIn. Share article on CiteULike.)
top

Articles in Workshop Proceedings

[27] Achim D. Brucker and Sakine Yalman. Confidentiality Enhanced Life-Cycle Assessment. In BPMN 2021 Workshops. Lecture Notes in Business Information Processing (LNBIP), Springer-Verlag, 2021.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[26] Achim D. Brucker and Michael Herzberg. A Formal Semantics of the Core DOM in Isabelle/HOL. In The 2018 Web Conference Companion (WWW). , pages 741-749, ACM Press, 2018.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1145/3184558.3185980) (Share article on LinkedIn. Share article on CiteULike.)
[25] Stanislav Dashevskyi, Achim D. Brucker, and Fabio Massacci. On the Effort for Security Maintenance of Open Source Components. In Workshop on the Economics of Information Security (WEIS). , 2018.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[24] Achim D. Brucker, Delphine Longuet, Frédéric Tuong, and Burkhart Wolff. On the Semantics of Object-oriented Data Structures and Path Expressions. In Proceedings of the MODELS 2013 OCL Workshop (OCL 2013). CEUR Workshop Proceedings, 1092, pages 23-32, CEUR-WS.org, 2013. An extended version of this paper is available as LRI Technical Report 1565.
Categories: ,
(abstract) (full text as PDF file) (Extended Version) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[23] Achim D. Brucker and Isabelle Hang. Secure and Compliant Implementation of Business Process-driven Systems. In Joint Workshop on Security in Business Processes (SBP). Lecture Notes in Business Information Processing (LNBIP), 132, pages 662-674, Springer-Verlag, 2012.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-36285-9_66) (Share article on LinkedIn. Share article on CiteULike.)
[22] Achim D. Brucker and Burkhart Wolff. Featherweight OCL: A study for the consistent semantics of OCL 2.3 in HOL. In Workshop on OCL and Textual Modelling (OCL 2012). , pages 19-24, 2012. The semantics for the Boolean operators proposed in this paper was adopted by the OCL 2.4 standard.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1145/2428516.2428520) (Share article on LinkedIn. Share article on CiteULike.)
[21] Stephan Braune, Achim D. Brucker, Gerald Kleser, Keqin Li, Theo Dirk Meijler, Heiko Paulheim, and Florian Probst. A Service-Oriented Architecture for Emergency Management Systems. In Software Engineering 2011 - Workshopband. Lecture Notes in Informatics, P-184, pages 225-232, GI, 2011. Innovative Systeme zur Unterstützung der zivilen Sicherheit: Architekturen und Gestaltungskonzepte.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[20] Matthias P. Krieger and Achim D. Brucker. Extending OCL Operation Contracts with Objective Functions. In Electronic Communications of the EASST, 44, 2011.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.14279/tuj.eceasst.44.662) (ECEASST) (Share article on LinkedIn. Share article on CiteULike.)
[19] Michael Altenhofen and Achim D. Brucker. Practical Issues with Formal Specifications: Lessons Learned from an Industrial Case Study. In International Workshop on Formal Methods for Industrial Critical Systems (FMICS). Lecture Notes in Computer Science (6371), pages 17-32, Springer-Verlag, 2010.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-15898-8_2) (Share article on LinkedIn. Share article on CiteULike.)
[18] Achim D. Brucker, Matthias P. Krieger, Delphine Longuet, and Burkhart Wolff. A Specification-based Test Case Generation Method for UML/OCL. In MoDELS Workshops. Lecture Notes in Computer Science (6627), pages 334-348, Springer-Verlag, 2010. Selected best papers from all satellite events of the MoDELS 2010 conference. Workshop on OCL and Textual Modelling.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-21210-9_33) (Share article on LinkedIn. Share article on CiteULike.)
[17] Achim D. Brucker, Helmut Petritsch, and Stefan G. Weber. Attribute-based Encryption with Break-glass. In Workshop In Information Security Theory And Practice (WISTP). Lecture Notes in Computer Science (6033), pages 237-244, Springer-Verlag, 2010.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-12368-9_18) (Share article on LinkedIn. Share article on CiteULike.)
[16] Mathias Kohler and Achim D. Brucker. Caching Strategies: An Empirical Evaluation. In International Workshop on Security Measurements and Metrics (MetriSec), pages 1-8, ACM Press, 2010.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1145/1853919.1853930) (ACM) (Share article on LinkedIn. Share article on CiteULike.)
[15] Achim D. Brucker, Matthias P. Krieger, and Burkhart Wolff. Extending OCL with Null-References. In Models in Software Engineering. Lecture Notes in Computer Science (6002), pages 261-275, Springer-Verlag, 2009. Selected best papers from all satellite events of the MoDELS 2009 conference.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-12261-3_25) (Share article on LinkedIn. Share article on CiteULike.)
[14] Achim D. Brucker and Sebastian A. Mödersheim. Integrating Automated and Interactive Protocol Verification. In Workshop on Formal Aspects in Security and Trust (FAST 2009). Lecture Notes in Computer Science (5983), pages 248-262, Springer-Verlag, 2009. An extended version of this paper is available as IBM Research Technical Report, RZ3750.
Categories: ,
(abstract) (full text as PDF file) (Extended Version) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-12459-4_18) (Share article on LinkedIn. Share article on CiteULike.)
[13] Achim D. Brucker, Lukas Brügger, and Burkhart Wolff. Verifying Test-Hypotheses: An Experiment in Test and Proof. In Electronic Notes in Theoretical Computer Science, 220 (1), pages 15-27, 2008. Proceedings of the Fourth Workshop on Model Based Testing (MBT 2008)
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1016/j.entcs.2008.11.003) (Share article on LinkedIn. Share article on CiteULike.)
[12] Achim D. Brucker and Jürgen Doser. Metamodel-based UML Notations for Domain-specific Languages. In 4th International Workshop on Software Language Engineering (ATEM 2007), 2007.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[11] Achim D. Brucker, Jürgen Doser, and Burkhart Wolff. An MDA Framework Supporting OCL. In Electronic Communications of the EASST, 5, 2006.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.14279/tuj.eceasst.5.45) (Share article on LinkedIn. Share article on CiteULike.)
[10] Achim D. Brucker, Jürgen Doser, and Burkhart Wolff. Semantic Issues of OCL: Past, Present, and Future. In Electronic Communications of the EASST, 5, 2006.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:http://dx.doi.org/10.14279/tuj.eceasst.5.46) (Share article on LinkedIn. Share article on CiteULike.)
[9] Achim D. Brucker and Burkhart Wolff. A Package for Extensible Object-Oriented Data Models with an Application to IMP++. In International Workshop on Software Verification and Validation (SVV 2006), 2006.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[8] Michael Wahler, Jana Koehler, and Achim D. Brucker. Model-Driven Constraint Engineering. In Electronic Communications of the EASST, 5, 2006.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.14279/tuj.eceasst.5.44) (Share article on LinkedIn. Share article on CiteULike.)
[7] Achim D. Brucker and Burkhart Wolff. Interactive Testing using HOL-TestGen. In Formal Approaches to Testing of Software. Lecture Notes in Computer Science (3997), Springer-Verlag, 2005.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/11759744_7) (Share article on LinkedIn. Share article on CiteULike.)
[6] Achim D. Brucker and Burkhart Wolff. Symbolic Test Case Generation for Primitive Recursive Functions. In Formal Approaches to Testing of Software. Lecture Notes in Computer Science (3395), pages 16-32, Springer-Verlag, 2004.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/b106767) (Share article on LinkedIn. Share article on CiteULike.)
[5] Achim D. Brucker and Burkhart Wolff. A Case Study of a Formalized Security Architecture. In Electronic Notes in Theoretical Computer Science, 80, pages 24-40, 2003. Proceedings of the Eighth International Workshop on Formal Methods for Industrial Critical Systems (FMICS'03)
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1016/S1571-0661(04)80807-7) (Share article on LinkedIn. Share article on CiteULike.)
[4] Achim D. Brucker and Burkhart Wolff. Using Theory Morphisms for Implementing Formal Methods Tools. In Types for Proof and Programs. Lecture Notes in Computer Science (2646), pages 59-77, Springer-Verlag, 2003.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/3-540-39185-1_4) (Share article on LinkedIn. Share article on CiteULike.)
[3] Achim D. Brucker, Stefan Friedrich, Frank Rittinger, and Burkhart Wolff. HOL-Z 2.0: A Proof Environment for Z-Specifications. In FM-TOOLS 2002, pages 33-38, 2002. Available as Technical Report, University Augsburg, number 2002-11.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[2] Achim D. Brucker, Frank Rittinger, and Burkhart Wolff. The CVS-Server Case Study: A Formalized Security Architecture. In FM-TOOLS 2002, pages 47-52, 2002. Available as Technical Report, University Augsburg, number 2002-11.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[1] Achim D. Brucker and Burkhart Wolff. Testing Distributed Component Based Systems Using UML/OCL. In Informatik 2001. Tagungsband der GI/ÖCG Jahrestagung, 1 (157), pages 608-614, 2001.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
top

Mechanically Checked Documents

[15] Achim D. Brucker. Nano JSON: Working with JSON formatted data in Isabelle/HOL and Isabelle/ML. In Archive of Formal Proofs, 2022. http://www.isa-afp.org/entries/Nano_JSON.html, Formal proof development
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[14] Diego Marmsoler and Achim D. Brucker. Isabelle/Solidity: A deep Embedding of Solidity in Isabelle/HOL. In Archive of Formal Proofs, 2022. http://www.isa-afp.org/entries/Solidity.html, Formal proof development
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[13] Achim D. Brucker and Michael Herzberg. The Safely Composable DOM. In Archive of Formal Proofs, 2020. http://www.isa-afp.org/entries/Core_SC_DOM.html, Formal proof development
Categories: , ,
(abstract) (full text as PDF file) (Outline) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[12] Achim D. Brucker and Michael Herzberg. Shadow DOM: A Formal Model of the Document Object Model with Shadow Roots. In Archive of Formal Proofs, 2020. http://www.isa-afp.org/entries/Shadow_DOM.html, Formal proof development
Categories: , ,
(abstract) (full text as PDF file) (Outline) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[11] Achim D. Brucker and Michael Herzberg. Shadow SC DOM: A Formal Model of the Safelty Composable Document Object Model with Shadow Roots. In Archive of Formal Proofs, 2020. http://www.isa-afp.org/entries/Shadow_SC_DOM.html, Formal proof development
Categories: , ,
(abstract) (full text as PDF file) (Outline) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[10] Achim D. Brucker and Michael Herzberg. A Formalization of Web Components. In Archive of Formal Proofs, 2020. http://www.isa-afp.org/entries/DOM_Components.html, Formal proof development
Categories: , ,
(abstract) (full text as PDF file) (Outline) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[9] Achim D. Brucker and Michael Herzberg. A Formalization of Safely Composable Web Components. In Archive of Formal Proofs, 2020. http://www.isa-afp.org/entries/SC_DOM_Components.html, Formal proof development
Categories: , ,
(abstract) (full text as PDF file) (Outline) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[8] Michael Foster, Achim D. Brucker, Ramsay G. Taylor, and John Derrick. Inference of Extended Finite State Machines. In Archive of Formal Proofs, 2020. http://www.isa-afp.org/entries/Extended_Finite_State_Machine_Inference.html, Formal proof development
Categories: ,
(abstract) (full text as PDF file) (Outline) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[7] Michael Foster, Achim D. Brucker, Ramsay G. Taylor, and John Derrick. A Formal Model of Extended Finite State Machines. In Archive of Formal Proofs, 2020. http://www.isa-afp.org/entries/Extended_Finite_State_Machines.html, Formal proof development
Categories: ,
(abstract) (full text as PDF file) (Outline) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[6] Andreas V. Hess, Sebastian Mödersheim, and Achim D. Brucker. Stateful Protocol Composition and Typing. In Archive of Formal Proofs, 2020. http://www.isa-afp.org/entries/Stateful_Protocol_Composition_and_Typing.html, Formal proof development
Categories: ,
(abstract) (full text as PDF file) (Outline) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[5] Andreas V. Hess, Sebastian Mödersheim, Achim D. Brucker, and Anders Schlichtkrull. Automated Stateful Protocol Verification. In Archive of Formal Proofs, 2020. http://www.isa-afp.org/entries/Automated_Stateful_Protocol_Verification.html, Formal proof development
Categories: ,
(abstract) (full text as PDF file) (Outline) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[4] Achim D. Brucker and Michael Herzberg. The Core DOM. In Archive of Formal Proofs, 2018. http://www.isa-afp.org/entries/Core_DOM.html, Formal proof development
Categories: , ,
(abstract) (full text as PDF file) (Outline) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[3] Achim D. Brucker, Lukas Brügger, and Burkhart Wolff. Formal Network Models and Their Application to Firewall Policies. In Archive of Formal Proofs, 2017. http://www.isa-afp.org/entries/UPF_Firewall.shtml, Formal proof development
Categories: ,
(abstract) (full text as PDF file) (Outline) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[2] Achim D. Brucker, Lukas Brügger, and Burkhart Wolff. The Unified Policy Framework (UPF). In Archive of Formal Proofs, 2014. http://www.isa-afp.org/entries/UPF.shtml, Formal proof development
Categories: ,
(abstract) (full text as PDF file) (Outline) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[1] Achim D. Brucker, Frédéric Tuong, and Burkhart Wolff. Featherweight OCL: A Proposal for a Machine-Checked Formal Semantics for OCL 2.5. In Archive of Formal Proofs, 2014. http://www.isa-afp.org/entries/Featherweight_OCL.shtml, Formal proof development
Categories: ,
(abstract) (full text as PDF file) (Outline) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
top

Invited Papers

[14] Achim D. Brucker, Gwendal Daniel, Martin Gogolla, Frédéric Jouault, Christophe Ponsard,, Valéry Ramon, and Edward D. Willink. Emerging Topics in Textual Modelling. In OCL 2019. CEUR Workshop Proceedings, 2513, pages 91-104, CEUR-WS.org, 2019.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[13] Robert Bill, Achim D. Brucker, Jordi Cabot Martin Gogolla, Antonio Vallecillo, and Edward D. Wilink. Workshop in OCL and Textual Textual Modelling: Report on Recent Trends and Panel Discussion. In STAF 2017 Workshops. Lecture Notes in Computer Science, 10748, pages 157-165, Springer-Verlag, 2017.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[12] Lotfi ben Othmane, Achim D. Brucker, Stanislav Dashevskyi, and Peter Tsalovski. An Introduction to Data Analytics For Software Security. In Empirical Research for Software Security: Foundations and Experience. Series in Security, Privacy and Trust, pages 69-94, CRC Press, 2017.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[11] Achim D. Brucker, Jordi Cabot, Gwendal Daniel, Martin Gogolla, Adolfo Sánchez-Barbudo Herrera, Frank Hilken, Frédéric Tuong, Edward D. Willink, and Burkhart Wolff. Recent Developments in OCL and Textual Modelling. In Proceedings of the International Workshop on OCL and Textual Modeling (OCL 2016). CEUR Workshop Proceedings, 1756, pages 157-165, CEUR-WS.org, 2016.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[10] Michael Felderer, Matthias Büchler, Martin Johns, Achim D. Brucker, Ruth Breu, and Alexander Pretschner. Security Testing: A Survey. In Advances in Computers, 101, pages 1-51, 2016.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1016/bs.adcom.2015.11.003) (Share article on LinkedIn. Share article on CiteULike.)
[9] Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Brett Lempereur, and Qi Shi. Security Policy Monitoring of Composite Services. In Secure and Trustworthy Service Composition: The Aniketos Approach. Lecture Notes in Computer Science : State of the Art Surveys (8900), pages 192-202, Springer-Verlag, 2014.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-13518-2_13) (Share article on LinkedIn. Share article on CiteULike.)
[8] Achim D. Brucker. Using SecureBPMN for Modelling Security-Aware Service Compositions. In Secure and Trustworthy Service Composition: The Aniketos Approach. Lecture Notes in Computer Science : State of the Art Surveys (8900), pages 110-120, Springer-Verlag, 2014.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-13518-2_8) (Share article on LinkedIn. Share article on CiteULike.)
[7] Achim D. Brucker, Tony Clark, Carolina Dania, Geri Georg, Martin Gogolla, Frédéric Jouault, Ernest Teniente, and Burkhart Wolff. Panel Discussion: Proposals for Improving OCL. In Proceedings of the MODELS 2014 OCL Workshop (OCL 2014). CEUR Workshop Proceedings, 1285, pages 83-99, CEUR-WS.org, 2014.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[6] Achim D. Brucker, Luca Compagna, and Pierre Guilleminot. Compliance Validation of Secure Service Compositions. In Secure and Trustworthy Service Composition: The Aniketos Approach. Lecture Notes in Computer Science : State of the Art Surveys (8900), pages 136-149, Springer-Verlag, 2014.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-13518-2_10) (Share article on LinkedIn. Share article on CiteULike.)
[5] Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, and Bo Zhou. Aniketos Service Composition Framework: Analysing and Ranking of Secure Services. In Secure and Trustworthy Service Composition: The Aniketos Approach. Lecture Notes in Computer Science : State of the Art Surveys (8900), pages 121-135, Springer-Verlag, 2014.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-13518-2_9) (Share article on LinkedIn. Share article on CiteULike.)
[4] Per Haakon Meland, Erkuden Rios, Vasilis Tountopoulos, and Achim D. Brucker. The Aniketos Platform. In Secure and Trustworthy Service Composition: The Aniketos Approach. Lecture Notes in Computer Science : State of the Art Surveys (8900), Springer-Verlag, 2014.
Categories: ,
(full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-13518-2_4) (Share article on LinkedIn. Share article on CiteULike.)
[3] Achim D. Brucker, Dan Chiorean, Tony Clark, Birgit Demuth, Martin Gogolla, Dimitri Plotnikov, Bernhard Rumpe, Edward D. Willink, and Burkhart Wolff. Report on the Aachen OCL Meeting. In Proceedings of the MODELS 2013 OCL Workshop (OCL 2013). CEUR Workshop Proceedings, 1092, pages 103-111, CEUR-WS.org, 2013.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[2] Florian Marienfeld, Edzard Höfig, Michele Bezzi, Matthias Flügge, Jonas Pattberg, Gabriel Serme, Achim D. Brucker, Philip Robinson, Stephen Dawson, and Wolfgang Theilmann. Service levels, Security, and Trust. In Handbook of Service Description: USDL and its Methods, pages 295-326, Springer-Verlag, 2012.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-1-4614-1864-1_12) (Share article on LinkedIn. Share article on CiteULike.)
[1] Florian Probst, Heiko Paulheim, Achim D. Brucker, and Stefan Schulte. SoKNOS - Informationsdienste für das Katastrophenmanagement. In VDE-Kongress 2010 - E-Mobility. , 2010.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
top

Edited Volumes

[8] Achim D. Brucker, Gwendal Daniel, and Frédéric Jouault (eds.). 19th International Workshop on OCL and Textual Modeling, OCL 2019, Munich, Ottawa, Canada, September 16, 2019. Proceedings. CEUR-WS.org, 2019.
Categories: ,
(BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[7] Achim D. Brucker, Jordi Cabot, and Adolfo Sánchez-Barbudo Herrera (eds.). 16th International Workshop on OCL and Textual Modeling, OCL 2016, Saint-Malo, France, October 2, 2016. Proceedings. CEUR-WS.org, 2016.
Categories: ,
(BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[6] Achim D. Brucker, Marina Egea, Martin Gogolla, and Frédéric Tuong (eds.). 15th International Workshop on OCL and Textual Modeling, OCL 2015, Ottawa, Canada, September 28, 2015. Proceedings. CEUR-WS.org, 2015.
Categories: ,
(BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[5] Achim D. Brucker and Jacques Julliand. Editorial for the special issue of STVR on tests and proofs volume 1: tests and proofs in model-based testing. In Software Testing, Verification & Reliability (STVR), 24 (7), pages 497-498, 2014.
(BibTeX) (Endnote) (RIS) (Word) (doi:10.1002/stvr.1560) (Share article on LinkedIn. Share article on CiteULike.)
[4] Achim D. Brucker and Jacques Julliand. Editorial for the special issue of STVR on tests and proofs volume 2: tests and proofs for improving the generation time and quality of test data suites. In Software Testing, Verification & Reliability (STVR), 24 (8), pages 591-592, 2014.
(BibTeX) (Endnote) (RIS) (Word) (doi:10.1002/stvr.1558) (Share article on LinkedIn. Share article on CiteULike.)
[3] Achim D. Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Haakon Meland, and Erkuden Rios Secure and Trustworthy Service Composition: The Aniketos Approach. Springer-Verlag, 2014.
Categories: ,
(BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-319-13518-2) (Share article on LinkedIn. Share article on CiteULike.)
[2] Achim D. Brucker, Carolina Dania, Geri Georg, and Martin Gogolla (eds.). 14th International Workshop on OCL and Textual Modeling, OCL 2014, Valencia, Spain, September 30, 2014. Proceedings. CEUR-WS.org, 2014.
Categories: ,
(BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[1] Achim D. Brucker and Jacques Julliand (eds.). Tests and Proofs - 6th International Conference, TAP 2012, Praque, Czech Republic, Mai 31 - June 1, 2012. Proceedings. Springer-Verlag, 2012.
Categories: ,
(BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-30473-6) (Share article on LinkedIn. Share article on CiteULike.)
top

Technical Reports

[15] Andreas V. Hess, Sebastian A. Mödersheim, and Achim D. Brucker. Stateful Protocol Composition (Extended Version). DTU Compute, Technical University Denmark, Technical Report 2018-03, 2018.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[14] Achim D. Brucker, Lukas Brügger, Abderrahmane Feliachi, Chantal Keller, Matthias P. Krieger, Delphine Longuet, Yakoub Nemouchi, Frédéric Tuong, and Burkhart Wolff. HOL-TestGen 1.8.0 User Guide. Laboratoire en Recherche en Informatique (LRI), Université Paris-Sud 11, France, Technical Report 1586, 2016.
Categories: ,
(full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[13] Achim D. Brucker, Frédéric Tuong, and Burkhart Wolff. Featherweight OCL: A Proposal for a Machine-Checked Formal Semantics for OCL 2.5. LRI, Univ Paris Sud, CNRS, Centrale Supélec, Université Paris-Saclay, France, Technical Report 1582, 2015.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[12] Lotfi ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, and Achim D. Brucker. Time for Addressing Software Security Issues: Prediction Models and Impacting Factors. Technische Universität Darmstadt, Technical Report TUD-CS-2015-1268, 2015.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[11] Achim D. Brucker, Delphine Longuet, Frédéric Tuong, and Burkhart Wolff. On the Semantics of Object-oriented Data Structures and Path Expressions (Extended Version). Laboratoire en Recherche en Informatique (LRI), Université Paris-Sud 11, France, Technical Report 1565, 2013.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[10] Achim D. Brucker, Lukas Brügger, Matthias P. Krieger, and Burkhart Wolff. HOL-TestGen 1.7.0 User Guide. Laboratoire en Recherche en Informatique (LRI), Université Paris-Sud 11, France, Technical Report 1551, 2012.
Categories: ,
(full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[9] Achim D. Brucker, Lukas Brügger, Matthias P. Krieger, and Burkhart Wolff. HOL-TestGen 1.5.0 User Guide. ETH Zurich, Technical Report 670, 2010.
Categories: ,
(full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[8] Achim D. Brucker and Sebastian A. Mödersheim. Integrating Automated and Interactive Protocol Verification (Extended Version). IBM Research Zurich, Technical Report RZ3750, 2009.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[7] Achim D. Brucker, Jürgen Doser, and Burkhart Wolff. A Model Transformation Semantics and Analysis Methodology for SecureUML. ETH Zurich, Technical Report 524, 2006.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[6] Achim D. Brucker and Burkhart Wolff. The HOL-OCL Book. ETH Zurich, Technical Report 525, 2006.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[5] Achim D. Brucker and Burkhart Wolff. HOL-TestGen 1.0.0 User Guide. ETH Zurich, Technical Report 482, 2005.
Categories: ,
(full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[4] Achim D. Brucker and Burkhart Wolff. Symbolic Test Case Generation for Primitive Recursive Functions. ETH Zurich, Technical Report 449, 2004.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[3] Achim D. Brucker, Frank Rittinger, and Burkhart Wolff. A CVS-Server Security Architecture - Concepts and Formal Analysis. Albert-Ludwigs-Universität Freiburg, Technical Report 182, 2002.
Categories: , ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[2] Achim D. Brucker and Burkhart Wolff. A Note on Design Decisions of a Formalization of the OCL. Albert-Ludwigs-Universität Freiburg, Technical Report 168, 2002.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[1] Achim D. Brucker and Burkhart Wolff. Checking OCL Constraints in Distributed Systems Using J2EE/EJB. Albert-Ludwigs-Universität Freiburg, Technical Report 157, 2001.
Categories:
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
top

Theses

[2] Achim D. Brucker. An Interactive Proof Environment for Object-oriented Specifications. ETH Zurich,2007. ETH Dissertation No. 17097.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[1] Achim D. Brucker. Verifikation von Dividierern mit Word-Level-Decision-Diagrams. Diplomarbeit, Albert-Ludwigs-Universität Freiburg, 2000.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
top
[4] Achim D. Brucker. Sicherheitstests für Secure DevOps (SecDevOps). In OBJEKTspektrum, 2016. Online Themenspecial DevOps 2016.
Categories: ,
(abstract) (BibTeX) (Endnote) (RIS) (Word) (URL) (Share article on LinkedIn. Share article on CiteULike.)
[3] Ruediger Bachmann and Achim D. Brucker. Developing Secure Software: A Holistic Approach to Security Testing. In Datenschutz und Datensicherheit (DuD), 38 (4), pages 257-261, 2014.
Categories: ,
(abstract) (full text as PDF file) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/s11623-014-0102-0) (Share article on LinkedIn. Share article on CiteULike.)
[2] Achim D. Brucker, Andreas Schaad, and Christian Wolter. Prozessmodellierung: Einbinden von Sicherheitsregeln in Geschäftsprozesse. In iX special - Sicher im Netz, 3, pages 152-155, 2010.
Categories: ,
(BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)
[1] Achim D. Brucker, Andreas Schaad, and Christian Wolter. Prozessmodellierung: Einbinden von Sicherheitsregeln in Geschäftsprozesse. In iX, 3, pages 118-121, 2009. An updated version of this article was published in the “iX special - Sicher im Netz” (October 2010).
Categories: ,
(BibTeX) (Endnote) (RIS) (Word) (Share article on LinkedIn. Share article on CiteULike.)

All citations in one file: brucker.bib (BibTeX), brucker.enw (Endnote), brucker.ris (RIS), brucker.word.xml (Word 2007)