Provide advanced testing techniques and tools.
Keywords: Testing, Case Generation, Model Driven, Code Analysis
Menagement of complex software systems.
Keywords: Software Systems Analysis, Risk Modelling and Measuring, Elicitation and Evolution
Processes for analysing data and generate prediction.
Keywords: Prediction, Modelling, Data Analysis
Design, developement and verification of embedded system
Keywords: Embedded Systems, Design, Development and Verification, Computer-Based Systems
Aim at securing the interaction between web-applications.
Keywords: Web Security Protocols, Authentication and Authorization Management
Support authentication and authorization protocols on mobile devices
Keywords: Systematic Security Analysis, Anddroid Security, Authentication and Authorization Protocols
Mechanism to mediate access between entities and resources.
Keywords: Access Control and Mediation, Availability and Confidentiality, Autorization Management
Security-aware workflow management systems
Keywords: Online data security, Execution of Security-Sensitive, Authorization Policies, Constraints
Online data security
Keywords: Black-Box, Security Testing of MPWAs, Payment and Identity Management
Online data security
Keywords: Automated Security Analysis, Risk Report, Mobile Security
SAT-based model checker for secyrity protocols and security sensitive application
Keywords: Check Attacks, Vulnerability
Security Threat Identification And Testing
Keywords: Security Assessment, Automated Threat Analysis, Security Testing Techniques
Testbed for exploit
Keywords: Testbed for Reputable Exploits, Generate Security Reports
Security Threat Identification And Testing.
Keywords: Risk Identification, Open Source Software, Threat Testimg
A Tool for Agent Oriented Modeling, including the t2x Jadex agent generation tool (Eclipse plug-ins).
Keywords: Eclipse Plug-up, Tropos Goal Methodology, Agent Oriented Modeling
Tool for automated test case generation for Java.
Keywords: Test Cases, Java Code, Virtual System and Network
Trustworthy software execution on untrusted mobile platforms to protect devices.
Keywords: Mobile Software Security, Protection Models, Validated Attacks