Bürger, Jens; Jürjens, Jan; Ruhroth, Thomas; Gärtner, Stefan; Schneider, Kurt Model-based security engineering: managed co-evolution of security knowledge and software models. (English) Zbl 1448.68187 Aldini, Alessandro (ed.) et al., Foundations of security analysis and design VII. FOSAD 2012/2013 tutorial lectures. Berlin: Springer. Lect. Notes Comput. Sci. 8604, 34-53 (2014). MSC: 68M25 68N99 PDFBibTeX XMLCite \textit{J. Bürger} et al., Lect. Notes Comput. Sci. 8604, 34--53 (2014; Zbl 1448.68187) Full Text: DOI
Ruhroth, Thomas; Wehrheim, Heike Model evolution and refinement. (English) Zbl 1243.68156 Sci. Comput. Program. 77, No. 3, 270-289 (2012). MSC: 68N99 68Q60 PDFBibTeX XMLCite \textit{T. Ruhroth} and \textit{H. Wehrheim}, Sci. Comput. Program. 77, No. 3, 270--289 (2012; Zbl 1243.68156) Full Text: DOI
Ruhroth, Thomas; Wehrheim, Heike Refactoring object-oriented specifications with data and processes. (English) Zbl 1202.68102 Bonsangue, Marcello M. (ed.) et al., Formal methods for open object-based distributed systems. 9th IFIP WG 6.1 international conference FMOODS 2007, Paphos, Cyprus, June 6–8, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72919-8/pbk). Lecture Notes in Computer Science 4468, 236-251 (2007). MSC: 68N19 68Q60 68Q85 PDFBibTeX XMLCite \textit{T. Ruhroth} and \textit{H. Wehrheim}, Lect. Notes Comput. Sci. 4468, 236--251 (2007; Zbl 1202.68102) Full Text: DOI