A. Alnatheer, A. M. Gravell, and D. Argles, Agile security issues, Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM '10, pp.1-58, 2010.
DOI : 10.1145/1852786.1852860

A. Amland, Risk-based testing:, Journal of Systems and Software, vol.53, issue.3, pp.287-295, 2000.
DOI : 10.1016/S0164-1212(00)00019-4

P. Ammann and J. Offutt, Introduction to Software Testing, 2008.
DOI : 10.1017/CBO9780511809163

P. Bourque and R. Dupuis, Software Engineering Body of Knowledge (SWEBOK), 2004.

A. Faivre, J. Gallois, A. Lapitre, D. Lugato, J. Pierron et al., Automatic test generation with AGATHA, TACAS, pp.591-596, 2003.

F. Bouquet, C. Grandpierre, B. Legeard, F. Peureux, N. Vacelet et al., A subset of precise UML for model-based testing, Proceedings of the 3rd international workshop on Advances in model-based testing , A-MOST '07, pp.95-104, 2007.
DOI : 10.1145/1291535.1291545

URL : https://hal.archives-ouvertes.fr/hal-00563283

[. Bouquet, C. Grandpierre, B. Legeard, and F. Peureux, A test generation solution to automate software testing, Proceedings of the 3rd international workshop on Automation of software test , AST '08, pp.45-48, 2008.
DOI : 10.1145/1370042.1370052

Y. Briand, S. Labiche, and . He, Automating regression test selection based on UML designs, Information and Software Technology, vol.51, issue.1, p.51, 2009.
DOI : 10.1016/j.infsof.2008.09.010

R. [. Biswas, M. Mall, S. Satpathy, and . Sukurman, Regression test selection techniques : A survey, Informatica, vol.35, issue.3, pp.289-321, 2011.

F. [. Cantenot, F. Ambert, and . Bouquet, Transformation rules from UML4MBT meta-model to SMT meta-model for model animation, Proceedings of the 12th Workshop on OCL and Textual Modelling, OCL '12, 2012.
DOI : 10.1145/2428516.2428526

K. Cabrera, C. , and J. Botella, Scenario based test generation using test designer, Proceedings of the 1st International Workshop on Scenario Based Testing ? co-located with ICST'2011, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00640382

S. [. Cohen, A. Dalal, G. C. Kajla, and . Patton, The Automatic Efficient Test Generator (AETG) system, Proceedings of 1994 IEEE International Symposium on Software Reliability Engineering, 1994.
DOI : 10.1109/ISSRE.1994.341392

]. L. Dbr08, N. De-moura, and . Bjø-rner, Z3 : An efficient SMT solver. Tools and Algorithms for the Construction and Analysis of Systems, pp.337-340, 2008.

[. Dadeau, P. Héam, and R. Kheddam, Mutation-Based Test Generation from Security Protocols in HLPSL, 2011 Fourth IEEE International Conference on Software Testing, Verification and Validation, pp.240-248, 2011.
DOI : 10.1109/ICST.2011.42

URL : https://hal.archives-ouvertes.fr/inria-00559850

[. Do, S. Mirarab, L. Tahvildari, and G. Rothermel, The Effects of Time Constraints on Test Case Prioritization: A Series of Controlled Experiments, IEEE Transactions on Software Engineering, vol.36, issue.5, pp.593-617, 2010.
DOI : 10.1109/TSE.2010.58

E. Engström, M. Skoglund, and P. Runeson, Empirical evaluations of regression test selection techniques, Proceedings of the Second ACM-IEEE international symposium on Empirical software engineering and measurement, ESEM '08, pp.22-31, 2008.
DOI : 10.1145/1414004.1414011

[. Felderer, B. Agreiter, R. Breu, and A. Armenteros, Security testing by telling teststories, LNI, vol.161, pp.195-202, 2010.

M. Felderer, B. Agreiter, P. Zech, and R. Breu, A classification for modelbased security testing, Proceedings of the 3rd International Conference on Advances in System Testing and Validation Lifecycle, pp.109-114, 2011.

G. Fink and M. Bishop, Property-based testing, ACM SIGSOFT Software Engineering Notes, vol.22, issue.4, pp.74-80, 1997.
DOI : 10.1145/263244.263267

F. Fourneret, M. Bouquet, S. Ochoa, and . Wenzel, Vérification et test pour des systèmes évolutifs, AFADL'12, Congrès Approches Formelles dans l'Assistance au Développement de Logiciels, pp.150-164, 2012.

M. Qurat-ul-ann-farooq, Z. Zohaib, . Iqbal, I. Zafar, A. Malik et al., An approach for selective state machine based regression testing, Proceedings of the 3rd international workshop on Advances in model-based testing, A-MOST '07, pp.44-52, 2007.

M. Qurat-ul-ann-farooq, Z. Zohaib, Z. I. Iqbal, M. Malik, and . Riebisch, A model-based regression testing approach for evolving software systems with flexible tool support, Proceedings of the 17th IEEE International Conference and Workshops on the Engineering of Computer- Based Systems, ECBS '10, pp.41-49, 2010.

]. E. Fourneret, M. Ochoa, F. Bouquet, J. Botella, J. Jurjens et al., Model-Based Security Verification and Testing for Smart-cards, 2011 Sixth International Conference on Availability, Reliability and Security, pp.272-279, 2011.
DOI : 10.1109/ARES.2011.46

URL : https://hal.archives-ouvertes.fr/hal-00649256

R. Prakash-gorthi, A. Pasala, K. Kailash, B. Chanduka, and . Leong, Specification-based approach to select regression test suite to validate changed software, Proceedings of the 15th Asia-Pacific Software Engineering Conference, APSEC '08, pp.153-160, 2008.

P. [. Halbwachs, P. Caspi, D. Raymond, and . Pilaud, The synchronous dataflow programming language LUSTRE, Proceedings of the IEEE, pp.1305-1320, 1991.

[. Iec, Information technology ? open systems interconnection ? conformance testing methodology and framework, International ISO/IEC multi?part standard No. 9646, 1994.

J. Jürjens, Secure Systems Development with UML, 2005.

J. Jürjens, Model-based Security Testing Using UMLsec, Electronic Notes in Theoretical Computer Science, vol.220, issue.1, pp.93-104, 2008.
DOI : 10.1016/j.entcs.2008.11.008

C. Jard and T. Jéron, TGV: theory, principles and algorithms, International Journal on Software Tools for Technology Transfer, vol.17, issue.4, pp.297-315, 2005.
DOI : 10.1007/s10009-004-0153-x

T. H. Jiang, W. Tse, N. Grieskamp, Y. Kicillof, X. Cao et al., Regression Testing Process Improvement for Specification Evolution of Real-World Protocol Software, 2010 10th International Conference on Quality Software, pp.62-71, 2010.
DOI : 10.1109/QSIC.2010.55

J. Laski and W. Szermer, Identification of program modifications and its applications in software maintentance, Conference on Software Maintenance, pp.282-290, 1992.

M. Gregory and . Kapfhammer, The Computer Science and Engineering Handbook, chapter Software Testing, 2004.

K. Fischer, F. Raji, and A. Chrusckicki, A methodology for retesting modified software, National Tele. Conference B-6-3, pp.1-6, 1981.

[. Korel, L. H. Tahat, and B. Vaysburg, Model based regression test reduction using dependence analysis, International Conference on Software Maintenance, 2002. Proceedings., p.10, 2002.
DOI : 10.1109/ICSM.2002.1167768

V. Kongsli, Towards agile security in web applications, Companion to the 21st ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications , OOPSLA '06, pp.805-808, 2006.
DOI : 10.1145/1176617.1176727

K. Lano, The B Language and Method : A Guide to Practical Formal Development, 1996.
DOI : 10.1007/978-1-4471-1494-9

T. Gary, A. L. Leavens, C. Baker, and . Ruby, Preliminary design of JML : a behavioral interface specification language for java, SIGSOFT Software Engineering Notes, vol.31, issue.3, pp.1-38, 2006.

[. Ledru, L. Du-bousquet, O. Maury, and P. Bontron, Filtering TOBIAS Combinatorial Test Suites, FASE, pp.281-294, 2004.
DOI : 10.1007/978-3-540-24721-0_21

[. Lund, B. Solhaug, and K. Stølen, Model-Driven Risk Analysis : The CORAS Approach, 2011.
DOI : 10.1007/978-3-642-12323-8

L. [. Leung and . White, Insights into regression testing (software testing), Proceedings. Conference on Software Maintenance, 1989, pp.60-69, 1989.
DOI : 10.1109/ICSM.1989.65194

. Meh, M. Dharmesh, and . Mehta, Effective software security management

]. O. Mldb03, Y. Maury, L. Ledru, and . Bousquet, Intégration de TOBIAS et UCAS- TING pour la génération de tests, 16th International Conference Software & Systems Engineering and their Applications-ICSSEA'03, 2003.

T. Mouelhi, Testing and Modeling Security Mechanisms in Web Applications, 2010.
URL : https://hal.archives-ouvertes.fr/tel-00544431

G. Mcgraw and B. Potter, Software security testing, IEEE Security and Privacy, vol.2, issue.5, pp.81-85, 2004.

P. Masson, M. Potet, J. Julliand, R. Tissot, G. Debois et al., An access control model based testing approach for smart card applications : Results of the POSÉ project, JIAS Journal of Information Assurance and Security, vol.10, issue.51, pp.335-351, 2010.

R. Jean, J. M. Moonen, O. Romijn, G. Sies, . Springintveld et al., A two-level approach to automated conformance testing of VHDL designs The Netherlands, Centrum voor Wiskunde en Informatica (CWI). Amsterdam (NL), 1997.

A. Nanda, S. Mani, S. Sinha, M. J. Harrold, and A. Orso, Regression testing in the presence of non-code changes, 2011 Fourth IEEE International Conference on Software Testing, Verification and Validation, pp.21-30, 2011.
DOI : 10.1109/ICST.2011.60

L. Naslavsky and D. J. Richardson, Using traceability to support model-based regression testing, Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering , ASE '07, pp.567-570, 2007.
DOI : 10.1145/1321631.1321744

F. [. Paci, F. Massacci, S. Bouquet, and . Debricon, Managing Evolution by Orchestrating Requirements and Testing Engineering Processes, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation, pp.834-841, 2012.
DOI : 10.1109/ICST.2012.184

]. S. Pro03, JUMBL : A tool for model-based statistical testing, Proceedings of the 36th Annual Hawaii International Conference on System Sciences, 2003.

G. Rothermel and M. J. Harrold, Analyzing regression test selection techniques, IEEE Transactions on Software Engineering, vol.22, issue.8, pp.529-551, 1996.
DOI : 10.1109/32.536955

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.224.870

G. Rothermel and M. J. Harrold, A safe, efficient regression test selection technique, ACM Transactions on Software Engineering and Methodology, vol.6, issue.2, pp.173-210, 1997.
DOI : 10.1145/248233.248262

M. J. Gregg-rothermel, T. L. Harrold, J. Graves, A. Kim, and . Porter, An empirical study of regression test selection techniques, ACM Transactions on Software Engineering and Methodoligy, vol.10, pp.184-208, 2001.

[. Schieferdecker, J. Großmann, and A. Rennoch, Model based security testing Selected Considerations. Keynote at SECTEST at ICST, 2011.

[. Schieferdecker, J. Grossmann, and M. Schneider, Model-Based Security Testing, MBT, pp.1-12, 2012.
DOI : 10.4204/EPTCS.80.1

G. Smith, The Object-Z specification language, 2000.
DOI : 10.1007/978-1-4615-5265-9

[. Stallbaum, A. Metzger, and K. Pohl, An automated technique for risk-based test case generation and prioritization, Proceedings of the 3rd international workshop on Automation of software test , AST '08, pp.67-70, 2008.
DOI : 10.1145/1370042.1370057

H. [. Tretmans and . Brinksma, TorX : Automated model-based testing, Proceedings of the 1st Europeqn Conference on Model-Driven Software Engineering, pp.31-43, 2003.

L. Ho-tahat, A. Bader, B. Vaysburg, and B. Korel, Requirement-based automated black-box test generation, 25th Annual International Computer Software and Applications Conference. COMPSAC 2001, pp.489-495, 2001.
DOI : 10.1109/CMPSAC.2001.960658

J. Tretmans, Model?based testing : Property checking for real Keynote addressed at the International Workshop for Construction and Analysis of Safe Secure, and Interoperable Smart Devices, 2004.

. Gu-tian-yang, Shi Yin-sheng, and Fang You-yuan. Research on software security testing, World Academy of Science, Engineering and Technology, vol.70, 2010.

M. Utting and B. Legeard, Practical Model-Based Testing : A Tools Approach, 2007.

H. Ural, R. L. Probert, and Y. Chen, Model based regression test suite generation using dependence analysis, Proceedings of the 3rd International Workshop on Advances in model-based testing, pp.54-62, 2007.

[. Utting, A. Pretschner, and B. Legeard, A taxonomy of model-based testing approaches, Software Testing, Verification and Reliability (STVR), pp.297-312, 2012.
DOI : 10.1002/stvr.456

URL : https://hal.archives-ouvertes.fr/hal-00940611

T. [. Van-aertryck and . Jensen, UML-CASTING : Test synthesis from UML models using constraint resolution, AFADL'03, 2003.

. Vcg-+-08-]-margus, C. Veanes, W. Campbell, W. Grieskamp, N. Schulte et al., Model-based testing of object-oriented reactive systems with spec explorer, Formal Methods and Testing, pp.39-76, 2008.

P. [. Vokolos, Empirical evaluation of the textual differencing regression testing technique, Proceedings. International Conference on Software Maintenance (Cat. No. 98CB36272), pp.44-53, 1998.
DOI : 10.1109/ICSM.1998.738488

J. Warmer and A. Kleppe, The Object Constraint Language : Getting Your Models Ready for MDA, 2003.

J. [. Xu and . Pauli, Threat-Driven Design and Analysis of Secure Software Architectures, Journal of Information Assurance and Security, vol.1, issue.3, pp.171-180, 2006.

L. Xu, M. Thomas, T. Kent, Y. L. Mouelhi, and . Traon, A model-based approach to automated testing of access control policies, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, pp.209-218, 2012.
DOI : 10.1145/2295136.2295173

[. Yoo and M. Harman, Regression testing minimisation, selection and prioritisation : A survey, Software Testing, Verification, and Reliability, 2010.

P. Zech, Risk-Based Security Testing in Cloud Computing Environments, 2011 Fourth IEEE International Conference on Software Testing, Verification and Validation, pp.411-414, 2011.
DOI : 10.1109/ICST.2011.23