Agile security issues, Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM '10, pp.1-58, 2010. ,
DOI : 10.1145/1852786.1852860
Risk-based testing:, Journal of Systems and Software, vol.53, issue.3, pp.287-295, 2000. ,
DOI : 10.1016/S0164-1212(00)00019-4
Introduction to Software Testing, 2008. ,
DOI : 10.1017/CBO9780511809163
Software Engineering Body of Knowledge (SWEBOK), 2004. ,
Automatic test generation with AGATHA, TACAS, pp.591-596, 2003. ,
A subset of precise UML for model-based testing, Proceedings of the 3rd international workshop on Advances in model-based testing , A-MOST '07, pp.95-104, 2007. ,
DOI : 10.1145/1291535.1291545
URL : https://hal.archives-ouvertes.fr/hal-00563283
A test generation solution to automate software testing, Proceedings of the 3rd international workshop on Automation of software test , AST '08, pp.45-48, 2008. ,
DOI : 10.1145/1370042.1370052
Automating regression test selection based on UML designs, Information and Software Technology, vol.51, issue.1, p.51, 2009. ,
DOI : 10.1016/j.infsof.2008.09.010
Regression test selection techniques : A survey, Informatica, vol.35, issue.3, pp.289-321, 2011. ,
Transformation rules from UML4MBT meta-model to SMT meta-model for model animation, Proceedings of the 12th Workshop on OCL and Textual Modelling, OCL '12, 2012. ,
DOI : 10.1145/2428516.2428526
Scenario based test generation using test designer, Proceedings of the 1st International Workshop on Scenario Based Testing ? co-located with ICST'2011, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00640382
The Automatic Efficient Test Generator (AETG) system, Proceedings of 1994 IEEE International Symposium on Software Reliability Engineering, 1994. ,
DOI : 10.1109/ISSRE.1994.341392
Z3 : An efficient SMT solver. Tools and Algorithms for the Construction and Analysis of Systems, pp.337-340, 2008. ,
Mutation-Based Test Generation from Security Protocols in HLPSL, 2011 Fourth IEEE International Conference on Software Testing, Verification and Validation, pp.240-248, 2011. ,
DOI : 10.1109/ICST.2011.42
URL : https://hal.archives-ouvertes.fr/inria-00559850
The Effects of Time Constraints on Test Case Prioritization: A Series of Controlled Experiments, IEEE Transactions on Software Engineering, vol.36, issue.5, pp.593-617, 2010. ,
DOI : 10.1109/TSE.2010.58
Empirical evaluations of regression test selection techniques, Proceedings of the Second ACM-IEEE international symposium on Empirical software engineering and measurement, ESEM '08, pp.22-31, 2008. ,
DOI : 10.1145/1414004.1414011
Security testing by telling teststories, LNI, vol.161, pp.195-202, 2010. ,
A classification for modelbased security testing, Proceedings of the 3rd International Conference on Advances in System Testing and Validation Lifecycle, pp.109-114, 2011. ,
Property-based testing, ACM SIGSOFT Software Engineering Notes, vol.22, issue.4, pp.74-80, 1997. ,
DOI : 10.1145/263244.263267
Vérification et test pour des systèmes évolutifs, AFADL'12, Congrès Approches Formelles dans l'Assistance au Développement de Logiciels, pp.150-164, 2012. ,
An approach for selective state machine based regression testing, Proceedings of the 3rd international workshop on Advances in model-based testing, A-MOST '07, pp.44-52, 2007. ,
A model-based regression testing approach for evolving software systems with flexible tool support, Proceedings of the 17th IEEE International Conference and Workshops on the Engineering of Computer- Based Systems, ECBS '10, pp.41-49, 2010. ,
Model-Based Security Verification and Testing for Smart-cards, 2011 Sixth International Conference on Availability, Reliability and Security, pp.272-279, 2011. ,
DOI : 10.1109/ARES.2011.46
URL : https://hal.archives-ouvertes.fr/hal-00649256
Specification-based approach to select regression test suite to validate changed software, Proceedings of the 15th Asia-Pacific Software Engineering Conference, APSEC '08, pp.153-160, 2008. ,
The synchronous dataflow programming language LUSTRE, Proceedings of the IEEE, pp.1305-1320, 1991. ,
Information technology ? open systems interconnection ? conformance testing methodology and framework, International ISO/IEC multi?part standard No. 9646, 1994. ,
Secure Systems Development with UML, 2005. ,
Model-based Security Testing Using UMLsec, Electronic Notes in Theoretical Computer Science, vol.220, issue.1, pp.93-104, 2008. ,
DOI : 10.1016/j.entcs.2008.11.008
TGV: theory, principles and algorithms, International Journal on Software Tools for Technology Transfer, vol.17, issue.4, pp.297-315, 2005. ,
DOI : 10.1007/s10009-004-0153-x
Regression Testing Process Improvement for Specification Evolution of Real-World Protocol Software, 2010 10th International Conference on Quality Software, pp.62-71, 2010. ,
DOI : 10.1109/QSIC.2010.55
Identification of program modifications and its applications in software maintentance, Conference on Software Maintenance, pp.282-290, 1992. ,
The Computer Science and Engineering Handbook, chapter Software Testing, 2004. ,
A methodology for retesting modified software, National Tele. Conference B-6-3, pp.1-6, 1981. ,
Model based regression test reduction using dependence analysis, International Conference on Software Maintenance, 2002. Proceedings., p.10, 2002. ,
DOI : 10.1109/ICSM.2002.1167768
Towards agile security in web applications, Companion to the 21st ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications , OOPSLA '06, pp.805-808, 2006. ,
DOI : 10.1145/1176617.1176727
The B Language and Method : A Guide to Practical Formal Development, 1996. ,
DOI : 10.1007/978-1-4471-1494-9
Preliminary design of JML : a behavioral interface specification language for java, SIGSOFT Software Engineering Notes, vol.31, issue.3, pp.1-38, 2006. ,
Filtering TOBIAS Combinatorial Test Suites, FASE, pp.281-294, 2004. ,
DOI : 10.1007/978-3-540-24721-0_21
Model-Driven Risk Analysis : The CORAS Approach, 2011. ,
DOI : 10.1007/978-3-642-12323-8
Insights into regression testing (software testing), Proceedings. Conference on Software Maintenance, 1989, pp.60-69, 1989. ,
DOI : 10.1109/ICSM.1989.65194
Effective software security management ,
Intégration de TOBIAS et UCAS- TING pour la génération de tests, 16th International Conference Software & Systems Engineering and their Applications-ICSSEA'03, 2003. ,
Testing and Modeling Security Mechanisms in Web Applications, 2010. ,
URL : https://hal.archives-ouvertes.fr/tel-00544431
Software security testing, IEEE Security and Privacy, vol.2, issue.5, pp.81-85, 2004. ,
An access control model based testing approach for smart card applications : Results of the POSÉ project, JIAS Journal of Information Assurance and Security, vol.10, issue.51, pp.335-351, 2010. ,
A two-level approach to automated conformance testing of VHDL designs The Netherlands, Centrum voor Wiskunde en Informatica (CWI). Amsterdam (NL), 1997. ,
Regression testing in the presence of non-code changes, 2011 Fourth IEEE International Conference on Software Testing, Verification and Validation, pp.21-30, 2011. ,
DOI : 10.1109/ICST.2011.60
Using traceability to support model-based regression testing, Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering , ASE '07, pp.567-570, 2007. ,
DOI : 10.1145/1321631.1321744
Managing Evolution by Orchestrating Requirements and Testing Engineering Processes, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation, pp.834-841, 2012. ,
DOI : 10.1109/ICST.2012.184
JUMBL : A tool for model-based statistical testing, Proceedings of the 36th Annual Hawaii International Conference on System Sciences, 2003. ,
Analyzing regression test selection techniques, IEEE Transactions on Software Engineering, vol.22, issue.8, pp.529-551, 1996. ,
DOI : 10.1109/32.536955
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.224.870
A safe, efficient regression test selection technique, ACM Transactions on Software Engineering and Methodology, vol.6, issue.2, pp.173-210, 1997. ,
DOI : 10.1145/248233.248262
An empirical study of regression test selection techniques, ACM Transactions on Software Engineering and Methodoligy, vol.10, pp.184-208, 2001. ,
Model based security testing Selected Considerations. Keynote at SECTEST at ICST, 2011. ,
Model-Based Security Testing, MBT, pp.1-12, 2012. ,
DOI : 10.4204/EPTCS.80.1
The Object-Z specification language, 2000. ,
DOI : 10.1007/978-1-4615-5265-9
An automated technique for risk-based test case generation and prioritization, Proceedings of the 3rd international workshop on Automation of software test , AST '08, pp.67-70, 2008. ,
DOI : 10.1145/1370042.1370057
TorX : Automated model-based testing, Proceedings of the 1st Europeqn Conference on Model-Driven Software Engineering, pp.31-43, 2003. ,
Requirement-based automated black-box test generation, 25th Annual International Computer Software and Applications Conference. COMPSAC 2001, pp.489-495, 2001. ,
DOI : 10.1109/CMPSAC.2001.960658
Model?based testing : Property checking for real Keynote addressed at the International Workshop for Construction and Analysis of Safe Secure, and Interoperable Smart Devices, 2004. ,
Shi Yin-sheng, and Fang You-yuan. Research on software security testing, World Academy of Science, Engineering and Technology, vol.70, 2010. ,
Practical Model-Based Testing : A Tools Approach, 2007. ,
Model based regression test suite generation using dependence analysis, Proceedings of the 3rd International Workshop on Advances in model-based testing, pp.54-62, 2007. ,
A taxonomy of model-based testing approaches, Software Testing, Verification and Reliability (STVR), pp.297-312, 2012. ,
DOI : 10.1002/stvr.456
URL : https://hal.archives-ouvertes.fr/hal-00940611
UML-CASTING : Test synthesis from UML models using constraint resolution, AFADL'03, 2003. ,
Model-based testing of object-oriented reactive systems with spec explorer, Formal Methods and Testing, pp.39-76, 2008. ,
Empirical evaluation of the textual differencing regression testing technique, Proceedings. International Conference on Software Maintenance (Cat. No. 98CB36272), pp.44-53, 1998. ,
DOI : 10.1109/ICSM.1998.738488
The Object Constraint Language : Getting Your Models Ready for MDA, 2003. ,
Threat-Driven Design and Analysis of Secure Software Architectures, Journal of Information Assurance and Security, vol.1, issue.3, pp.171-180, 2006. ,
A model-based approach to automated testing of access control policies, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, pp.209-218, 2012. ,
DOI : 10.1145/2295136.2295173
Regression testing minimisation, selection and prioritisation : A survey, Software Testing, Verification, and Reliability, 2010. ,
Risk-Based Security Testing in Cloud Computing Environments, 2011 Fourth IEEE International Conference on Software Testing, Verification and Validation, pp.411-414, 2011. ,
DOI : 10.1109/ICST.2011.23