Proceedings of the 14th International Working Conference on Variability Modelling of Software-Intensive Systems 2020
DOI: 10.1145/3377024.3377041
|View full text |Cite
|
Sign up to set email alerts
|

Variability meets security

Abstract:  Users may download and print one copy of any publication from the public portal for the purpose of private study or research.  You may not further distribute the material or use it for any profit-making activity or commercial gain  You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 29 publications
0
1
0
Order By: Relevance
“…[23], [55] and their references). This research trend is very similar to the one applied to feature diagrams [56], and it is likely that many results from the software engineering community concerning product lines or configurable systems can be transferred to the security domain [57]. It is worth noticing that the above mentioned approaches do not permit reasoning on the order of steps of the attack, a distinguishing feature that our approach has adopted, together with the ability to undo attack action.…”
Section: Related Workmentioning
confidence: 78%
“…[23], [55] and their references). This research trend is very similar to the one applied to feature diagrams [56], and it is likely that many results from the software engineering community concerning product lines or configurable systems can be transferred to the security domain [57]. It is worth noticing that the above mentioned approaches do not permit reasoning on the order of steps of the attack, a distinguishing feature that our approach has adopted, together with the ability to undo attack action.…”
Section: Related Workmentioning
confidence: 78%