Kristian Beckers
- Security Requirements Engineering and Privacy (Problem Frames)
- Security Standards (ISO 27000, Common Criteria)
- Formal Methods and Software Specification Techniques (Z, UML)
- Distributed and Real Time Systems (Peer-to-Peer, Cloud Computing, Voice-over-IP)
- Security Testing (Security Testing Patterns, Fuzzing)
- Context-Pattern
| Year | Title | Author | Journal/Proceedings | Publisher | |
|---|---|---|---|---|---|
| 2014 | A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain [BibTeX] |
Beckers, K., Côté, I., Goeke, L., Güler, S. & Heisel, M. | International Journal of Secure Software Engineering (IJSSE) - Special Issue on 7th International Workshop on Secure Software Engineering (SecSE 2013) | IGI Global | |
BibTeX:
@article{Beckers2014-IJIS},
year = {2014},
title = {A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain},
author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Ludger Goeke and Selim G\"{u}ler and Maritta Heisel},
journal = {International Journal of Secure Software Engineering (IJSSE) - Special Issue on 7th International Workshop on Secure Software Engineering (SecSE 2013)},
publisher = {IGI Global},
volume = {5},
number = {2},
pages = {19 -- 41},
url = {http://www.igi-global.com}
}
|
|||||
| 2014 | Supporting Common Criteria Security Analysis with Problem Frames [BibTeX] |
Beckers, K., Hatebur, D. & Heisel, M. | Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) | Innovative Information Science & Technology Research Group (ISYOU) | |
BibTeX:
@article{Beckers2014-Jowua},
year = {2014},
title = {Supporting Common Criteria Security Analysis with Problem Frames},
author = {Kristian Beckers and Denis Hatebur and Maritta Heisel},
journal = {Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)},
publisher = {Innovative Information Science & Technology Research Group (ISYOU)},
volume = {5},
number = {1},
pages = {37-63},
url = {http://isyou.info/}
}
|
|||||
| 2014 | Goal-based Establishment of an Information Security Management System compliant to ISO 27001 [BibTeX] |
Beckers, K. | SOFSEM 2014: Theory and Practice of Computer Science | Springer | |
BibTeX:
@incollection{Beckers2014-sofsem},
year = {2014},
title = {Goal-based Establishment of an Information Security Management System compliant to ISO 27001},
booktitle = {SOFSEM 2014: Theory and Practice of Computer Science},
author = {Kristian Beckers},
publisher = {Springer},
series = {LNCS 8327},
pages = {102-113},
url = {http://www.springerlink.com/}
}
|
|||||
| 2014 | A Threat Analysis Methodology for Smart Home Scenarios [BibTeX] |
Beckers, K., Faßbender, S., Heisel, M. & Suppan, S. | Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14) | Springer | |
BibTeX:
@conference{BFHS2014},
year = {2014},
title = {{A} {T}hreat {A}nalysis {M}ethodology for {S}mart {H}ome {S}cenarios},
booktitle = {Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)},
author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Santiago Suppan},
publisher = {Springer},
series = {LNCS 8448},
pages = {Pages 94-124},
url = {http://www.springerlink.com/}
}
|
|||||
| 2014 | Considering Attacker Motivation in Attack Graphs Analysis in a Smart Grid Scenario [BibTeX] |
Beckers, K., Heisel, M., Krautsevich, L., Maritnelli, F. & Yautsiukhin, A. | Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14) | Springer Berlin Heidelberg | |
BibTeX:
@conference{BHKMY2014},
year = {2014},
title = {{C}onsidering {A}ttacker {M}otivation in {A}ttack {G}raphs {A}nalysis in a {S}mart {G}rid {S}cenario},
booktitle = {Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)},
author = {Kristian Beckers and Maritta Heisel and Leanid Krautsevich and Fabio Maritnelli and Artsiom Yautsiukhin},
publisher = {Springer Berlin Heidelberg},
series = {LNCS 8448},
pages = {Pages 30-47},
url = {http://www.springerlink.com/}
}
|
|||||
| 2014 | ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System [BibTeX] |
Beckers, K., Heisel, M., Solhaug, B. & Stølen, K. | Advances in Engineering Secure Future Internet Services and Systems | Springer | |
BibTeX:
@inproceedings{BHSS2014},
year = {2014},
title = {ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System},
booktitle = {Advances in Engineering Secure Future Internet Services and Systems},
author = {Kristian Beckers and Maritta Heisel and Bj{\o}rnar Solhaug and Ketil St{\o}len},
publisher = {Springer},
number = {8431},
series = {LNCS State-of-the-Art Surveys},
pages = {315-344},
url = {http://www.springerlink.com/}
}
|
|||||
| 2014 | A Structured Comparison of Security Standards [BibTeX] |
Beckers, K., Côté, I., Fenz, S., Hatebur, D. & Heisel, M. | Advances in Engineering Secure Future Internet Services and Systems | Springer | |
BibTeX:
@inproceedings{Lopez2014},
year = {2014},
title = {A Structured Comparison of Security Standards},
booktitle = {Advances in Engineering Secure Future Internet Services and Systems},
author = {Kristian Beckers and Isabelle C\^{o}t\'{e} and Stefan Fenz and Denis Hatebur and Maritta Heisel},
publisher = {Springer},
number = {8431},
series = {LNCS State-of-the-Art Surveys},
pages = {1-34},
url = {http://www.springerlink.com/}
}
|
|||||
| 2014 | Trust-Aware Decision-Making Methodology for Cloud Sourcing [BibTeX] |
Moyano, F., Beckers, K. & Fernandez-Gago, C. | In the proceedings of the 26th International Conference on Advanced Information Systems Engineering (CAiSE) | Springer | |
BibTeX:
@conference{MBG2014},
year = {2014},
title = {Trust-Aware Decision-Making Methodology for Cloud Sourcing},
booktitle = {In the proceedings of the 26th International Conference on Advanced Information Systems Engineering (CAiSE)},
author = {Francisco Moyano and Kristian Beckers and Carmen Fernandez-Gago},
publisher = {Springer},
series = {LNCS 8484},
pages = {136 -- 149},
url = {http://www.springerlink.com/}
}
|
|||||
| 2014 | Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements [BibTeX] |
Moyano, F., Fernandez-Gago, C., Beckers, K. & Heisel, M. | Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14) | Springer | |
BibTeX:
@conference{MGBH2014},
year = {2014},
title = {Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements},
booktitle = {Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)},
author = {Francisco Moyano and Carmen Fernandez-Gago and Kristian Beckers and Maritta Heisel},
publisher = {Springer},
series = {LNCS 8448},
pages = {166 -- 180},
url = {http://www.springerlink.com/}
}
|
|||||
| 2014 | Analysis of Social Engineering Threats with Attack Graphs [BibTeX] |
Beckers, K., Krautsevich, L. & Yautsiukhin, A. | Proceedings of the 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA) - Affiliated workshop with ESORICS | Springer | |
BibTeX:
@inproceedings{QASA2014},
year = {2014},
title = {{Analysis of Social Engineering Threats with Attack Graphs}},
booktitle = {{Proceedings of the 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA) - Affiliated workshop with ESORICS}},
author = {Kristian Beckers and Leanid Krautsevich and Artsiom Yautsiukhin},
publisher = {Springer},
series = {LNCS},
pages = {to appear},
url = {http://www.springerlink.com/}
}
|
|||||
| 2014 | A Catalog of Security Requirements Patterns for the Domain of Cloud Computing Systems [BibTeX] |
Beckers, K., Côté, I. & Goeke, L. | Proceedings 29th Symposium on Applied Computing | ACM | |
BibTeX:
@conference{SAC2014},
year = {2014},
title = {{A Catalog of Security Requirements Patterns for the Domain of Cloud Computing Systems}},
booktitle = {Proceedings 29th Symposium on Applied Computing},
author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Ludger Goeke},
publisher = {ACM},
pages = {337-342},
url = {http://dl.acm.org/}
}
|
|||||
| 2014 | Systematic Derivation of Functional Safety Requirements for Automotive Systems [BibTeX] |
Beckers, K., Côté, I., Frese, T., Hatebur, D. & Heisel, M. | Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP) | Springer | |
BibTeX:
@inproceedings{Safecomp2014},
year = {2014},
title = {{Systematic Derivation of Functional Safety Requirements for Automotive Systems}},
booktitle = {{Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP)}},
author = {Kristian Beckers and Isabelle C\^ot\'e and Thomas Frese and Denis Hatebur and Maritta Heisel},
publisher = {Springer},
series = {LNCS 8666},
pages = {65--80},
url = {http://www.springerlink.com/}
}
|
|||||
| 2014 | A Problem-based Approach for Computer Aided Privacy Threat Identification [BibTeX] |
Beckers, K., Faßbender, S., Heisel, M. & Meis, R. | APF 2012 | Springer | |
BibTeX:
@inproceedings{threatID2012},
year = {2014},
title = {A Problem-based Approach for Computer Aided Privacy Threat Identification},
booktitle = {APF 2012},
author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Rene Meis},
publisher = {Springer},
volume = {8319},
series = {LNCS},
pages = {1--16},
url = {http://www.springerlink.com/}
}
|
|||||
| 2014 | Privacy-Aware Cloud Deployment Scenario Selection [BibTeX] |
Beckers, K., Faßbender, S., Gritzalis, S., Heisel, M., Kalloniatis, C. & Meis, R. | Trust, Privacy, and Security in Digital Business | Springer | |
BibTeX:
@inproceedings{TrustBus2014},
year = {2014},
title = {Privacy-Aware Cloud Deployment Scenario Selection},
booktitle = {Trust, Privacy, and Security in Digital Business},
author = {Beckers, K. and Fa\ss{}bender, S. and Gritzalis, S. and Heisel, M. and Kalloniatis, C. and Meis, R.},
publisher = {Springer},
volume = {8647},
series = {LNCS},
pages = {94-105},
url = {http://www.springerlink.com/}
}
|
|||||
| 2013 | A Problem-based Threat Analysis in compliance with Common Criteria [BibTeX] |
Beckers, K., Hatebur, D. & Heisel, M. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2013-ares1},
year = {2013},
title = { A Problem-based Threat Analysis in compliance with Common Criteria },
booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES})},
author = {Kristian Beckers and Denis Hatebur and Maritta Heisel},
publisher = {IEEE Computer Society},
pages = {111-120},
url = {http://www.ieee.org/}
}
|
|||||
| 2013 | Structured Pattern-Based Security Requirements Elicitation for Clouds [BibTeX] |
Beckers, K., Côté, I., Goeke, L., Güler, S. & Heisel, M. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 7th International Workshop on Secure Software Engineering (SecSE 2013) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2013-ares2},
year = {2013},
title = {Structured Pattern-Based Security Requirements Elicitation for Clouds },
booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 7th International Workshop on Secure Software Engineering (SecSE 2013)},
author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Ludger Goeke and Selim G\"{u}ler and Maritta Heisel},
publisher = {IEEE Computer Society},
pages = {465-474},
url = {http://www.ieee.org/}
}
|
|||||
| 2013 | A Usability Evaluation of the NESSoS Common Body of Knowledge [BibTeX] |
Beckers, K. & Heisel, M. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 2nd International Workshop on Security Ontologies and Taxonomies(SecOnT 2013) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2013-ares3},
year = {2013},
title = { A Usability Evaluation of the NESSoS Common Body of Knowledge},
booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 2nd International Workshop on Security Ontologies and Taxonomies(SecOnT 2013)},
author = {Kristian Beckers and Maritta Heisel},
publisher = {IEEE Computer Society},
pages = {559-568},
url = {http://www.ieee.org/}
}
|
|||||
| 2013 | A mapping between ITIL and ISO 27001 processes for use by a high availability video conference service provider [BibTeX] |
Beckers, K., Hofbauer, S., Quirchmayr, G. & Wills, C. C. | Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013) | Springer | |
BibTeX:
@inproceedings{Beckers2013-cdares1},
year = {2013},
title = {A mapping between ITIL and ISO 27001 processes for use by a high availability video conference service provider},
booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013)},
author = {Kristian Beckers and Stefan Hofbauer and Gerald Quirchmayr and Christopher C. Wills},
publisher = {Springer},
series = {LNCS 8127},
pages = {224-239},
url = {http://www.springerlink.com/}
}
|
|||||
| 2013 | Combining Goal-oriented and Problem-oriented Requirements Engineering Methods [BibTeX] |
Beckers, K., Faßbender, S., Heisel, M. & Paci, F. | Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013) | Springer | |
BibTeX:
@inproceedings{Beckers2013-cdares2},
year = {2013},
title = {Combining Goal-oriented and Problem-oriented Requirements Engineering Methods},
booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013)},
author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Federica Paci},
publisher = {Springer},
series = {LNCS 8127},
pages = {178-194},
url = {http://www.springerlink.com/}
}
|
|||||
| 2013 | A Meta-Model Approach to the Fundamentals for a Pattern Language for Context Elicitation [BibTeX] |
Beckers, K., Faßbender, S. & Heisel, M. | Proceedings of the 18th European Conference on Pattern Languages of Programs (Europlop) | ACM | |
BibTeX:
@inproceedings{Beckers2013-europlop},
year = {2013},
title = {A Meta-Model Approach to the Fundamentals for a Pattern Language for Context Elicitation},
booktitle = {Proceedings of the 18th European Conference on Pattern Languages of Programs (Europlop)},
author = {Beckers, Kristian and Fa{\ss}bender, Stephan and Heisel, Maritta},
publisher = {ACM},
pages = {-},
note = {Accepted for Publication},
url = {http://dl.acm.org/}
}
|
|||||
| 2013 | A Structured and Model-Based Hazard Analysis and Risk Assessment Method for Automotive Systems [BibTeX] |
Beckers, K., Frese, T., Hatebur, D. & Heisel, M. | Proceedings of the 24th IEEE International Symposium on Software Reliability Engineering | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2013-issre},
year = {2013},
title = {{A Structured and Model-Based Hazard Analysis and Risk Assessment Method for Automotive Systems}},
booktitle = {Proceedings of the 24th IEEE International Symposium on Software Reliability Engineering},
author = {Kristian Beckers and Thomas Frese and Denis Hatebur and Maritta Heisel},
publisher = {IEEE Computer Society},
pages = {238-247},
url = {http://www.ieee.org/}
}
|
|||||
| 2013 | A pattern-based method for establishing a cloud-specific information security management system [BibTeX] |
Beckers, K., Côté, I., Faßbender, S., Heisel, M. & Hofbauer, S. | Requirements Engineering | Springer-Verlag | |
BibTeX:
@article{Beckers2013rohtua},
year = {2013},
title = {A pattern-based method for establishing a cloud-specific information security management system},
author = {Beckers, Kristian and C{\^o}t{\'e}, Isabelle and Fa{\ss}bender, Stephan and Heisel, Maritta and Hofbauer, Stefan},
journal = {Requirements Engineering},
publisher = {Springer-Verlag},
pages = {1-53},
url = {http://www.springerlink.com/}
}
|
|||||
| 2013 | Common Criteria CompliAnt Software Development (CC-CASD) [BibTeX] |
Beckers, K., Côté, I., Hatebur, D., Faßbender, S. & Heisel, M. | Proceedings 28th Symposium on Applied Computing | ACM | |
BibTeX:
@conference{SAC2013},
year = {2013},
title = {{C}ommon {C}riteria {C}ompli{A}nt {S}oftware {D}evelopment ({CC}-{CASD})},
booktitle = {Proceedings 28th Symposium on Applied Computing},
author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Denis Hatebur and Stephan Fa{\ss}bender and Maritta Heisel},
publisher = {ACM},
pages = {937-943},
url = {http://dl.acm.org/}
}
|
|||||
| 2012 | Ontology-Based Identification of Research Gaps and Immature Research Areas [BibTeX] |
Beckers, K., Eicker, S., Faßbender, S., Heisel, M., Schmidt, H. & Schwittek, W. | Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012) | Springer | |
BibTeX:
@inproceedings{Beckers2012-ares1},
year = {2012},
title = {Ontology-Based Identification of Research Gaps and Immature Research Areas},
booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012)},
author = {Kristian Beckers and Stefan Eicker and Stephan Fa{\ss}bender and Maritta Heisel and Holger Schmidt and Widura Schwittek},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
pages = {1-16},
url = {http://www.springerlink.com/}
}
|
|||||
| 2012 | Comparing Privacy Requirements Engineering Approaches [BibTeX] |
Beckers, K. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 6th International Workshop on Secure Software Engineering (SecSE 2012) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2012-ares2},
year = {2012},
title = {Comparing Privacy Requirements Engineering Approaches},
booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 6th International Workshop on Secure Software Engineering (SecSE 2012)},
author = {Kristian Beckers},
publisher = {IEEE Computer Society},
pages = {574-581},
url = {http://www.ieee.org/}
}
|
|||||
| 2012 | A Foundation for Requirements Analysis of Privacy Preserving Software [BibTeX] |
Beckers, K. & Heisel, M. | Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012) | Springer | |
BibTeX:
@inproceedings{Beckers2012-ares3},
year = {2012},
title = {A Foundation for Requirements Analysis of Privacy Preserving Software},
booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012)},
author = {Kristian Beckers and Maritta Heisel},
publisher = {Springer},
volume = {7465},
series = {Lecture Notes in Computer Science},
pages = {93-107},
url = {http://www.springerlink.com/}
}
|
|||||
| 2012 | Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation [BibTeX] |
Beckers, K., Heisel, M., Faßbender, S. & Schmidt, H. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2012-ares4},
year = {2012},
title = {Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation},
booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES})},
author = {Kristian Beckers and Maritta Heisel and Stephan Fa{\ss}bender and Holger Schmidt},
publisher = {IEEE Computer Society},
pages = {243-248},
url = {http://www.ieee.org/}
}
|
|||||
| 2012 | An integrated Method for Pattern-based Elicitation of Legal Requirements applied to a Cloud Computing Example [BibTeX] |
Beckers, K., Faßbender, S. & Schmidt, H. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2012-ares5},
year = {2012},
title = {An integrated Method for Pattern-based Elicitation of Legal Requirements applied to a Cloud Computing Example},
booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012)},
author = {Kristian Beckers and Stephan Fa{\ss}bender and Holger Schmidt},
publisher = {IEEE Computer Society},
pages = {463-472},
url = {http://www.ieee.org/}
}
|
|||||
| 2012 | Peer-to-Peer driven Software Engineering considering Security, Reliability, and Performance [BibTeX] |
Beckers, K. & Faßbender, S. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2012-ares6},
year = {2012},
title = {Peer-to-Peer driven Software Engineering considering Security, Reliability, and Performance},
booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012)},
author = {Kristian Beckers and Stephan Fa{\ss}bender},
publisher = {IEEE Computer Society},
pages = {485-494},
url = {http://www.ieee.org/}
}
|
|||||
| 2012 | A Common Body of Knowledge for Engineering Secure Software and Services [BibTeX] |
Schwittek, W., Schmidt, H., Beckers, K., Eicker, S., Faßbender, S. & Heisel, M. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 1st International Workshop on Security Ontologies and Taxonomies(SecOnT 2012) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2012-ares7},
year = {2012},
title = {A Common Body of Knowledge for Engineering Secure Software and Services},
booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 1st International Workshop on Security Ontologies and Taxonomies(SecOnT 2012)},
author = {Widura Schwittek and Holger Schmidt and Kristian Beckers and Stefan Eicker and Stephan Fa{\ss}bender and Maritta Heisel},
publisher = {IEEE Computer Society},
pages = {499-506},
url = {http://www.ieee.org/}
}
|
|||||
| 2012 | A privacy preserving approach to Call Detail Records analysis in VoIP systems [BibTeX] |
Hofbauer, S., Beckers, K. & Quirchmayr, G. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 7th International Workshop on Frontiers in Availability, Reliabilityand Security (FARES 2012) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2012-ares8},
year = {2012},
title = {A privacy preserving approach to Call Detail Records analysis in VoIP systems},
booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 7th International Workshop on Frontiers in Availability, Reliabilityand Security (FARES 2012)},
author = {Stefan Hofbauer AND Kristian Beckers AND Gerald Quirchmayr},
publisher = {IEEE Computer Society},
pages = {307-316},
url = {http://www.ieee.org/}
}
|
|||||
| 2012 | Supporting the Development and Documentation of Trustworthy ICT Systems according to Security Standard through Patterns and Security Requirements Engineering Approaches [BibTeX] |
Beckers, K. | Electronic Proc. of the 1st ESSoS Doctoral Symposium, ESSoS-DS 2012 | CEUR-WS.org | |
BibTeX:
@conference{BeckersESoSDS2012},
year = {2012},
title = {{S}upporting the {D}evelopment and {D}ocumentation of {T}rustworthy {ICT} {S}ystems according to {S}ecurity {S}tandard through {P}atterns and {S}ecurity {R}equirements {E}ngineering {A}pproaches},
booktitle = {Electronic Proc. of the 1st ESSoS Doctoral Symposium, ESSoS-DS 2012},
author = {Kristian Beckers},
publisher = {CEUR-WS.org},
volume = {834},
pages = {65-70},
url = {http://CEUR-WS.org}
}
|
|||||
| 2012 | Supporting the Context Establishment according to ISO 27005 using Patterns [BibTeX] |
Beckers, K. & Faßbender, S. | Software Engineering 2012 - Workshopband | GI | |
BibTeX:
@inproceedings{beckersF12zemoss},
year = {2012},
title = {Supporting the Context Establishment according to ISO 27005 using Patterns},
booktitle = {Software Engineering 2012 - Workshopband},
author = {Kristian Beckers and Stephan Fa{\ss}bender},
publisher = {GI},
pages = {141-146},
note = {Workshop Zertifizierung und modellgetriebene Entwicklung sicherer Software, Software Engineering 2012 (ZeMoSS'12)},
url = {http://www.gi.com/}
}
|
|||||
| 2012 | Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches [BibTeX] |
Beckers, K., Faßbender, S., Heisel, M., Küster, J.-C. & Schmidt, H. | Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS) | Springer | |
BibTeX:
@inproceedings{BeckersFHKS12},
year = {2012},
title = {Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches},
booktitle = {Proceedings of the International Symposium on Engineering Secure Software and Systems ({ESSoS})},
author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Jan-Christoph K{\"u}ster and Holger Schmidt},
publisher = {Springer},
series = {LNCS},
pages = {14-21},
url = {http://www.springerlink.com/}
}
|
|||||
| 2012 | A Pattern-Based Method for Identifying and Analyzing Laws [BibTeX] |
Beckers, K., Faßbender, S., Küster, J.-C. & Schmidt, H. | Proceedings of the International Working Conference onRequirements Engineering: Foundation for Software Quality (REFSQ) | Springer | |
BibTeX:
@inproceedings{BeckersFKS12},
year = {2012},
title = {A Pattern-Based Method for Identifying and Analyzing Laws},
booktitle = {Proceedings of the International Working Conference onRequirements Engineering: Foundation for Software Quality ({REFSQ})},
author = {Kristian Beckers and Stephan Fa{\ss}bender and Jan-Christoph K{\"u}ster and Holger Schmidt},
publisher = {Springer},
series = {LNCS},
pages = {256-262},
url = {http://www.springerlink.com/}
}
|
|||||
| 2012 | Patterns- and Security-Requirements-Engineering-based Support for Development and Documentation of Security Standard Compliant ICT Systems [BibTeX] |
Beckers, K. | DOKTORANDENSYMPOSIUM DER SOFTWARE ENGINEERING 2012 PROCEEDINGS | Brandenburg University of Technology | |
BibTeX:
@conference{BeckersSE2012},
year = {2012},
title = {{P}atterns- and {S}ecurity-{R}equirements-{E}ngineering-based {S}upport for {D}evelopment and {D}ocumentation of {S}ecurity {S}tandard {C}ompliant {ICT} {S}ystems},
booktitle = {DOKTORANDENSYMPOSIUM DER SOFTWARE ENGINEERING 2012 PROCEEDINGS},
author = {Kristian Beckers},
publisher = {Brandenburg University of Technology},
volume = {01/12},
pages = {25-30},
url = {http://www-docs.tu-cottbus.de/programmiersprachen-compilerbau/public/publikationen/2012/DS-SE-2012.pdf}
}
|
|||||
| 2012 | Conducting a Privacy Impact Analysis for the Analysis of Communication Records [BibTeX] |
Hofbauer, S., Beckers, K. & Quirchmayr, G. | Proceedings of The International Conferences on Perspectives in Business Informatics Research (BIR 2012) | Springer | |
BibTeX:
@inproceedings{hofbauer2012privacymethod},
year = {2012},
title = {Conducting a Privacy Impact Analysis for the Analysis of Communication Records},
booktitle = {Proceedings of The International Conferences on Perspectives in Business Informatics Research (BIR 2012)},
author = {Stefan Hofbauer AND Kristian Beckers AND Gerald Quirchmayr},
publisher = {Springer},
volume = {128},
series = {Lecture Notes in Business Information Processing},
pages = {148-161},
url = {http://www.springerlink.com/}
}
|
|||||
| 2012 | A Lightweight Privacy Preserving Approach for Analysing Communication Records to Prevent VoIP Attacks using Toll Fraud as an Example [BibTeX] |
Hofbauer, S., Beckers, K., Quirchmayr, G. & Sorge, C. | Proceedings of The Second International Symposium on Anonymity and Communication Systems (ACS-2012) | IEEE Computer Society | |
BibTeX:
@inproceedings{hofbauer2012spit},
year = {2012},
title = {A Lightweight Privacy Preserving Approach for Analysing Communication Records to Prevent VoIP Attacks using Toll Fraud as an Example},
booktitle = {Proceedings of The Second International Symposium on Anonymity and Communication Systems (ACS-2012)},
author = {Stefan Hofbauer AND Kristian Beckers AND Gerald Quirchmayr AND Christoph Sorge},
publisher = {IEEE Computer Society},
pages = {992-997},
url = {http://www.ieee.org/}
}
|
|||||
| 2012 | Pattern-based Context Establishment for Service-Oriented Architectures [BibTeX] |
Beckers, K., Faßbender, S., Heisel, M. & Meis, R. | Software Service and Application Engineering | Springer | |
BibTeX:
@inproceedings{sdps2012},
year = {2012},
title = {Pattern-based Context Establishment for Service-Oriented Architectures},
booktitle = {Software Service and Application Engineering},
author = {Beckers, Kristian and Fa\ss{}bender, Stephan and Heisel, Maritta and Meis, Rene},
publisher = {Springer},
series = {LNCS 7365},
pages = {81-101},
url = {http://www.springerlink.com/}
}
|
|||||
| 2011 | Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing [BibTeX] |
Beckers, K., Küster, J.-C., Faßbender, S. & Schmidt, H. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2011},
year = {2011},
title = {Pattern-Based Support for Context Establishment and Asset Identification of the {ISO} 27000 in the Field of Cloud Computing},
booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES})},
author = {Kristian Beckers and Jan-Christoph K{\"u}ster and Stephan Fa{\ss}bender and Holger Schmidt},
publisher = {IEEE Computer Society},
pages = {327--333},
url = {http://www.ieee.org/}
}
|
|||||
| 2010 | Security and Compliance in Clouds [BibTeX] |
Beckers, K. & Jürjens, J. | ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference | Vieweg + Teubner | |
BibTeX:
@inproceedings{Beckers2010},
year = {2010},
title = {Security and Compliance in Clouds},
booktitle = {ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference},
author = {Kristian Beckers and Jan J\"{u}rjens},
publisher = {Vieweg + Teubner},
pages = {91 - 101},
url = {http://www.springer-vieweg.de}
}
|
|||||
| 2010 | Process Intelligence in der Finanzwirtschaft [BibTeX] |
Gsell, H., Weißenberg, N., Beckers, K. & Hirsch, M. | ERP ManagementSoftware as a Service, Cloud Computing und Mobile Technologien | GITO Verlag | |
BibTeX:
@inproceedings{Gsell2010},
year = {2010},
title = {Process Intelligence in der Finanzwirtschaft},
booktitle = {Software as a Service, Cloud Computing und Mobile Technologien},
author = {Heiko Gsell and Norbert Wei{\ss}enberg and Kristian Beckers and Martin Hirsch},
journal = {ERP Management},
publisher = {GITO Verlag},
pages = {63 - 75},
url = {www.gito.de}
}
|
|||||
| 2010 | Process Compliance und Process Intelligence in der Finanzwirtschaft [BibTeX] |
Hüning, N., Gsell, H., Weißenberg, N., Hirsch, M. & Beckers, K. | ERP Management | GITO Verlag | |
BibTeX:
@article{Huening2010},
year = {2010},
title = {Process Compliance und Process Intelligence in der Finanzwirtschaft},
author = {Nadine H\"{u}ning and Heiko Gsell and Norbert Wei{\ss}enberg and Martin Hirsch and Kristian Beckers},
journal = {ERP Management},
publisher = {GITO Verlag},
volume = {2},
pages = {39 - 42},
url = {www.gito.de}
}
|
|||||
| 2009 | Single-message denial-of-service attacks against voice-over- internet protocol terminals [BibTeX] |
Seedorf, J., Beckers, K. & Huici, F. | International Journal of Electronic Security and Digital Forensics | Inderscience Publishers | |
BibTeX:
@article{sip09DOS},
year = {2009},
title = {Single-message denial-of-service attacks against voice-over- internet protocol terminals},
author = {Jan Seedorf and Kristian Beckers and Felipe Huici},
journal = {International Journal of Electronic Security and Digital Forensics},
publisher = {Inderscience Publishers},
volume = {2},
pages = {29-34},
url = {http://dx.doi.org/10.1504/IJESDF.2009.023873},
doi = {10.1504/IJESDF.2009.023873}
}
|
|||||
| 2008 | Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks [BibTeX] |
Seedorf, J., Beckers, K. & Huici, F. | Communications in Computer and Information Science | Springer | |
BibTeX:
@article{sip08Dos},
year = {2008},
title = {Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks},
author = {Jan Seedorf and Kristian Beckers and Felipe Huici},
journal = {Communications in Computer and Information Science},
publisher = {Springer},
volume = {12},
series = {CCIS},
pages = {61-64},
url = {http://www.springerlink.com/}
}
|
|||||
Proposed Bachelor, Diploma and Master thesis
| Titel | Art der Arbeit |
|---|
Teaching
Sommer semester 2013 - Seminar Modelbased Privacy and Security Requirements Engineering
Winter semester 2012/2013 - Seminar Online Privacy
Summer semester 2012 - Exercises for Development of Safe and Secure Software
Winter semester 2011/2012 - Exercises for Formal Specification von Softwaresystems
Winter semester 2011/2012 - Seminar Cloud Computing Architectures considering Security and Compliance
Summer semester 2011 - Exercises for Algorithms und Data Structures
Talks
08.04.2013 - Essen
VDE EWNS 2012 Workshop for Network Security in Essen
Thema:"Identification of Research Gaps in the NESSoS Common Body of Knowledge"
http://wiki.uni-due.de/TdR/images/6/6e/Programm_EWNS2013.pdf
29.03.2012 - Essen
VDE EWNS 2012 Workshop for Network Security in Essen
Thema: "Eine Methode zur Anforderungsanalyse von Privacy nach Common Criteria"
http://www.vde.com/de/Veranstaltungen/Workshops/Seiten/VeranstaltungsDetails.aspx?vdeEventID=43d3d89c-9110-45f2-9a02-1d16b2705323
08.04.2011 - Darmstadt
GI Fachgruppe KuVS - Kommunikation und Verteilte Systeme Fachgespräch zu Cloud Security
Thema: "Pattern-Based Compliance and Security Engineering for Clouds"
http://www.kuvs.de/fachgespr/sicherheit-fur-cloud-computing/
19.11.2010, - Frankfurt/Main
GI Fachgruppe SECMGT - Management von Informationssicherheit Workshop zum Thema "Compliance Management"
Thema: "Compliance in Clouds – Möglichkeiten zur Überprüfung von Sicherheitszielen im Cloud Computing"
http://www1.gi-ev.de/gliederungen/fachbereiche/sicherheit/fg-secmgt/workshops/2010-11-19/
Thesis
2008 - Diploma Thesis in Collaboration with NEC Research Labs Heidelberg
Title: "Automated Vulnerability Analysis of SIP-Implementations and SIP-specific Signature Generation
for Knowledge-based Intrusion Detection Systems"