Personensuche

Personensuche

Bitte geben Sie den Namen der gesuchten Person ein.

Es wurde 1 Person gefunden.

Anschrift
Bismarckstr. 81 (BB)
47057 Duisburg
Raum
BB 919

Funktionen

  • Stellv. Vorsitz, Promotionsausschuss

  • Universitätsprofessor/in, Software Engineering

Die folgenden Publikationen sind in der Online-Universitätsbibliographie der Universität Duisburg-Essen verzeichnet. Weitere Informationen finden Sie gegebenenfalls auch auf den persönlichen Webseiten der Person.

    Artikel in Zeitschriften

  • Díaz Ferreyra, Nicolás E.; Vidoni, Melina; Heisel, Maritta; Scandariato, Riccardo
    Cybersecurity discussions in Stack Overflow : a developer-centred analysis of engagement and self-disclosure behaviour
    In: Social Network Analysis and Mining Jg. 14 (2024) 16
  • Díaz Ferreyra, Nicolás E.; Hecking, Tobias; Aïmeur, Esma; Heisel, Maritta; Hoppe, Heinz Ulrich
    Community detection for access-control decisions : Analysing the role of homophily and information diffusion in Online Social Networks
    In: Online Social Networks and Media Jg. 29 (2022) 100203
  • Borchert, Angela; Heisel, Maritta
    The Role of Trustworthiness Facets for Developing Social Media Applications : A Structured Literature Review
    In: Information Jg. 13 (2022) Nr. 1, 34
  • Borchert, Angela; Heisel, Maritta
    Conflict identification and resolution for trust-related requirements elicitation a goal modeling approach
    In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications Jg. 12 (2021) Nr. 1, S. 111 - 131
  • Díaz Ferreyra, Nicolas Emilio; Kroll, Tobias; Aïmeur, Esma; Stieglitz, Stefan; Heisel, Maritta
    Correction: Nicolás E. Díaz Ferreyra, et al.: Preventative nudges: Introducing risk cues for supporting online self-disclosure decisions
    In: Information Jg. 11 (2020) Nr. 12, S. 555
  • Díaz Ferreyra, Nicolas Emilio; Kroll, Tobias; Aïmeur, Esma; Stieglitz, Stefan; Heisel, Maritta
    Preventative nudges : Introducing risk cues for supporting online self-disclosure decisions
    In: Information Jg. 11 (2020) Nr. 8, S. 399
  • Goeke, Ludger; Gol Mohammadi, Nazila; Heisel, Maritta
    Context analysis of cloud computing systems using a pattern-based approach
    In: Future Internet Jg. 10 (2018) Nr. 8, S. 72
  • Gol Mohammadi, Nazila; Heisel, Maritta
    A framework for systematic refinement of trustworthiness requirements
    In: Information Jg. 8 (2017) Nr. 2, S. 46
  • Beckers, Kristian; Côté, Isabelle; Frese, Thomas; Hatebur, Denis; Heisel, Maritta
    A structured and systematic model-based development method for automotive systems, considering the OEM/supplier interface
    In: Reliability Engineering & System Safety Jg. 158 (2017) S. 172 - 184
  • Meis, Rene; Heisel, Maritta
    Computer-aided identification and validation of intervenability requirements
    In: Information Jg. 8 (2017) Nr. 1, S. 30
  • Heisel, Maritta; Hatebur, Denis; Goeke, Ludger; Côté, Isabelle
    Risiko in der Wolke? : Die Sicherheitsanalyse von Cloud-Anwendungen
    In: Unikate: Berichte aus Forschung und Lehre (2017) Nr. 50: Natur-, Ingenieur- und Wirtschaftswissenschaften - High-Performance und Cloud Computing, S. 16 - 27
  • Meis, Rene; Heisel, Maritta
    Computer-Aided Identification and Validation of Privacy Requirements
    In: Information Jg. 7 (2016) Nr. 2, S. 28
  • Alebrahim, Azadeh; Faßbender, Stephan; Filipczyk, Martin; Goedicke, Michael; Heisel, Maritta; Zdun, Uwe
    Variability for Qualities in Software Architecture
    In: ACM SIGSOFT software engineering notes Jg. 41 (2016) Nr. 1, S. 32 - 35
  • Faßbender, Stephan; Heisel, Maritta
    A computer-aided process from problems to laws in requirements engineering
    In: Communications in computer and information Jg. 457 (2014) S. 215 - 234
  • Beckers, Kristian; Heisel, Maritta; Hatebur, Denis
    Supporting Common Criteria Security Analysis with Problem Frames
    In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) Jg. 5 (2014) Nr. 1, S. 37 - 63
  • Beckers, Kristian; Côté, Isabelle; Faßbender, Stephan; Heisel, Maritta; Hofbauer, Stefan
    A pattern-based method for establishing a cloud-specific information security management system : Establishing information security management systems for clouds considering security, privacy, and legal compliance
    In: Requirements Engineering Jg. 18 (2013) Nr. 4, S. 343 - 395
  • Beckers, Kristian; Côté, Isabelle; Faßbender, Stephan; Heisel, Maritta; Hofbauer, Stefan
    Erratum to: A pattern-based method for establishing a cloud-specific information security management system
    In: Requirements Engineering Jg. 18 (2013) Nr. 4, S. 397
  • Fabian, Benjamin; Gürses, Seda; Heisel, Maritta; Santen, Thomas; Schmidt, Holger
    A comparison of security requirements engineering methods
    In: Requirements Engineering Jg. 15 (2010) Nr. 1, S. 7 - 40
  • Côté, Isabelle; Heisel, Maritta; Wentzlaff, Ina
    Pattern-based Exploration of Design Alternatives for the Evolution of Software Architectures
    In: International Journal of Cooperative Information Systems Jg. 16 (2007) Nr. 3-4, S. 341 - 365
  • Vorworte / Nachworte

  • Mistrik, Ivan; Bahsoon, Rami; Ali, Nour; Heisel, Maritta; Maxim, Bruce
    Preface
    In: Software Architecture for Big Data and the Cloud / Mistrik, Ivan; Bahsoon, Rami; Ali, Nour; Heisel, Maritta; Maxim, Bruce (Hrsg.) (2017) S. xxxi - xxxviii
  • Heisel, Maritta; Marchetti, Eda
    ESSoS Doctoral Symposium 2013
    In: Doctoral Symposium of ESSoS 2013: Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013) / Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013), 27 February - 01 March 2013, Rocquencort, Paris, France / Heisel, Maritta; Marchetti, Eda (Hrsg.) (2013) S. 2 - 3
  • Beiträge in Sammelwerken und Tagungsbänden

  • Leicht, Jens; Heisel, Maritta
    P2BAC: Privacy Policy Based Access Control Using P-LPL
    In: Proceedings of the 9th International Conference on Information Systems Security and Privacy ICISSP: Volume 1 / 9th International Conference on Information Systems Security and Privacy (ICISSP 2023): 22 - 24 February 2023; Lisbon, Portugal 2023, S. 686 - 697
  • Heisel, Maritta; Wagner, Marvin
    Pattern-Based Risk Identification for Model-Based Risk Management
    In: Applicable Formal Methods for Safe Industrial Products 2023, S. 114 - 129
  • Díaz Ferreyra, Nicolás E.; Ostendorf, Sina; Aïmeur, Esma; Heisel, Maritta; Brand, Matthias
    ENAGRAM: An App to Evaluate Preventative Nudges for Instagram
    In: Proceedings of the 2nd European Symposium on Usable Security, EuroUSEC 2022 / EuroUSEC '22: 2nd European Symposium on Usable Security; 29 - 30 September 2022; Karlsruhe, Germany 2022, S. 53 - 63
  • Borchert, Angela; Ferreyra, Nicolás E. Díaz; Heisel, Maritta
    Meeting Strangers Online : Feature Models for Trustworthiness Assessment
    In: Human-Centered Software Engineering: Proceedings / 9th IFIP WG 13.2 International Working Conference, HCSE 2022, Eindhoven, The Netherlands, August 24–26, 2022, / Bernhaupt, Regina; Ardito, Carmelo; Sauer, Stefan (Hrsg.) 2022, S. 3 - 22
  • Leicht, Jens; Heisel, Maritta; Gerl, Armin
    PriPoCoG : Guiding Policy Authors to Define GDPR-Compliant Privacy Policies
    In: Trust, Privacy and Security in Digital Business: Proceedings / Katsikas, Sokratis; Furnell, Steven; 19th International Conference (TrustBus 2022): Vienna, Austria; August 24, 2022 2022, S. 1 - 16
  • Borchert, Angela; Wainakh, Aidmar; Krämer, Nicole; Mühlhäuser, Max; Heisel, Maritta
    The Relevance of Privacy Concerns, Trust, and Risk for Hybrid Social Media
    In: Evaluation of Novel Approaches to Software Engineering: 16th International Conference, ENASE 2021, Virtual Event, April 26-27, 2021 ; Revised Selected Papers / 16th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE) ; April 26-27, 2021, Virtual Event / Ali, Raian; Kaindl, Hermann; Maciaszek, Leszek A. (Hrsg.) 2022, S. 88 - 111
  • Maidl, Monika; Münz, Gerhard; Seltzsam, Stefan; Wagner, Marvin; Wirtz, Roman; Heisel, Maritta
    Model-Based Threat Modeling for Cyber-Physical Systems : A Computer-Aided Approach
    In: Software Technologies: Revised Selected Papers / 15th International Conference, ICSOFT 2020, Online Event, July 7–9, 2020 / van Sinderen, Marten; Maciaszek, Leszek A.; Fill, Hans-Georg (Hrsg.) 2021, S. 158 - 183
  • Sabani, Lirijan; Wirtz, Roman; Heisel, Maritta
    P2P Frames : Pattern-based Characterization of Functional Requirements for Peer-to-peer Systems
    In: ENASE 2021: Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering : online streaming, April 26-27, 2021 / 16th International Conference on Evaluation of Novel Approaches to Software Engineering; 26-27 April 2021; Virtual / Ali, Raian; Kaindl, Hermann; Maciaszek, Leszek (Hrsg.) 2021, S. 239 - 250
  • Heisel, Maritta; Omerovic, Aida
    Risk Identification Based on Architectural Patterns
    In: Quality of Information and Communications Technology: Proceedings / 14th International Conference, QUATIC 2021, Algarve, Portugal, September 8–11, 2021 / Paiva, Ana C. R.; Cavalli, Ana Rosa; Ventura Martins, Paula; Pérez-Castillo, Ricardo (Hrsg.) 2021, S. 341 - 355
  • Wirtz, Roman; Heisel, Maritta
    Risk Treatment : An Iterative Method for Identifying Controls
    In: Evaluation of Novel Approaches to Software Engineering: Revised Selected Papers / 15th International Conference, ENASE 2020, Prague, Czech Republic, May 5–6, 2020 / Ali, Raian; Kaindl, Hermann; Maciaszek, Leszek A. (Hrsg.) 2021, S. 283 - 310
  • Borchert, Angela; Ferreyra, Nicolás; Heisel, Maritta
    A Conceptual Method for Eliciting Trust-related Software Features for Computer-mediated Introduction
    In: Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering: Volume 1: ENASE 2020, S. 269 - 280
  • Gol Mohammadi, Nazila; Leicht, Jens; Goeke, Ludger; Heisel, Maritta
    Assisted generation of privacy policies using textual patterns
    In: Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering / ENASE 2020; Virtual, Online; 5 - 6 May 2020 2020, S. 347 - 358
  • Borchert, Angela; Díaz Ferreyra, Nicolas E.; Heisel, Maritta
    Balancing trust and privacy in computer-mediated introduction : Featuring risk as a determinant for trustworthiness requirements elicitation
    In: ARES 2020: 15th International Conference on Availability, Reliability and Security / International Conference on Availability, Reliability and Security (ARES) ; 3rd Interdisciplinary Privacy and Trust Workshop (iPAT) ; August 25 – August 28, 2020, All-digital Conference / Volkamer, Melanie; Wressnegger, Christian (Hrsg.) 2020 84
  • Borchert, Angela; Díaz Ferreyra, Nicolas Emilio; Heisel, Maritta
    Building Trustworthiness in Computer-Mediated Introduction : A Facet-Oriented Framework
    In: 11th International Conference on Social Media and Society: Diverse Voices - Promises and Perils of Social Media for Diversity / SMSociety 2020; Virtual, Online; Canada; 22 - 24 July 2020 2020, S. 39 - 46
  • Wirtz, Roman; Heisel, Maritta; Wagner, Marvin
    Distributed frames : Pattern-based characterization of functional requirements for distributed systems
    In: Software Technologies / 14th International Conference, ICSOFT 2019, Prague, Czech Republic, July 26–28, 2019 / van Sinderen, Marten; Maciaszek, Leszek A. (Hrsg.) 2020, S. 81 - 107
  • Wirtz, Roman; Heisel, Maritta
    Model-Based Risk Analysis and Evaluation Using CORAS and CVSS
    In: Evaluation of Novel Approaches to Software Engineering: 14th International Conference, ENASE 2019, Heraklion, Crete, Greece, May 4–5, 2019 ; Revised Selected Papers / International Conference on Evaluation of Novel Approaches to Software Engineering ; ENASE 2019 ; Heraklion, May 4–5, 2019 / Damiani, Ernesto; Spanoudakis, George (Hrsg.) 2020, S. 108 - 134
  • Díaz Ferreyra, Nicolas Emilio; Tessier, Patrick; Pedroza, Gabriel; Heisel, Maritta
    PDP-ReqLite : A Lightweight Approach for the Elicitation of Privacy and Data Protection Requirements
    In: Data privacy management, cryptocurrencies and blockchain technology: ESORICS 2020 International Workshops, DPM 2020 and CBT 2020 ; Guildford, UK, September 17–18, 2020 ; Revised Selected Papers / 15th International Workshop on Data Privacy Management ; DPM 2020 ; September 17–18, 2020, Guildford, UK / Garcia-Alfaro, Joaquin; Navarro-Arnibas, Guillermo; Herrera-Joancomarti, Jordi (Hrsg.) 2020, S. 161 - 177
  • Díaz Ferreyra, Nicolás E.; Aímeur, Esma; Hage, Hicham; Heisel, Maritta; Van Hoogstraten, Catherine García
    Persuasion meets AI : Ethical considerations for the design of social engineering countermeasures
    In: Proceedings of the 12th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management: Vol. 3 / 12th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management ; KMIS 2020 ; 2 - 4 November 2020, online 2020, S. 204 - 211
  • Wirtz, Roman; Heisel, Maritta
    Risk Identification : From Requirements to Threat Models
    In: Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP 2020): Volume 1 / Furnell, Steven; 6th International Conference on Information Systems Security and Privacy (ICISSP 2020): 25 - 27 February 2020; Valletta, Malta / Mori, Paolo; Weippl, Edgar; Camp, Olivier (Hrsg.) 2020, S. 385 - 396
  • Gol Mohammadi, Nazila; Wirtz, Roman; Heisel, Maritta
    Systematic Asset Identification and Modeling During Requirements Engineering
    In: Risks and Security of Internet and Systems: Proceedings / 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019 / Kallel, Slim; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Kacem, Ahmed Hadj (Hrsg.) 2020, S. 50 - 66
  • Gol Mohammadi, Nazila; Goeke, Ludger; Heisel, Maritta; Surridge, Mike
    Systematic risk assessment of cloud computing systems using a combined model-based approach
    In: Proceedings of the 22nd International Conference on Enterprise Information Systems / ICEIS 2020; Virtual, Online; 5 - 7 May 2020 / Filipe, J.; Smialek, M.; Brodsky, A.; Hammoudi, S. (Hrsg.) Jg. 2 2020, S. 53 - 66
  • Wirtz, Roman; Heisel, Maritta
    Systematic treatment of security risks during requirements engineering
    In: Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering / ENASE 2020; Virtual, Online; 5 - 6 May 2020 2020, S. 132 - 143
  • Maidl, Monika; Münz, Gerhard; Seltzsam, Stefan; Wagner, Marvin; Wirtz, Roman; Heisel, Maritta
    Threat modeling for cyber-Physical systems : A two-dimensional taxonomy approach for structuring attack actions
    In: Proceedings of the 15th International Conference on Software Technologies / ICSOFT 2020; Virtual, Online; France; 7 - 9 July 2020 2020, S. 160 - 171
  • Leicht, Jens; Heisel, Maritta
    A Survey on Privacy Policy Languages : Expressiveness Concerning Data Protection Regulations
    In: 12th CMI Conference on Cybersecurity and Privacy / CMI 2019, Aalborg University Copenhagen, Copenhagen, Denmark, 28-29 November 2019 2019, S. 8962144
  • Wirtz, Roman; Heisel, Maritta
    A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements
    In: Risks and Security of Internet and Systems: Revised Selected Papers / 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018 / Zemmari, Akka; Mosbah, Mohamed; Cuppens-Boulahia, Nora; Cuppens, Frédéric (Hrsg.) 2019, S. 205 - 221
  • Gol Mohammadi, Nazila; Borchert, Angela; Pampus, Julia; Heisel, Maritta
    A generic conceptual data model of social media services
    In: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019 2019, S. a22
  • Leicht, Jens; Heisel, Maritta
    Architecture to manage and protect personal data utilising blockchain
    In: Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering: Volume 1: ENASE / 14th International Conference on Evaluation of Novel Approaches to Software Engineering; May 4-5, 2019; Heraklion, Crete, Greece 2019, S. 340 - 349
  • Wirtz, Roman; Heisel, Maritta
    CVSS-based Estimation and Prioritization for Security Risks
    In: Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering: Volume 1: ENASE / 14th International Conference on Evaluation of Novel Approaches to Software Engineering; May 4-5, 2019; Heraklion, Crete, Greece 2019, S. 297 - 306
  • Davi, Lucas; Hatebur, Denis; Heisel, Maritta; Wirtz, Roman
    Combining safety and security in autonomous cars using blockchain technologies
    In: Computer Safety, Reliability, and Security: Proceedings / SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, 10.09.2019, Turku, Finland / Romanovsky, Alexander; Troubitsyna, Elena; Gashi, Ilir; Schoitsch, Erwin; Bitsch, Friedemann (Hrsg.) 2019, S. 223 - 234
  • Frese, T.; Hatebur, Denis; Côté, Isabelle; Heisel, Maritta
    Integration of Development Interface Agreement, Supplier Safety Assessment and Safety Management for Driver Assistance Systems
    In: Mobilität in Zeiten der Veränderung: Technische und betriebswirtschaftliche Aspekte / Proff, Heike; Mobility in Times of Change – Past – Present - Future ; Wisseschaftsforum Mobilität ; 07.06.2018, Duisburg 2019, S. 241 - 251
  • Diaz Ferreyra, Nicolas Emilio; Meis, Rene; Heisel, Maritta
    Learning from online regrets : From deleted posts to risk awareness in social network sites
    In: ACM UMAP 2019 Adjunct - Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization / UMAP 2019; Larnaca; Cyprus; 9 - 12 June 2019 2019, S. 117 - 125
  • Wirtz, Roman; Heisel, Maritta
    Managing security risks : Template-based specification of controls
    In: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019 2019, S. a10
  • Gol Mohammadi, Nazila; Pampus, Julia; Heisel, Maritta
    Pattern-based incorporation of privacy preferences into privacy policies : Negotiating the conflicting needs of service providers and end-users
    In: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019 2019, S. a5
  • Maidl, Monika; Wirtz, Roman; Zhao, Tiange; Heisel, Maritta; Wagner, Marvin
    Pattern-based modeling of cyber-physical systems for analyzing security
    In: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019 2019, S. a23
  • Gol Mohammadi, Nazila; Leicht, Jens; Ulfat-Bunyadi, Nelufar; Heisel, Maritta
    Privacy Policy Specification Framework for Addressing End-Users’ Privacy Requirements
    In: Trust, Privacy and Security in Digital Business: Proceedings / 16th International Conference on Trust and Privacy in Digital Business (TrustBus); August 26–29, 2019; Linz, Austria / Gritzalis, Stefanos (Hrsg.) 2019, S. 46 - 62
  • Wirtz, Roman; Heisel, Maritta
    RE4DIST: Model-based elicitation of functional requirements for distributed systems
    In: Proceedings of the 14th International Conference on Software Technologies / ICSOFT 2019, Prague, Czech Republic, 26 - 28 July 2019 / van Sinderen, Marten; Maciaszek, Leszek (Hrsg.) 2019, S. 71 - 81
  • Wirtz, Roman; Heisel, Maritta; Borchert, Angela; Meis, Rene; Omerovic, Aida; Stølen, Ketil
    Risk-Based Elicitation of Security Requirements According to the ISO 27005 Standard
    In: Evaluation of Novel Approaches to Software Engineering: Revised Selected Papers / 13th International Conference, ENASE 2018, Funchal, Madeira, Portugal, March 23–24, 2018 / Damiani, Ernesto; Spanoudakis, George; Maciaszek, Leszek A. (Hrsg.) 2019, S. 71 - 97
  • Ulfat-Bunyadi, Nelufar; Gol Mohammadi, Nazila; Heisel, Maritta
    Supporting the systematic goal refinement in KAOS using the six-variable model
    In: Proceedings of the 13th International Conference on Software Technologies / ICSOFT 2018, Porto, Portugal, July 26-28, 2018 / Maciaszek, Leszek (Hrsg.) 2019, S. 102 - 111
  • Ulfat-Bunyadi, Nelufar; Gol Mohammadi, Nazila; Wirtz, Roman; Heisel, Maritta
    Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem Diagrams
    In: Software Technologies: Revised Selected Papers / 13th International Conference, ICSOFT 2018, Porto, Portugal, July 26-28, 2018 / van Sinderen, Marten; Maciaszek, Leszek A. (Hrsg.) 2019, S. 150 - 172
  • Beckers, Kristian; Côté, Isabelle; Goeke, Ludger; Güler, Selim; Heisel, Maritta
    A structured method for security requirements elicitation concerning the cloud computing domain
    In: Computer systems and software engineering: concepts, methodologies, tools, and applications 2018, S. 782 - 805
  • Diaz Ferreyra, Nicolas Emilio; Hecking, Tobias; Ulrich Hoppe, H.; Heisel, Maritta
    Access-Control Prediction in Social Network Sites : Examining the Role of Homophily
    In: Social Informatics: Proceedings, Part II / 10th International Conference, SocInfo 2018, St. Petersburg, Russia, September 25-28, 2018 / Staab, Steffen; Koltsova, Olessia; Ignatov, Dmitry I. (Hrsg.) 2018, S. 61 - 74
  • Schmidt, Holger; Hatebur, Denis; Heisel, Maritta
    Developing secure software using UML patterns
    In: Intelligent Systems: Concepts, Methodologies, Tools, and Applications 2018, S. 551 - 592
  • Schmidt, Holger; Hatebur, Denis; Heisel, Maritta
    Developing secure software using UML patterns
    In: Computer systems and software engineering: concepts, methodologies, tools, and applications 2018, S. 741 - 781
  • Frese, T.; Gerber, N.; Hatebur, Denis; Côté, Isabelle; Heisel, Maritta
    Functional Safety Processes and Advanced Driver Assistance Systems : Evolution or Revolution?
    In: Mobilität und Digitale Transformation: Technische und Betriebswirtschaftliche Aspekte / Proff, Heike; Fojcik, Thomas Martin (Hrsg.) 2018, S. 199 - 216
  • Gol Mohammadi, Nazila; Ulfat-Bunyadi, Nelufar; Heisel, Maritta
    Problem-based Derivation of Trustworthiness Requirements from Users' Trust Concerns
    In: 2018 16th Annual Conference on Privacy, Security and Trust (PST) / Annual Conference on Privacy, Security and Trust, August 28-30, 2018, Belfast, Northern Ireland, United Kingdom / McLaughlin, Kieran (Hrsg.) 2018
  • Wirtz, Roman; Heisel, Maritta; Meis, Rene; Omerovic, Aida; Stølen, Ketil
    Problem-based elicitation of security requirements the ProCOR method
    In: ENASE 2018: Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering / International Conference on Evaluation of Novel Approaches to Software Engineering ; 23 - 24 March 2018, Funchal, Madeira, Portugal / Damiani, Ernesto; Spanoudakis, George; Maciaszek, Leszek (Hrsg.) 2018, S. 26 - 38
  • Mann, Zoltán Ádám; Salant, Eliot; Surridge, Mike; Ayed, Dhouha; Boyle, John; Heisel, Maritta; Metzger, Andreas; Mundt, Paul
    Secure Data Processing in the Cloud
    In: Advances in Service-Oriented and Cloud Computing / Workshops of ESOCC 2017, Oslo, Norway, September 27-29, 2017 / Mann, Zoltán Ádám; Stolz, Volker (Hrsg.) 2018, S. 149 - 153
  • Cabrera, Benjamin; Roß, Björn; Dado, Marielle; Heisel, Maritta
    The gender gap in wikipedia talk pages
    In: Proceedings of the 12th International AAAI Conference on Web and Social Media / ICWSM 2018; Palo Alto; United States; 25 -28 June 2018 2018, S. 572 - 575
  • Gol Mohammadi, Nazila; Mann, Zoltán Ádám; Metzger, Andreas; Heisel, Maritta; Greig, James
    Towards an end-to-end architecture for run-time data protection in the cloud
    In: Proceedings - 44th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2018 / 44th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2018, Prague, Czech Republic, 29 August 2018 through 31 August 2018 2018, S. 514 - 518
  • Gol Mohammadi, Nazila; Ulfat-Bunyadi, Nelufar; Heisel, Maritta
    Trustworthiness Cases – Toward Preparation for the Trustworthiness Certification
    In: Trust, Privacy and Security in Digital Business: Proceedings / 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018 / Furnell, Steven; Mouratidis, Haralambos; Pernul, Günther (Hrsg.) 2018, S. 244 - 259
  • Emilio Diaz Eerreyra, Nicolas; Schawel, Johanna; Heisel, Maritta; Meske, Christian
    Addressing self-disclosure in social media: An instructional awareness approach
    In: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications / 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 29 November-2 December 2016 2017, S. 7945815
  • Meis, Rene; Heisel, Maritta
    Aspect frames : Describing cross-cutting concerns in aspect-oriented requirements engineering
    In: Proceedings of the 22nd European Conference on Pattern Languages of Programs / EuroPLoP, Irsee, Germany, July 12 - 16, 2017 2017, S. 25
  • Frese, Thomas; Hatebur, Dennis; Côté, Isabelle; Aryus, Hans-Jörg.; Heisel, Maritta
    Deriving Safety Requirements according to ISO 26262 for complex systems : A method applied in the automotive industry
    In: Innovative Produkte und Dienstleistungen in der Mobilität: Technische und betriebswirtschaftliche Aspekte / Individual, Integrated and Connected Products and Services in Mobility ; Wissenschaftsforum Mobilität ; 23.06.2016, Duisburg / Proff, Heike; Fojcik, Thomas Martin (Hrsg.) 2017, S. 211 - 221
  • Ulfat-Bunyadi, Nelufar; Meis, Rene; Heisel, Maritta
    Facilitating reuse of control software through context modelling based on the six-variable model
    In: Software Technologies: Revised selected papers / 11th International Joint Conference, ICSOFT 2016, Lisbon, Portugal, July 24-26, 2016 / Cabello, Enrique; Cardoso, Jorge; Ludwig, André; Maciaszek, Leszek A.; Sinderen, Marten van (Hrsg.) 2017, S. 332 - 358
  • Diaz Ferreyra, Nicolas Emilio; Meis, Rene; Heisel, Maritta
    Online self-disclosure : From users’ regrets to instructional awareness
    In: Machine Learning and Knowledge Extraction: Proceedings / First IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference, CD-MAKE 2017, Reggio, Italy, August 29 – September 1, 2017 / Holzinger, Andreas; Kieseberg, Peter; Tjoa, A Min; Weippl, Edgar R. (Hrsg.) 2017, S. 83 - 102
  • Heisel, Maritta; Bahsoon, Rami; Ali, Nour; Maxim, Bruce; Mistrik, Ivan
    Outlook and Future Directions
    In: Software Architecture for Big Data and the Cloud / Bruce, Maxim / Mistrik, Ivan; Bahsoon, Rami; Nour, Ali; Heisel, Maritta (Hrsg.) 2017, S. 391 - 402
  • Meis, Rene; Heisel, Maritta
    Pattern-based representation of privacy enhancing technologies as early aspects
    In: Trust, privacy and security in digital business: Proceedings / 14th International Conference, TrustBus 2017 : Lyon, France, August 30-31, 2017 / Lopez, Javier; Fischer-Hübner, Simone; Lambrinoudakis, Costas (Hrsg.) 2017, S. 49 - 65
  • Ulfat-Bunyadi, Nelufar; Hatebur, Denis; Heisel, Maritta
    Performing a more realistic and complete safety analysis by means of the six-variable model
    In: Automotive - safety & security 2017: Sicherheit und Zuverlässigkeit für automobile Informationstechnik / 7. Tagung Automotive - Safety & Security 2017 - Sicherheit und Zuverlässigkeit für automobile Informationstechnik, 30.-31.5.2017, Stuttgart, Germany / Dencker, Peter; Klenk, Herbert; Keller, Hubert (Hrsg.) 2017, S. 135 - 148
  • Diaz Ferreyra, Nicolas Emilio; Meis, Rene; Heisel, Maritta
    Should user-generated content be a matter of privacy awareness? : A position paper
    In: IC3K 2017 - Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management / IC3K 2017; Funchal, Madeira; Portugal; 1 -3 November 2017 Jg. 3 2017, S. 212 - 216
  • Meis, Rene; Heisel, Maritta
    Towards systematic privacy and operability (PRIOP) studies
    In: ICT Systems Security and Privacy Protection: Proceedings / 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017 / De Capitani di Vimercati, Sabrina; Martinelli, Fabio (Hrsg.) 2017, S. 427 - 441
  • Gol Mohammadi, Nazila; Heisel, Maritta
    A framework for systematic analysis and modeling of trustworthiness requirements using i* and BPMN
    In: Trust, Privacy and Security in Digital Business / 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016 / Katsikas, Sokratis (Hrsg.) 2016, S. 3 - 18
  • Gol Mohammadi, Nazila; Heisel, Maritta
    Enhancing business process models with trustworthiness requirements
    In: Trust Management X: Proceedings / 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 / Habib, Sheikh Mahbub; Vassileva, Julita; Mauw, Sjouke; Mühlhäuser, Max (Hrsg.) 2016, S. 33 - 51
  • Gol Mohammadi, Nazila; Heisel, Maritta
    Patterns for identification of trust concerns and specification of trustworthiness requirements
    In: Proceedings of the 21st European Conference on Pattern Languages of Programs / EuroPlop '16, Kaufbeuren, Germany, July 06 - 10, 2016 2016, S. 31
  • Meis, Rene; Heisel, Maritta
    Supporting privacy impact assessments using problem-based privacy analysis
    In: Software Technologies: Revised Selected Papers / 10th International Joint Conference, ICSOFT 2015, Colmar, France, July 20-22, 2015 / Lorenz, Pascal; van Sinderen, Marten (Hrsg.) 2016, S. 79 - 98
  • Meis, Rene; Heisel, Maritta
    Understanding the privacy goal intervenability
    In: Trust, Privacy and Security in Digital Business / 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016 / Katsikas, Sokratis (Hrsg.) 2016, S. 79 - 94
  • Alebrahim, Azadeh; Faßbender, Stephan; Filipczyk, Martin; Goedicke, Michael; Heisel, Maritta; Zdun, Uwe
    1st Workshop on VAriability for QUalIties in SofTware Architecture (VAQUITA) : Workshop Introduction
    In: Proceedings of the 2015 European Conference on Software Architecture Workshops / 9th European Conference on Software Architecture (ECSA 2015), September 7 - 11, 2015, Dubrovnik 2015 Article No. 22
  • Faßbender, Stephan; Heisel, Maritta; Meis, Rene
    A Problem-, Quality-, and Aspect-Oriented Requirements Engineering Method
    In: Software Technologies: Revised Selected Papers / 9th International Joint Conference, ICSOFT 2014, Vienna, Austria, August 29-31, 2014 / Holzinger, Andreas (Hrsg.) 2015, S. 291 - 310
  • Beckers, Kristian; Hatebur, Denis; Heisel, Maritta; Frese, Thomas; Cote, Isabelle
    A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier Interface
    In: Computer Safety, Reliability, and Security: Proceedings / 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015 / Koornneef, Flor; van Gulijk, Coen (Hrsg.) 2015, S. 90 - 108
  • Beckers, Kristian; Isabelle Côté; Goeke, Ludger; Güler, Selim; Heisel, Maritta; Côté, Isabelle
    A structured method for security requirements elicitation concerning the cloud computing domain
    In: Standards and Standardization: Concepts, Methodologies, Tools, and Applications 2015, S. 875 - 896
  • Meis, Rene; Wirtz, Roman; Heisel, Maritta
    A taxonomy of requirements for the privacy goal transparency
    In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) / 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015 / Fischer-Hübner, Simone (Hrsg.) Jg. 9264 2015, S. 195 - 209
  • Alebrahim, Azadeh; Heisel, Maritta
    Applying performance patterns for requirements analysis
    In: Proceedings of the 20th European Conference on Pattern Languages of Programs / EuroPLoP 2015 20th European Conference on Pattern Languages of Programs Kaufbeuren, Germany — July 08 - 12, 2015 / Link, Claudius; Veli-Pekka, Eloranta (Hrsg.) 2015 Article No. 35
  • Alebrahim, Azadeh; Gol Mohammadi, Nazila; Heisel, Maritta
    Challenges in Rendering and Maintaining Trustworthiness for Long-Living Software Systems
    In: Software Engineering Workshops 2015: Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2015 / Workshops der Tagung Software Engineering 2015 (SE-WS 2015), 17.-18. März 2015, Dresden, Deutschland 2015, S. 103 - 105
  • Schmidt, Holger; Hatebur, Denis; Heisel, Maritta
    Developing secure software using UML patterns
    In: Standards and Standardization: Concepts, Methodologies, Tools, and Applications 2015, S. 228 - 264
  • Schmidt, Holger P.; Hatebur, Denis; Heisel, Maritta
    Developing secure software using UML patterns
    In: Handbook of Research on Innovations in Systems and Software Engineering / Garcia Dâiaz, Vincente; Cueva Lovelle, Juan Manuel; Pelayo Garcâia-Bustelo, Begona Cristina (Hrsg.) 2015, S. 32 - 70
  • Faßbender, Stephan; Heisel, Maritta; Meis, Rene
    Problem-based security requirements elicitation and refinement with presSuRE
    In: Software Technologies: Revised Selected Papers / 9th International Joint Conference, ICSOFT 2014, Vienna, Austria, August 29-31, 2014 / Holzinger, Anfreas (Hrsg.) 2015, S. 311 - 330
  • Meis, Rene; Heisel, Maritta
    Systematic identification of information flows from requirements to support privacy impact assessments
    In: ICSOFT 2015: proceedings of the 10th International Joint Conference on Software Technologies / International Joint Conference on Software Technologies, Colmar, Alsace, France, 20-22 July, 2015 2015, S. 43 - 52
  • Alebrahim, Azadeh; Fassbender, Stephan; Filipczyk, Martin; Goedicke, Michael; Heisel, Maritta
    Towards a reliable mapping between performance and security tactics, and architectural patterns
    In: Proceedings of the 20th European Conference on Pattern Languages of Programs / EuroPLoP '15, 21st European Conference on Pattern Languages of Programs, 6. - 10. Juli 2015, Kloster Irsee 2015 Article No. 39
  • Alebrahim, Azadeh; Fassbender, Stephan; Filipczyk, Martin; Goedicke, Michael; Heisel, Maritta
    Towards systematic selection of architectural patterns with respect to quality requirements
    In: Proceedings of the 20th European Conference on Pattern Languages of Programs / EuroPLoP '15, 21st European Conference on Pattern Languages of Programs, 6. - 10. Juli 2015, Kloster Irsee 2015 Article No. 40
  • Alebrahim, Azadeh; Heisel, Maritta; Meis, Rene
    A Structured Approach for Eliciting, Modeling, and Using Quality-Related Domain Knowledge
    In: Computational Science and Its Applications – ICCSA 2014: Proceedings, Part V / 14th International Conference, Guimarães, Portugal, June 30 – July 3, 2014 / Murgante, Beniamino; Sanjay, Misra; A. C. Rocha, Ana Maria (Hrsg.) 2014, S. 370 - 386
  • Beckers, Kristian; Heisel, Maritta; Hatebur, Denis; Fenz, Stefan; Cote, Isabelle
    A Structured Comparison of Security Standards
    In: Engineering Secure Future Internet Services and Systems / Heisel, Maritta; Joosen, Wouter; Lopez, Javier (Hrsg.) 2014, S. 1 - 34
  • Heisel, Maritta; Alebrahim, Azadeh
    Intertwining Relationship between Requirements, Architecture, and Domain Knowledge
    In: International Conference on Software Engineering Advances (ICSEA): Proceedings / The Ninth International Conference on Software Engineering Advances ICSEA 2014 October 12 - 16, 2014 - Nice, France 2014
  • Alebrahim, Azadeh; Choppy, Christine; Faßbender, Stephan; Heisel, Maritta
    Optimizing Functional and Quality Requirements According to Stakeholders’ Goals
    In: Relating System Quality and Software Architecture / Mistrik, Ivan; Bahsoon, Rami; Eeles, Peter; Roshandel, Roshanak; Stal, Michael (Hrsg.) 2014, S. 75 - 120
  • Beckers, Kristian; Faßbender, Stephan; Gritzalis, Stephanos; Heisel, Maritta; Kalloniatis, Christos; Meis, Rene
    Privacy-aware cloud deployment scenario selection
    In: Trust, Privacy, and Security in Digital Business / 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014 2014, S. 94 - 105
  • Alebrahim, Azadeh; Faßbender, Stephan; Heisel, Maritta; Meis, Rene
    Problem-based requirements interaction analysis
    In: Requirements Engineering: Foundation for Software Quality: Proceedings / 20th International Working Conference, REFSQ 2014, Essen, Germany, April 7-10, 2014 / Salinesi, Camille; Weerd, Inge (Hrsg.) 2014, S. 200 - 215
  • Heisel, Maritta; Alebrahim, Azadeh
    Problem-oriented security patterns for requirements engineering
    In: Proceedings of the 19th European Conference on Pattern Languages of Programs / EuroPLoP 2014 19th European Conference on Pattern Languages of Programs Irsee, Germany — July 09 - 13, 2014 / Veli-Pekka, Eloranta; van Heesch, Uwe (Hrsg.) 2014 Article No. 9
  • Beckers, Kristian; Heisel, Maritta; Hatebur, Denis; Frese, Thomas; Cote, Isabelle
    Systematic Derivation of Functional Safety Requirements for Automotive Systems
    In: Computer Safety, Reliability, and Security / 33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014 / Bondavalli, Andrea (Hrsg.) 2014, S. 65 - 80
  • Alebrahim, Azadeh; Faßbender, Stephan; Filipczyk, Martin; Goedicke, Michael; Heisel, Maritta; Konersmann, Marco
    Towards a Computer-Aided Problem-Oriented Variability Requirements Engineering Method
    In: Advanced Information Systems Engineering Workshops 2014, S. 136 - 147
  • Alebrahim, Azadeh; Heisel, Maritta
    Towards developing secure software using problem-oriented security patterns
    In: Availability, Reliability, and Security in Information Systems / IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference (CD-ARES) and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD), September 8-12, 2014, Fribourg, Switzerland, 2014, S. 45 - 62
  • Gol Mohammadi, Nazila; Alebrahim, Azadeh; Weyer, Thorsten; Pohl, Klaus; Heisel, Maritta
    A Framework for Combining Problem Frames and Goal Models to Support Context Analysis during Requirements Engineering
    In: Availability, Reliability, and Security in Information Systems and HCI: Proceedings / IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013 / Cuzzocrea, Alfredo; Kittl, Christian; Simos, Dimitris (Hrsg.) 2013, S. 272 - 288
  • Beckers, Kristian; Hatebur, Denis; Frese, Thomas; Heisel, Maritta
    A Structured and Model-Based Hazard Analysis and Risk Assessment Method for Automotive Systems
    In: 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE) / 24th International Symposium on Software Reliability Engineering (ISSRE) : 4 - 7 Nov. 2013, Pasadena, CA, USA 2013, S. 238 - 247
  • Beckers, Kristian; Hatebur, Denis; Heisel, Maritta
    A problem-based threat analysis in compliance with common criteria
    In: Eighth International Conference on Availability, Reliability and Security (ARES), 2013: Proceedings / Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : 2 - 6 Sept. 2013, Regensburg, Germany 2013, S. 111 - 120
  • Beckers, Kristian; Heisel, Maritta
    A usability evaluation of the nessos common body of knowledge
    In: Eighth International Conference on Availability, Reliability and Security (ARES), 2013: Proceedings / Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : 2 - 6 Sept. 2013, Regensburg, Germany 2013, S. 559 - 568
  • Beckers, Kristian; Faßbender, Stephan; Heisel, Maritta; Paci, Federica
    Combining goal-oriented and problem-oriented requirements engineering methods
    In: Availability, Reliability, and Security in Information Systems and HCI: Proceedings / IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013 / Cuzzocrea, Alfredo; Kittl, Christian; Simos, Dimitris E.; Xu, Lida (Hrsg.) 2013, S. 178 - 194
  • Beckers, Kristian; Cote, Isabelle; Heisel, Maritta; Hatebur, Denis; Faßbender, Stefan
    Common criteria compliant software development (CC-CASD)
    In: Proceedings of the 28th Annual ACM Symposium on Applied Computing / SAC '13 Coimbra, Portugal — March 18 - 22, 2013 / Shin, Sung Y.; Maldonado, José Carlos (Hrsg.) 2013, S. 1298 - 1304
  • Choppy, Christine; Heisel, Maritta; Hatebur, Denis; Reggio, Gianna
    Enterprise Applications : From Requirements to Design
    In: Aligning enterprise, system, and software architectures / Mistrík, Ivan (Hrsg.) 2013, S. 96 - 117
  • Faßbender, Stephan; Heisel, Maritta
    From problems to laws in requirements engineering : Using model-transformation
    In: Proceedings of the 8th International Joint Conference on Software Technologies / Cordeiro, José; 8th International Joint Conference on Software Technologies, Reykjavík, Iceland, 29 - 31 July, 2013 2013, S. 447 - 458
  • Beckers, Kristian; Heisel, Maritta; Côté, Isabelle; Goeke, Ludger; Güler, Selim
    Structured pattern-based security requirements elicitation for clouds
    In: Eighth International Conference on Availability, Reliability and Security (ARES), 2013: Proceedings / Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : 2 - 6 Sept. 2013, Regensburg, Germany 2013, S. 465 - 474
  • Beckers, Kristian; Heisel, Maritta
    A Foundation for Requirements Analysis of Privacy Preserving Software
    In: Multidisciplinary Research and Practice for Information Systems: Proceedings / Quirchmayr, Gerald; Basl, Josef; You, Ilsun; Xu, Lida; Weippl, Edgar; IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012 2012, S. 93 - 107
  • Alebrahim, Azadeh; Tun, Thein Than; Yu, Yijun; Heisel, Maritta; Nuseibeh, Bashar
    An aspect-oriented approach to relating security requirements and access control
    In: CAiSE Forum 2012: Proceedings of the CAiSE'12 Forum at the 24th International Conference on Advanced Information Systems Engineering (CAiSE) / 24th International Conference on Advanced Information Systems Engineering (CAiSE), June 28, 2012, Gdańsk, Poland / Kirikova, Marite; Janis, Stirna (Hrsg.) 2012, S. 15 - 22
  • Konersmann, Marco; Alebrahim, Azadeh; Heisel, Maritta; Goedicke, Michael; Kersten, Benjamin
    Deriving Quality-based Architecture Alternatives with Patterns
    In: Software Engineering 2012 / Fachtagung des GI-Fachbereichs Softwaretechnik ; 27. Februar - 2. März 2012 in Berlin / Jähnichen, Stefan (Hrsg.) 2012, S. 71 - 82
  • Alebrahim, Azadeh; Choppy, Christine; Hatebur, Denis; Heisel, Maritta
    Designing architectures from problem descriptions by interactive model transformation
    In: The 27th annual ACM Symposium on Applied Computing / ACM Symposium on Applied Computing, Riva del Garda, Trento, Italy, March 26 - 30, 2012 / Ossowski, Sascha; Lecca, Paola (Hrsg.) 2012, S. 1256 - 1258
  • Côté, Isabelle; Heisel, Maritta; Souquières, Jeanine
    On the Evolution of Component-Based Software
    In: Advances in Software Engineering Techniques: Revised Selected Papers / Szmuc, Tomasz; Szpyrka, Marcin; Zendulka, Jaroslav; 4th IFIP TC 2 Central and East European Conference on Software Engineering Techniques, CEE-SET 2009, Krakow, Poland, October 12-14, 2009 2012, S. 54 - 69
  • Beckers, Kristian; Eicker, Stefan; Faßbender, Stephan; Heisel, Maritta; Schmidt, Holger
    Ontology-Based Identification of Research Gaps and Immature Research Areas
    In: Multidisciplinary Research and Practice for Information Systems: Proceedings / IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012 / Quirchmayr, Gerald; Basl, Josef (Hrsg.) 2012, S. 1 - 16
  • Heisel, Maritta; Meis, Rene; Faßbender, Stephan; Beckers, Kristian
    Pattern-Based Context Establishment for Service-Oriented Architectures
    In: Software Service and Application Engineering: Essays Dedicated to Bernd Krämer on the Occasion of His 65th Birthday / Heisel, Maritta (Hrsg.) 2012, S. 81 - 101
  • Beckers, Kristian; Heisel, Maritta
    Patterns- and Security-Requirements-Engineering-based Support for Development and Documentation of Security Standard Compliant ICT Systems
    In: Doctoral Symposium of ESSoS 12 / First Doctoral Symposium of the International Symposium on Engineering Secure Software and Systems (ESSoS), 15 February 2012, Eindhoven, The Netherlands / Cuellar, Jorge; Koch, Nora (Hrsg.) 2012, S. 65 - 70
  • Alebrahim, Azadeh; Heisel, Maritta
    Supporting quality-driven design decisions by modeling variability
    In: Proceedings of the 8th international ACM SIGSOFT conference on Quality of Software Architectures / QoSA '12, Bertinoro, Italy, June 25 - 28, 2012 / Grassi, Vincenzo (Hrsg.) 2012, S. 43 - 48
  • Beckers, Kristian; Faßbender, Stephan; Heisel, Maritta; Küster, Jan-Christoph; Schmidt, Holger
    Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approaches
    In: EngineeEngineering Secure Software and Systemsring secure software and systems: 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings / 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 16-17 February 2012, Eindhoven, The Netherlands / Barthe, Gilles; Livshits, Benjamin; Scandariato, Riccardo (Hrsg.) 2012, S. 14 - 21
  • Beckers, Kristian; Faßbender, Stephan; Heisel, Maritta; Schmidt, Holger
    Using security requirements engineering approaches to support ISO 27001 information security management systems development and documentation
    In: Seventh International Conference on Availability, Reliability and Security (ARES), 2012: Proceedings / International Conference on Availability, Reliability, and Security, 20 - 24 Aug. 2012, Prague, Czech Republic 2012, S. 242 - 248
  • Alebrahim, Azadeh; Hatebur, Denis; Heisel, Maritta
    A Method to Derive Software Architectures from Quality Requirements
    In: Proceedings of the 18th Asia Pacific Software Engineering Conference (APSEC 2011) / APSEC 2011; Ho Chi Minh [City], Vietnam, 5 - 8 December 2011 / Tran, Dan Thu (Hrsg.) 2011, S. 322 - 330
  • Côté, Isabelle; Heisel, Maritta
    A UML profile and tool support for evolutionary requirements engineering
    In: 15th European Conference on Software Maintenance and Reengineering (CSMR), 2011: Proceedings / Mens, Tom; CSMR, 1 - 4 March 2011, Oldenburg, Germany 2011, S. 161 - 170
  • Choppy, Christine; Heisel, Maritta; Hatebur, Denis
    Systematic Architectural Design Based on Problem Patterns
    In: Relating software requirements and architectures / Avgeriou, Paris; Grundy, John; Hall, Jon G (Hrsg.) 2011, S. 133 - 159
  • Hatebur, Denis; Schmidt, Holger; Jürjens, Jan; Heisel, Maritta
    Systematic Development of UMLsec Design Models Based on Security Requirements
    In: Fundamental Approaches to Software Engineering: Proceedings / 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011 / Giannakopoulou, Dimitra (Hrsg.) 2011, S. 232 - 246
  • Alebrahim, Azadeh; Hatebur, Denis; Heisel, Maritta
    Towards Systematic Integration of Quality Requirements into Software Architecture
    In: Software Architecture / 5th European Conference, ECSA 2011, Essen, Germany, September 13-16, 2011 / Crnkovic, Ivica; Gruhn, Volker; Book, Matthias (Hrsg.) 2011, S. 17 - 25
  • Schwittek, Widura; Schmidt, Holger; Eicker, Stefan; Heisel, Maritta
    Towards a Common Body of Knowledge for Engineering Secure Software and Services
    In: Proceedings of the International Conference on Knowledge Management and Information Sharing / International Conference on Knowledge Management and Information Sharing : Paris, France, 26 - 29 October, 2011 / Filipe, Joaquim (Hrsg.) 2011, S. 369 - 374
  • Cote, Isabelle; Heisel, Maritta; Schmidt, Holger; Hatebur, Denis
    UML4PF : A tool for problem-oriented requirements analysis
    In: 19th IEEE International Requirements Engineering Conference (RE) / 19th IEEE International Requirements Engineering Conference (RE), 2011 : Aug. 29 2011 - Sept. 2 2011, Trento, Italy / Institute of Electrical and Electronics Engineers (Hrsg.) 2011, S. 349 - 350
  • Hatebur, Denis; Heisel, Maritta
    A UML Profile for Requirements Analysis of Dependable Software
    In: Computer Safety, Reliability, and Security: Proceedings / 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010 / Schoitsch, Erwin (Hrsg.) 2010, S. 317 - 331
  • Schmidt, Holger; Hatebur, Denis; Heisel, Maritta
    A pattern-based method to develop secure software
    In: Software engineering for secure systems: industrial and research perspectives / Mouratidis, Haralambos 2010, S. 32 - 74
  • Hatebur, Denis; Heisel, Maritta
    Making Pattern- and Model-Based Software Development More Rigorous
    In: Formal Methods and Software Engineering: 12th International Conference on Formal Engineering Methods / 12th International Conference on Formal Engineering Methods, ICFEM 2010, Shanghai, China, November 17-19, 2010 / Dong, Jin Song; Zhu, Huibiao (Hrsg.) 2010, S. 253 - 269
  • Hatebur, Denis; Heisel, Maritta
    A Foundation for Requirements Analysis of Dependable Software
    In: Computer Safety, Reliability, and Security: Proceedings / 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009 2009, S. 311 - 325
  • Hatebur, Denis; Heisel, Maritta
    Deriving software architectures from problem descriptions
    In: Software engineering 2009 - Workshopband: Fachtagung des GI-Fachbereichs Softwaretechnik, 02. - 06.03.2009 in Kaiserslautern / 5. Fachtagung des GI-Fachbereichs Softwaretechnik (SE 2009), 02.-06.03.2009, Kaiserslautern / Münch, Jürgen; Liggesmeyer, Peter (Hrsg.) 2009, S. 383 - 302
  • Goedicke, Michael; Heisel, Maritta; Hunold, Sascha; Kühne, Stefan; Riebisch, Matthias; Streekmann, Niels
    Workshop Modellgetriebene Softwarearchitektur - Evolution, Integration und Migration (MSEIM 2009)
    In: Software Engineering 2009: Workshopband / Fachtagung des GI-Fachbereichs Softwaretechnik, 02. - 06.03.2009 in Kaiserslautern / Münch, Jürgen; Liggesmeyer, Peter (Hrsg.) 2009, S. 363 - 366
  • Hatebur, Denis; Heisel, Maritta; Schmidt, Holger
    A Formal Metamodel for Problem Frames
    In: Model Driven Engineering Languages and Systems: Proceedings / 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008 / Czarnecki, Krzysztof; Ober, Ileana; Bruel, Jean-Michel; Uhl, Axel; Völter, Markus (Hrsg.) 2008
  • Côté, Isabelle; Hatebur, Denis; Heisel, Maritta; Schmidt, Holger; Wentzlaff, Ina
    A systematic account of problem frames
    In: Proceedings of the 12th European Conference on Pattern Languages of Programs: (EuroPLoP'2007 / Schümmer, Till; Hvatum, Lise B. (Hrsg.) 2008, S. 749 - 768
  • Hatebur, Denis; Schmidt, Holger; Heisel, Maritta
    Analysis and Component-based Realization of Security Requirements
    In: Third International Conference on Availability, Reliability and Security / Third International Conference on Availability, Reliability and Security, 2008 : ARES 08 ; 4 - 7 March 2008, Barcelona, Spain / Jakoubi, Stefan (Hrsg.) 2008, S. 195 - 203
  • Heisel, Maritta; Hatebur, Denis; Santen, Thomas; Seifert, Dirk
    Using UML Environment Models for Test Case Generation
    In: Software Engineering 2008: Workshopband ; Fachtagung des GI-Fachbereichs Softwaretechnik, 18. - 22.02.2008 in München / Software Engineering 2008 ; Fachtagung GI-Fachbereich Softwaretechnik ; 18. - 22.02.2008, München, Germany / Maalej, Walid; Bruegge, Bernd (Hrsg.) 2008, S. 399 - 406
  • Goedicke, Michael; Heisel, Maritta; Hunold, Sascha; Kühne, Stefan; Riebisch, Matthias; Streekmann, Niels
    Workshop Modellgetriebene Softwarearchitektur : Evolution, Integration und Migration (MSEIM 2008)
    In: Software Engineering 2008: Workshopband ; Fachtagung des GI-Fachbereichs Softwaretechnik ; 18. - 22.02.2008 in München / Software Engineering 2008 ; Fachtagung GI-Fachbereich Softwaretechnik ; 18. - 22.02.2008, München, Germany / Maalej, Walid; Bruegge, Bernd (Hrsg.) 2008, S. 173 - 177
  • Goedicke, Michael; Heisel, Maritta; Hunold, Sascha; Kühne, Stefan; Riebisch, Matthias; Streekmann, Niels
    Workshop Modellgetriebene Softwarearchitektur - Evolution, Integration und Migration
    In: Software Engineering 2008: Fachtagung des GI-Fachbereichs Softwaretechnik ; 18. - 22.02.2008 in München / Software Engineering 2008 ; Fachtagung GI-Fachbereich Softwaretechnik ; 18. - 22.02.2008, München, Germany / Herrmann, Korbinian; Bruegge, Bernd (Hrsg.) 2008, S. 285 - 287
  • Hatebur, Denis; Schmidt, Holger; Heisel, Maritta
    A Pattern System for Security Requirements Engineering
    In: The Second International Conference on Availability, Reliability and Security: Proceedings / The Second International Conference on Availability, Reliability and Security, 2007 : ARES 2007 ; 10 - 13 April 2007, Vienna, Austria / European Network and Information Security Agency; Technische Universität Wien (Hrsg.) 2007, S. 356 - 365
  • Hatebur, Denis; Heisel, Maritta; Schmidt, Holger
    A Security Engineering Process based on Patterns
    In: 18th International Conference on Database and Expert Systems Applications / DEXA 2007; 3-7 Sept. 2007; Regensburg, Germany 2007
  • Lanoix, Arnaud; Hatebur, Denis; Heisel, Maritta; Souquières, Jeanine
    Enhancing Dependability of Component-Based Systems
    In: Reliable Software Technologies - Ada Europe 2007: Proceedings / 12th Ada-Europe Intenational Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007 / Abdennahder, Nabil; Kordon, Fabrice (Hrsg.) 2007, S. 41 - 54
  • Côté, Isabelle; Heisel, Maritta; Wentzlaff, Ina
    Pattern-based Evolution of Software Architectures
    In: Software Architecture: First European Conference, ECSA 2007 Madrid, Spain, September 24-26, 2007 Proceedings / First European Conference, ECSA 2007, Madrid, Spain, September 24-26, 2007 / Oquendo, Flavio (Hrsg.) 2007
  • Hatebur, Denis; Heisel, Maritta; Souquières, Jeanine
    A method for component-based software and system development
    In: 32nd EUROMICRO Conference on Software Engineering and Advanced Applications: Proceedings / SEAA; Cavtat/Dubrovnik; Croatia; 29 August 2006 through 1 September 2006 2006, S. 72 - 80
  • Choppy, Christine; Hatebur, Denis; Heisel, Maritta
    Component composition through architectural patterns for problem frames
    In: Proceedings of APSEC 2006, XIII Asia Pacific Software Engineering Conference / XIII Asia Pacific Software Engineering Conference; Bangalore; India; 6 - 8 December 2006 / Jalote, Pankaj (Hrsg.) 2006, S. 27 - 36
  • Hatebur, Denis; Heisel, Maritta; Schmidt, Holger
    Security Engineering Using Problem Frames
    In: Emerging Trends in Information and Communication Security: Proceedings / International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006 / Müller, Günter (Hrsg.) 2006, S. 238 - 253
  • Heisel, Maritta; Hatebur, Denis
    A Model-Based Development Process for Embedded Systems
    In: Workshop on Model-Based Development of Embedded Systems: Proceedings 2005
  • Hatebur, Denis; Heisel, Maritta
    Problem Frames and Architectures for Security Problems
    In: Computer Safety, Reliability, and Security: Proceedings / 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005 / Dahll, Gustav; Winther, Rune; Gran, Bjoern Axel (Hrsg.) 2005, S. 390 - 404
  • Rottke, Thomas; Heisel, Maritta; Hatebur, Denis; Heiner, Monika
    A Problem-Oriented Approach to Common Criteria Certification
    In: Computer Safety, Reliability and Security: Proceedings / 21st International Conference, SAFECOMP 2002 Catania, Italy, September 10–13, 2002 / Anderson, Stuart; Felici, Massimo; Bologna, Sandro (Hrsg.) 2002, S. 334 - 346
  • Bücher/Sammelwerke/Tagungsbände

  • Heisel, Maritta; Marchetti, Eda (Hrsg.)
    Doctoral Symposium of ESSoS 2013 : Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013)
    Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013), 27 February - 01 March 2013, Rocquencort, Paris, France,
    Aachen (2013)
    (CEUR Workshop Proceedings ; 965)
  • Forschungsberichte

  • Leicht, Jens; Gerl, Armin; Heisel, Maritta
    Technical Report on the Extension of the Layered Privacy Language
    Duisburg, Essen (2021) 7 Seiten