Personensuche
Personensuche
Es wurde 1 Person gefunden.
Informatik / SE
Anschrift
Bismarckstraße 90 (BC)
47057 Duisburg
47057 Duisburg
Raum
BC 307
Telefon
Telefax
Webseite
Funktionen
-
Universitätsprofessor/in em./i.R., Software Engineering
Aktuelle Veranstaltungen
Keine aktuellen Veranstaltungen.
Vergangene Veranstaltungen (max. 10)
-
WiSe 2023
-
SoSe 2023
- Übung zu "Entwicklung sicherer Software"
- Muster- und Komponentenbasierte Softwareentwicklung
- Übung zu "Muster- und Komponentenbasierte Softwareentwicklung"
- Formale Spezifikation von Software-Systemen
- Entwicklung sicherer Software
- Muster- und komponentenbasierte Software-Entwicklung
- Softwaretechnik
- Entwicklung sicherer Software
Die folgenden Publikationen sind in der Online-Universitätsbibliographie der Universität Duisburg-Essen verzeichnet. Weitere Informationen finden Sie gegebenenfalls auch auf den persönlichen Webseiten der Person.
-
Cybersecurity discussions in Stack Overflow : a developer-centred analysis of engagement and self-disclosure behaviourIn: Social Network Analysis and Mining, Jg. 14, 2024, 16DOI (Open Access)
-
Community detection for access-control decisions : Analysing the role of homophily and information diffusion in Online Social NetworksIn: Online Social Networks and Media, Jg. 29, 2022, 100203DOI (Open Access)
-
The Role of Trustworthiness Facets for Developing Social Media Applications : A Structured Literature ReviewIn: Information, Jg. 13, 2022, Nr. 1, 34DOI, Online Volltext (Open Access)
-
Conflict identification and resolution for trust-related requirements elicitation a goal modeling approachIn: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Jg. 12, 2021, Nr. 1, S. 111 – 131DOI (Open Access)
-
Preventative nudges : Introducing risk cues for supporting online self-disclosure decisionsIn: Information, Jg. 11, 2020, Nr. 8, 399DOI, Online Volltext (Open Access)
-
Context analysis of cloud computing systems using a pattern-based approachIn: Future Internet, Jg. 10, 2018, Nr. 8, S. 72DOI (Open Access)
-
A framework for systematic refinement of trustworthiness requirementsIn: Information, Jg. 8, 2017, Nr. 2, S. 46DOI (Open Access)
-
A structured and systematic model-based development method for automotive systems, considering the OEM/supplier interfaceIn: Reliability Engineering & System Safety, Jg. 158, 2017, S. 172 – 184
-
Computer-aided identification and validation of intervenability requirementsIn: Information, Jg. 8, 2017, Nr. 1, S. 30DOI (Open Access)
-
Risiko in der Wolke? : Die Sicherheitsanalyse von Cloud-AnwendungenIn: Unikate: Berichte aus Forschung und Lehre, 2017, Nr. 50: Natur-, Ingenieur- und Wirtschaftswissenschaften - High-Performance und Cloud Computing, S. 16 – 27DOI, Online Volltext (Open Access)
-
Computer-Aided Identification and Validation of Privacy RequirementsIn: Information, Jg. 7, 2016, Nr. 2, S. 28DOI (Open Access)
-
Variability for Qualities in Software ArchitectureIn: ACM SIGSOFT Software Engineering Notes, Jg. 41, 2016, Nr. 1, S. 32 – 35
-
Supporting Common Criteria Security Analysis with Problem FramesIn: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Jg. 5, 2014, Nr. 1, S. 37 – 63
-
A pattern-based method for establishing a cloud-specific information security management system : Establishing information security management systems for clouds considering security, privacy, and legal complianceIn: Requirements Engineering, Jg. 18, 2013, Nr. 4, S. 343 – 395
-
Erratum to: A pattern-based method for establishing a cloud-specific information security management systemIn: Requirements Engineering, Jg. 18, 2013, Nr. 4, S. 397
-
A comparison of security requirements engineering methodsIn: Requirements Engineering, Jg. 15, 2010, Nr. 1, S. 7 – 40
-
Pattern-based Exploration of Design Alternatives for the Evolution of Software ArchitecturesIn: International Journal of Cooperative Information Systems, Jg. 16, 2007, Nr. 3-4, S. 341 – 365
-
Correction: Nicolás E. Díaz Ferreyra, et al.: Preventative nudges: Introducing risk cues for supporting online self-disclosure decisionsIn: Information. Basel: MDPI, Jg. 11, 2020, Nr. 12, 555DOI (Open Access)
-
PrefaceIn: Software Architecture for Big Data and the Cloud / Mistrik, Ivan; Bahsoon, Rami; Ali, Nour; Heisel, Maritta; Maxim, Bruce (Hrsg.). Cambridge: Elsevier, 2017, S. xxxi – xxxviii
-
ESSoS Doctoral Symposium 2013In: Doctoral Symposium of ESSoS 2013: Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013) / Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013), 27 February - 01 March 2013, Rocquencort, Paris, France / Heisel, Maritta; Marchetti, Eda (Hrsg.). Aachen: RWTH Aachen, 2013, S. 2 – 3Online Volltext (Open Access)
-
A Delimitation of Data Sovereignty From PrivacyIn: Empowering Digital Sovereignty: Balancing Privacy and Global Connectivity. Hershey: IGI Global, 2025, S. 1 – 24
-
Management of Customized Privacy PoliciesIn: Proceedings of the 11th International Conference on Information Systems Security and Privacy: Volume 2 / 11th International Conference on Information Systems Security and Privacy (ICISSP 2025), February 20-22, 2025, in Porto, Portugal / Di Pietro, Roberto; Renaud, Karen; Mori, Paolo (Hrsg.). Setúbal: SciTePress, 2025, S. 385 – 396
-
PriPoCoG : Empowering End-Users’ Data Protection DecisionsIn: Proceedings of the 27th International Conference on Enterprise Information Systems: Volume 2 / 27th International Conference on Enterprise Information Systems (ICEIS 2025), April 4-6, 2025, in Porto, Portugal / Filipe, Joaquim; Śmiałek, Michał; Brodsky, Alexander; Hammoudi, Slimane (Hrsg.). Setúbal: SciTePress, 2025, S. 668 – 679
-
Creating Privacy Policies from Data-Flow DiagramsIn: Computer Security. ESORICS 2023 International Workshops: Revised Selected Papers Part I / CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023 / Katsikas, Sokratis; Cuppens, Frédéric; Cuppens-Boulahia, Nora (Hrsg.). Berlin: Springer Science and Business Media Deutschland GmbH, 2024, S. 433 – 453DOI, Online Volltext (Open Access)
-
Extending PriPoCoG : A Privacy Policy Editor for GDPR-Compliant Privacy PoliciesIn: Proceedings of the 19th International Conference on Evaluation of Novel Approaches to Software Engineering - Volume 1: ENASE: SciTePress, 2024, S. 307 – 318
-
P2BAC: Privacy Policy Based Access Control Using P-LPLIn: Proceedings of the 9th International Conference on Information Systems Security and Privacy ICISSP: Volume 1 / 9th International Conference on Information Systems Security and Privacy (ICISSP 2023): 22 - 24 February 2023; Lisbon, Portugal. Setúbal: SciTePress, 2023, S. 686 – 697
-
Pattern-Based Risk Identification for Model-Based Risk ManagementIn: Applicable Formal Methods for Safe Industrial Products. Berlin: Springer Science and Business Media Deutschland GmbH, 2023, S. 114 – 129
-
ENAGRAM: An App to Evaluate Preventative Nudges for InstagramIn: Proceedings of the 2nd European Symposium on Usable Security, EuroUSEC 2022 / EuroUSEC '22: 2nd European Symposium on Usable Security; 29 - 30 September 2022; Karlsruhe, Germany. New York: Association for Computing Machinery (ACM), 2022, S. 53 – 63DOI, Online Volltext (Open Access)
-
Meeting Strangers Online : Feature Models for Trustworthiness AssessmentIn: Human-Centered Software Engineering: Proceedings / 9th IFIP WG 13.2 International Working Conference, HCSE 2022, Eindhoven, The Netherlands, August 24–26, 2022, / Bernhaupt, Regina; Ardito, Carmelo; Sauer, Stefan (Hrsg.). Cham: Springer Science and Business Media Deutschland GmbH, 2022, S. 3 – 22
-
PriPoCoG : Guiding Policy Authors to Define GDPR-Compliant Privacy PoliciesIn: Trust, Privacy and Security in Digital Business: Proceedings / Katsikas, Sokratis; Furnell, Steven; 19th International Conference (TrustBus 2022): Vienna, Austria; August 24, 2022. Cham; Berlin; Heidelberg; New York, NY: Springer, 2022, S. 1 – 16
-
The Relevance of Privacy Concerns, Trust, and Risk for Hybrid Social MediaIn: Evaluation of Novel Approaches to Software Engineering: 16th International Conference, ENASE 2021, Virtual Event, April 26-27, 2021 ; Revised Selected Papers / 16th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE) ; April 26-27, 2021, Virtual Event / Ali, Raian; Kaindl, Hermann; Maciaszek, Leszek A. (Hrsg.). Cham: Springer, 2022, S. 88 – 111
-
Model-Based Threat Modeling for Cyber-Physical Systems : A Computer-Aided ApproachIn: Software Technologies: Revised Selected Papers / 15th International Conference, ICSOFT 2020, Online Event, July 7–9, 2020 / van Sinderen, Marten; Maciaszek, Leszek A.; Fill, Hans-Georg (Hrsg.). Cham: Springer, 2021, S. 158 – 183
-
P2P Frames : Pattern-based Characterization of Functional Requirements for Peer-to-peer SystemsIn: ENASE 2021: Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering : online streaming, April 26-27, 2021 / 16th International Conference on Evaluation of Novel Approaches to Software Engineering; 26-27 April 2021; Virtual / Ali, Raian; Kaindl, Hermann; Maciaszek, Leszek (Hrsg.). Setúbal: SCITEPRESS, 2021, S. 239 – 250
-
Risk Identification Based on Architectural PatternsIn: Quality of Information and Communications Technology: Proceedings / 14th International Conference, QUATIC 2021, Algarve, Portugal, September 8–11, 2021 / Paiva, Ana C. R.; Cavalli, Ana Rosa; Ventura Martins, Paula; Pérez-Castillo, Ricardo (Hrsg.). Cham: Springer, 2021, S. 341 – 355
-
Risk Treatment : An Iterative Method for Identifying ControlsIn: Evaluation of Novel Approaches to Software Engineering: Revised Selected Papers / 15th International Conference, ENASE 2020, Prague, Czech Republic, May 5–6, 2020 / Ali, Raian; Kaindl, Hermann; Maciaszek, Leszek A. (Hrsg.). Cham: Springer, 2021, S. 283 – 310
-
A Conceptual Method for Eliciting Trust-related Software Features for Computer-mediated IntroductionIn: Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering: Volume 1: ENASE. Prag: SciTePress, 2020, S. 269 – 280DOI (Open Access)
-
Assisted generation of privacy policies using textual patternsIn: Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering / ENASE 2020; Virtual, Online; 5 - 6 May 2020. Setúbal: SciTePress, 2020, S. 347 – 358
-
Balancing trust and privacy in computer-mediated introduction : Featuring risk as a determinant for trustworthiness requirements elicitationIn: ARES 2020: 15th International Conference on Availability, Reliability and Security / International Conference on Availability, Reliability and Security (ARES) ; 3rd Interdisciplinary Privacy and Trust Workshop (iPAT) ; August 25 – August 28, 2020, All-digital Conference / Volkamer, Melanie; Wressnegger, Christian (Hrsg.). New York: Association for Computing Machinery (ACM), 2020, 84
-
Building Trustworthiness in Computer-Mediated Introduction : A Facet-Oriented FrameworkIn: 11th International Conference on Social Media and Society: Diverse Voices - Promises and Perils of Social Media for Diversity / SMSociety 2020; Virtual, Online; Canada; 22 - 24 July 2020. New York: Association for Computing Machinery (ACM), 2020, S. 39 – 46
-
Distributed frames : Pattern-based characterization of functional requirements for distributed systemsIn: Software Technologies / 14th International Conference, ICSOFT 2019, Prague, Czech Republic, July 26–28, 2019 / van Sinderen, Marten; Maciaszek, Leszek A. (Hrsg.). Cham: Springer, 2020, S. 81 – 107
-
Model-Based Risk Analysis and Evaluation Using CORAS and CVSSIn: Evaluation of Novel Approaches to Software Engineering: 14th International Conference, ENASE 2019, Heraklion, Crete, Greece, May 4–5, 2019 ; Revised Selected Papers / International Conference on Evaluation of Novel Approaches to Software Engineering ; ENASE 2019 ; Heraklion, May 4–5, 2019 / Damiani, Ernesto; Spanoudakis, George (Hrsg.). Cham: Springer, 2020, S. 108 – 134
-
PDP-ReqLite : A Lightweight Approach for the Elicitation of Privacy and Data Protection RequirementsIn: Data privacy management, cryptocurrencies and blockchain technology: ESORICS 2020 International Workshops, DPM 2020 and CBT 2020 ; Guildford, UK, September 17–18, 2020 ; Revised Selected Papers / 15th International Workshop on Data Privacy Management ; DPM 2020 ; September 17–18, 2020, Guildford, UK / Garcia-Alfaro, Joaquin; Navarro-Arnibas, Guillermo; Herrera-Joancomarti, Jordi (Hrsg.). Cham: Springer, 2020, S. 161 – 177DOI, Online Volltext (Open Access)
-
Persuasion meets AI : Ethical considerations for the design of social engineering countermeasuresIn: Proceedings of the 12th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management: Vol. 3 / 12th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management ; KMIS 2020 ; 2 - 4 November 2020, online: SciTePress, 2020, S. 204 – 211
-
Risk Identification : From Requirements to Threat ModelsIn: Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP 2020): Volume 1 / Furnell, Steven; 6th International Conference on Information Systems Security and Privacy (ICISSP 2020): 25 - 27 February 2020; Valletta, Malta / Mori, Paolo; Weippl, Edgar; Camp, Olivier (Hrsg.). Setúbal; Setúbal, Portugal: SciTePress, 2020, S. 385 – 396DOI (Open Access)
-
Systematic Asset Identification and Modeling During Requirements EngineeringIn: Risks and Security of Internet and Systems: Proceedings / 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019 / Kallel, Slim; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Kacem, Ahmed Hadj (Hrsg.). Cham: Springer, 2020, S. 50 – 66
-
Systematic risk assessment of cloud computing systems using a combined model-based approachIn: Proceedings of the 22nd International Conference on Enterprise Information Systems / ICEIS 2020; Virtual, Online; 5 - 7 May 2020 / Filipe, J.; Smialek, M.; Brodsky, A.; Hammoudi, S. (Hrsg.): SciTePress, Jg. 2, 2020, S. 53 – 66
-
Systematic treatment of security risks during requirements engineeringIn: Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering / ENASE 2020; Virtual, Online; 5 - 6 May 2020. Setúbal: SciTePress, 2020, S. 132 – 143
-
Threat modeling for cyber-Physical systems : A two-dimensional taxonomy approach for structuring attack actionsIn: Proceedings of the 15th International Conference on Software Technologies / ICSOFT 2020; Virtual, Online; France; 7 - 9 July 2020. Setúbal: SciTePress, 2020, S. 160 – 171
-
A Survey on Privacy Policy Languages : Expressiveness Concerning Data Protection RegulationsIn: 12th CMI Conference on Cybersecurity and Privacy / CMI 2019, Aalborg University Copenhagen, Copenhagen, Denmark, 28-29 November 2019. Piscataway: IEEE, 2019, S. 8962144
-
A Systematic Method to Describe and Identify Security Threats Based on Functional RequirementsIn: Risks and Security of Internet and Systems: Revised Selected Papers / 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018 / Zemmari, Akka; Mosbah, Mohamed; Cuppens-Boulahia, Nora; Cuppens, Frédéric (Hrsg.). Cham: Springer, 2019, S. 205 – 221
-
A generic conceptual data model of social media servicesIn: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019. New York: Association for Computing Machinery (ACM), 2019, S. a22
-
Architecture to manage and protect personal data utilising blockchainIn: Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering: Volume 1: ENASE / 14th International Conference on Evaluation of Novel Approaches to Software Engineering; May 4-5, 2019; Heraklion, Crete, Greece: SciTePress, 2019, S. 340 – 349DOI (Open Access)
-
CVSS-based Estimation and Prioritization for Security RisksIn: Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering: Volume 1: ENASE / 14th International Conference on Evaluation of Novel Approaches to Software Engineering; May 4-5, 2019; Heraklion, Crete, Greece: SciTePress, 2019, S. 297 – 306DOI (Open Access)
-
Combining safety and security in autonomous cars using blockchain technologiesIn: Computer Safety, Reliability, and Security: Proceedings / SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, 10.09.2019, Turku, Finland / Romanovsky, Alexander; Troubitsyna, Elena; Gashi, Ilir; Schoitsch, Erwin; Bitsch, Friedemann (Hrsg.). Cham: Springer, 2019, S. 223 – 234
-
Integration of Development Interface Agreement, Supplier Safety Assessment and Safety Management for Driver Assistance SystemsIn: Mobilität in Zeiten der Veränderung: Technische und betriebswirtschaftliche Aspekte / Proff, Heike; Mobility in Times of Change – Past – Present - Future ; Wisseschaftsforum Mobilität ; 07.06.2018, Duisburg. Wiesbaden: Springer Fachmedien, 2019, S. 241 – 251
-
Learning from online regrets : From deleted posts to risk awareness in social network sitesIn: ACM UMAP 2019 Adjunct - Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization / UMAP 2019; Larnaca; Cyprus; 9 - 12 June 2019. New York: ACM, 2019, S. 117 – 125DOI, Online Volltext (Open Access)
-
Managing security risks : Template-based specification of controlsIn: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019. New York: Association for Computing Machinery (ACM), 2019, S. a10
-
Pattern-based incorporation of privacy preferences into privacy policies : Negotiating the conflicting needs of service providers and end-usersIn: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019. New York: Association for Computing Machinery (ACM), 2019, S. a5
-
Pattern-based modeling of cyber-physical systems for analyzing securityIn: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019. New York: Association for Computing Machinery (ACM), 2019, S. a23
-
Privacy Policy Specification Framework for Addressing End-Users’ Privacy RequirementsIn: Trust, Privacy and Security in Digital Business: Proceedings / 16th International Conference on Trust and Privacy in Digital Business (TrustBus); August 26–29, 2019; Linz, Austria / Gritzalis, Stefanos (Hrsg.): Springer, 2019, S. 46 – 62
-
RE4DIST: Model-based elicitation of functional requirements for distributed systemsIn: Proceedings of the 14th International Conference on Software Technologies / ICSOFT 2019, Prague, Czech Republic, 26 - 28 July 2019 / van Sinderen, Marten; Maciaszek, Leszek (Hrsg.). Setúbal: SciTePress, 2019, S. 71 – 81
-
Risk-Based Elicitation of Security Requirements According to the ISO 27005 StandardIn: Evaluation of Novel Approaches to Software Engineering: Revised Selected Papers / 13th International Conference, ENASE 2018, Funchal, Madeira, Portugal, March 23–24, 2018 / Damiani, Ernesto; Spanoudakis, George; Maciaszek, Leszek A. (Hrsg.). Cham: Springer, 2019, S. 71 – 97
-
Supporting the systematic goal refinement in KAOS using the six-variable modelIn: Proceedings of the 13th International Conference on Software Technologies / ICSOFT 2018, Porto, Portugal, July 26-28, 2018 / Maciaszek, Leszek (Hrsg.). Setúbal: SciTePress, 2019, S. 102 – 111
-
Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem DiagramsIn: Software Technologies: Revised Selected Papers / 13th International Conference, ICSOFT 2018, Porto, Portugal, July 26-28, 2018 / van Sinderen, Marten; Maciaszek, Leszek A. (Hrsg.). Berlin: Springer Verlag, 2019, S. 150 – 172
-
A structured method for security requirements elicitation concerning the cloud computing domainIn: Computer systems and software engineering: concepts, methodologies, tools, and applications: IGI Global, 2018, S. 782 – 805
-
Access-Control Prediction in Social Network Sites : Examining the Role of HomophilyIn: Social Informatics: Proceedings, Part II / 10th International Conference, SocInfo 2018, St. Petersburg, Russia, September 25-28, 2018 / Staab, Steffen; Koltsova, Olessia; Ignatov, Dmitry I. (Hrsg.). Cham: Springer Verlag, 2018, S. 61 – 74
-
Developing secure software using UML patternsIn: Computer systems and software engineering: concepts, methodologies, tools, and applications: IGI Global, 2018, S. 741 – 781
-
Developing secure software using UML patternsIn: Intelligent Systems: Concepts, Methodologies, Tools, and Applications: IGI Global, 2018, S. 551 – 592
-
Functional Safety Processes and Advanced Driver Assistance Systems : Evolution or Revolution?In: Mobilität und Digitale Transformation: Technische und Betriebswirtschaftliche Aspekte / Proff, Heike; Fojcik, Thomas Martin (Hrsg.). Wiesbaden: Springer Fachmedien, 2018, S. 199 – 216
-
Problem-based Derivation of Trustworthiness Requirements from Users' Trust ConcernsIn: 2018 16th Annual Conference on Privacy, Security and Trust (PST) / Annual Conference on Privacy, Security and Trust, August 28-30, 2018, Belfast, Northern Ireland, United Kingdom / McLaughlin, Kieran (Hrsg.). Piscataway: Institute of Electrical and Electronics Engineers Inc., 2018
-
Problem-based elicitation of security requirements the ProCOR methodIn: ENASE 2018: Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering / International Conference on Evaluation of Novel Approaches to Software Engineering ; 23 - 24 March 2018, Funchal, Madeira, Portugal / Damiani, Ernesto; Spanoudakis, George; Maciaszek, Leszek (Hrsg.). [Setúbal, Portugal]: SciTePress, 2018, S. 26 – 38
-
Secure Data Processing in the CloudIn: Advances in Service-Oriented and Cloud Computing / Workshops of ESOCC 2017, Oslo, Norway, September 27-29, 2017 / Mann, Zoltán Ádám; Stolz, Volker (Hrsg.). Berlin: Springer Verlag, 2018, S. 149 – 153DOI, Online Volltext (Open Access)
-
The gender gap in wikipedia talk pagesIn: Proceedings of the 12th International AAAI Conference on Web and Social Media / ICWSM 2018; Palo Alto; United States; 25 -28 June 2018. Palo Alto: AAAI Press, 2018, S. 572 – 575
-
Towards an end-to-end architecture for run-time data protection in the cloudIn: Proceedings - 44th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2018 / 44th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2018, Prague, Czech Republic, 29 August 2018 through 31 August 2018. Piscataway: Institute of Electrical and Electronics Engineers Inc., 2018, S. 514 – 518
-
Trustworthiness Cases – Toward Preparation for the Trustworthiness CertificationIn: Trust, Privacy and Security in Digital Business: Proceedings / 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018 / Furnell, Steven; Mouratidis, Haralambos; Pernul, Günther (Hrsg.). Cham: Springer Verlag, 2018, S. 244 – 259
-
Addressing self-disclosure in social media: An instructional awareness approachIn: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications / 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 29 November-2 December 2016. Piscataway, NJ: IEEE Computer Society, 2017, S. 7945815
-
Aspect frames : Describing cross-cutting concerns in aspect-oriented requirements engineeringIn: Proceedings of the 22nd European Conference on Pattern Languages of Programs / EuroPLoP, Irsee, Germany, July 12 - 16, 2017. New York: ACM, 2017, S. 25
-
Deriving Safety Requirements according to ISO 26262 for complex systems : A method applied in the automotive industryIn: Innovative Produkte und Dienstleistungen in der Mobilität: Technische und betriebswirtschaftliche Aspekte / Individual, Integrated and Connected Products and Services in Mobility ; Wissenschaftsforum Mobilität ; 23.06.2016, Duisburg / Proff, Heike; Fojcik, Thomas Martin (Hrsg.). Wiesbaden: Springer Fachmedien, 2017, S. 211 – 221
-
Facilitating reuse of control software through context modelling based on the six-variable modelIn: Software Technologies: Revised selected papers / 11th International Joint Conference, ICSOFT 2016, Lisbon, Portugal, July 24-26, 2016 / Cabello, Enrique; Cardoso, Jorge; Ludwig, André; Maciaszek, Leszek A.; Sinderen, Marten van (Hrsg.). Berlin: Springer Verlag, 2017, S. 332 – 358
-
Online self-disclosure : From users’ regrets to instructional awarenessIn: Machine Learning and Knowledge Extraction: Proceedings / First IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference, CD-MAKE 2017, Reggio, Italy, August 29 – September 1, 2017 / Holzinger, Andreas; Kieseberg, Peter; Tjoa, A Min; Weippl, Edgar R. (Hrsg.). Berlin: Springer Verlag, 2017, S. 83 – 102
-
Outlook and Future DirectionsIn: Software Architecture for Big Data and the Cloud / Bruce, Maxim / Mistrik, Ivan; Bahsoon, Rami; Nour, Ali; Heisel, Maritta (Hrsg.). Cambridge: Elsevier, 2017, S. 391 – 402
-
Pattern-based representation of privacy enhancing technologies as early aspectsIn: Trust, privacy and security in digital business: Proceedings / 14th International Conference, TrustBus 2017 : Lyon, France, August 30-31, 2017 / Lopez, Javier; Fischer-Hübner, Simone; Lambrinoudakis, Costas (Hrsg.). Berlin: Springer Verlag, 2017, S. 49 – 65
-
Performing a more realistic and complete safety analysis by means of the six-variable modelIn: Automotive - safety & security 2017: Sicherheit und Zuverlässigkeit für automobile Informationstechnik / 7. Tagung Automotive - Safety & Security 2017 - Sicherheit und Zuverlässigkeit für automobile Informationstechnik, 30.-31.5.2017, Stuttgart, Germany / Dencker, Peter; Klenk, Herbert; Keller, Hubert (Hrsg.). Bonn: Gesellschaft fur Informatik (GI), 2017, S. 135 – 148
-
Should user-generated content be a matter of privacy awareness? : A position paperIn: IC3K 2017 - Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management / IC3K 2017; Funchal, Madeira; Portugal; 1 -3 November 2017: SciTePress, Jg. 3, 2017, S. 212 – 216
-
Towards systematic privacy and operability (PRIOP) studiesIn: ICT Systems Security and Privacy Protection: Proceedings / 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017 / De Capitani di Vimercati, Sabrina; Martinelli, Fabio (Hrsg.). Berlin: Springer, 2017, S. 427 – 441
-
A framework for systematic analysis and modeling of trustworthiness requirements using i* and BPMNIn: Trust, Privacy and Security in Digital Business / 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016 / Katsikas, Sokratis (Hrsg.). Berlin: Springer Verlag, 2016, S. 3 – 18
-
Enhancing business process models with trustworthiness requirementsIn: Trust Management X: Proceedings / 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 / Habib, Sheikh Mahbub; Vassileva, Julita; Mauw, Sjouke; Mühlhäuser, Max (Hrsg.). Berlin: Springer New York LLC, 2016, S. 33 – 51
-
Patterns for identification of trust concerns and specification of trustworthiness requirementsIn: Proceedings of the 21st European Conference on Pattern Languages of Programs / EuroPlop '16, Kaufbeuren, Germany, July 06 - 10, 2016. New York: ACM, 2016, S. 31
-
Supporting privacy impact assessments using problem-based privacy analysisIn: Software Technologies: Revised Selected Papers / 10th International Joint Conference, ICSOFT 2015, Colmar, France, July 20-22, 2015 / Lorenz, Pascal; van Sinderen, Marten (Hrsg.). Cham: Springer International Publishing, 2016, S. 79 – 98
-
Understanding the privacy goal intervenabilityIn: Trust, Privacy and Security in Digital Business / 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016 / Katsikas, Sokratis (Hrsg.). Berlin: Springer Verlag, 2016, S. 79 – 94
-
1st Workshop on VAriability for QUalIties in SofTware Architecture (VAQUITA) : Workshop IntroductionIn: Proceedings of the 2015 European Conference on Software Architecture Workshops / 9th European Conference on Software Architecture (ECSA 2015), September 7 - 11, 2015, Dubrovnik. New York: ACM, 2015, Article No. 22
-
A Problem-, Quality-, and Aspect-Oriented Requirements Engineering MethodIn: Software Technologies: Revised Selected Papers / 9th International Joint Conference, ICSOFT 2014, Vienna, Austria, August 29-31, 2014 / Holzinger, Andreas (Hrsg.). Cham: Springer International Publishing, 2015, S. 291 – 310
-
A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier InterfaceIn: Computer Safety, Reliability, and Security: Proceedings / 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015 / Koornneef, Flor; van Gulijk, Coen (Hrsg.). Berlin [u.a.]: Springer International Publishing, 2015, S. 90 – 108
-
A structured method for security requirements elicitation concerning the cloud computing domainIn: Standards and Standardization: Concepts, Methodologies, Tools, and Applications. Hershey: IGI Global, 2015, S. 875 – 896
-
A taxonomy of requirements for the privacy goal transparencyIn: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) / 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015 / Fischer-Hübner, Simone (Hrsg.). Cham: Springer Verlag, Jg. 9264, 2015, S. 195 – 209
-
Applying performance patterns for requirements analysisIn: Proceedings of the 20th European Conference on Pattern Languages of Programs / EuroPLoP 2015 20th European Conference on Pattern Languages of Programs Kaufbeuren, Germany — July 08 - 12, 2015 / Link, Claudius; Veli-Pekka, Eloranta (Hrsg.). New York: ACM, 2015, Article No. 35
-
Challenges in Rendering and Maintaining Trustworthiness for Long-Living Software SystemsIn: Software Engineering Workshops 2015: Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2015 / Workshops der Tagung Software Engineering 2015 (SE-WS 2015), 17.-18. März 2015, Dresden, Deutschland. Aachen: RWTH Aachen, 2015, S. 103 – 105Online Volltext (Open Access)
-
Developing secure software using UML patternsIn: Handbook of Research on Innovations in Systems and Software Engineering / Garcia Dâiaz, Vincente; Cueva Lovelle, Juan Manuel; Pelayo Garcâia-Bustelo, Begona Cristina (Hrsg.). Hershey, PA: IGI Global, 2015, S. 32 – 70
-
Developing secure software using UML patternsIn: Standards and Standardization: Concepts, Methodologies, Tools, and Applications. Hershey: IGI Global, 2015, S. 228 – 264
-
Problem-based security requirements elicitation and refinement with presSuREIn: Software Technologies: Revised Selected Papers / 9th International Joint Conference, ICSOFT 2014, Vienna, Austria, August 29-31, 2014 / Holzinger, Anfreas (Hrsg.). Cham: Springer International Publishing, 2015, S. 311 – 330
-
Systematic identification of information flows from requirements to support privacy impact assessmentsIn: ICSOFT 2015: proceedings of the 10th International Joint Conference on Software Technologies / International Joint Conference on Software Technologies, Colmar, Alsace, France, 20-22 July, 2015. Piscataway: Institute of Electrical and Electronics Engineers (IEEE), 2015, S. 43 – 52
-
Towards a reliable mapping between performance and security tactics, and architectural patternsIn: Proceedings of the 20th European Conference on Pattern Languages of Programs / EuroPLoP '15, 21st European Conference on Pattern Languages of Programs, 6. - 10. Juli 2015, Kloster Irsee. New York: ACM, 2015, Article No. 39
-
Towards systematic selection of architectural patterns with respect to quality requirementsIn: Proceedings of the 20th European Conference on Pattern Languages of Programs / EuroPLoP '15, 21st European Conference on Pattern Languages of Programs, 6. - 10. Juli 2015, Kloster Irsee. New York: ACM, 2015, Article No. 40
-
A Structured Approach for Eliciting, Modeling, and Using Quality-Related Domain KnowledgeIn: Computational Science and Its Applications – ICCSA 2014: Proceedings, Part V / 14th International Conference, Guimarães, Portugal, June 30 – July 3, 2014 / Murgante, Beniamino; Sanjay, Misra; A. C. Rocha, Ana Maria (Hrsg.). Cham [u.a.]: Springer International Publishing - Springer, 2014, S. 370 – 386
-
A Structured Comparison of Security StandardsIn: Engineering Secure Future Internet Services and Systems / Heisel, Maritta; Joosen, Wouter; Lopez, Javier (Hrsg.). Cham: Springer International Publishing, 2014, S. 1 – 34
-
A computer-aided process from problems to laws in requirements engineeringIn: Software Technologies: Revised Selected Papers / 8th International Joint Conference, ICSOFT 2013, 29-31 July 2013, Reykjavik / Cordeiro, José; Sinderen, Marten van (Hrsg.). Berlin: Springer, 2014, S. 215 – 234
-
Intertwining Relationship between Requirements, Architecture, and Domain KnowledgeIn: International Conference on Software Engineering Advances (ICSEA): Proceedings / The Ninth International Conference on Software Engineering Advances ICSEA 2014 October 12 - 16, 2014 - Nice, France, 2014
-
Optimizing Functional and Quality Requirements According to Stakeholders’ GoalsIn: Relating System Quality and Software Architecture / Mistrik, Ivan; Bahsoon, Rami; Eeles, Peter; Roshandel, Roshanak; Stal, Michael (Hrsg.). Amsterdam [u.a.]: Elsevier, 2014, S. 75 – 120
-
Privacy-aware cloud deployment scenario selectionIn: Trust, Privacy, and Security in Digital Business / 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Cham: Springer International Publishing, 2014, S. 94 – 105
-
Problem-based requirements interaction analysisIn: Requirements Engineering: Foundation for Software Quality: Proceedings / 20th International Working Conference, REFSQ 2014, Essen, Germany, April 7-10, 2014 / Salinesi, Camille; Weerd, Inge (Hrsg.). Cham: Springer International Publishing, 2014, S. 200 – 215
-
Problem-oriented security patterns for requirements engineeringIn: Proceedings of the 19th European Conference on Pattern Languages of Programs / EuroPLoP 2014 19th European Conference on Pattern Languages of Programs Irsee, Germany — July 09 - 13, 2014 / Veli-Pekka, Eloranta; van Heesch, Uwe (Hrsg.). New York: ACM, 2014, Article No. 9
-
Systematic Derivation of Functional Safety Requirements for Automotive SystemsIn: Computer Safety, Reliability, and Security / 33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014 / Bondavalli, Andrea (Hrsg.). Cham: Springer International Publishing, 2014, S. 65 – 80
-
Towards developing secure software using problem-oriented security patternsIn: Availability, Reliability, and Security in Information Systems / IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference (CD-ARES) and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD), September 8-12, 2014, Fribourg, Switzerland,: Springer, 2014, S. 45 – 62
-
A Framework for Combining Problem Frames and Goal Models to Support Context Analysis during Requirements EngineeringIn: Availability, Reliability, and Security in Information Systems and HCI: Proceedings / IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013 / Cuzzocrea, Alfredo; Kittl, Christian; Simos, Dimitris (Hrsg.). Berlin [u.a.], 2013, S. 272 – 288
-
A Structured and Model-Based Hazard Analysis and Risk Assessment Method for Automotive SystemsIn: 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE) / 24th International Symposium on Software Reliability Engineering (ISSRE) : 4 - 7 Nov. 2013, Pasadena, CA, USA. Piscataway: IEEE, 2013, S. 238 – 247
-
A problem-based threat analysis in compliance with common criteriaIn: Eighth International Conference on Availability, Reliability and Security (ARES), 2013: Proceedings / Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : 2 - 6 Sept. 2013, Regensburg, Germany. Piscataway: IEEE, 2013, S. 111 – 120
-
A usability evaluation of the nessos common body of knowledgeIn: Eighth International Conference on Availability, Reliability and Security (ARES), 2013: Proceedings / Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : 2 - 6 Sept. 2013, Regensburg, Germany. Piscataway: IEEE, 2013, S. 559 – 568
-
Combining goal-oriented and problem-oriented requirements engineering methodsIn: Availability, Reliability, and Security in Information Systems and HCI: Proceedings / IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013 / Cuzzocrea, Alfredo; Kittl, Christian; Simos, Dimitris E.; Xu, Lida (Hrsg.). Berlin: Springer, 2013, S. 178 – 194
-
Common criteria compliant software development (CC-CASD)In: Proceedings of the 28th Annual ACM Symposium on Applied Computing / SAC '13 Coimbra, Portugal — March 18 - 22, 2013 / Shin, Sung Y.; Maldonado, José Carlos (Hrsg.). New York: ACM, 2013, S. 1298 – 1304
-
Enterprise Applications : From Requirements to DesignIn: Aligning enterprise, system, and software architectures / Mistrík, Ivan (Hrsg.). Hershey, Pa.: Business Science Reference, 2013, S. 96 – 117
-
From problems to laws in requirements engineering : Using model-transformationIn: Proceedings of the 8th International Joint Conference on Software Technologies / Cordeiro, José; 8th International Joint Conference on Software Technologies, Reykjavík, Iceland, 29 - 31 July, 2013: SCITEPRESS, 2013, S. 447 – 458
-
Structured pattern-based security requirements elicitation for cloudsIn: Eighth International Conference on Availability, Reliability and Security (ARES), 2013: Proceedings / Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : 2 - 6 Sept. 2013, Regensburg, Germany. Piscataway: IEEE, 2013, S. 465 – 474
-
A Foundation for Requirements Analysis of Privacy Preserving SoftwareIn: Multidisciplinary Research and Practice for Information Systems: Proceedings / Quirchmayr, Gerald; Basl, Josef; You, Ilsun; Xu, Lida; Weippl, Edgar; IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Berlin: Springer Berlin Heidelberg, 2012, S. 93 – 107
-
An aspect-oriented approach to relating security requirements and access controlIn: CAiSE Forum 2012: Proceedings of the CAiSE'12 Forum at the 24th International Conference on Advanced Information Systems Engineering (CAiSE) / 24th International Conference on Advanced Information Systems Engineering (CAiSE), June 28, 2012, Gdańsk, Poland / Kirikova, Marite; Janis, Stirna (Hrsg.). Aachen: RWTH Aachen, 2012, S. 15 – 22Online Volltext (Open Access)
-
Deriving Quality-based Architecture Alternatives with PatternsIn: Software Engineering 2012 / Fachtagung des GI-Fachbereichs Softwaretechnik ; 27. Februar - 2. März 2012 in Berlin / Jähnichen, Stefan (Hrsg.). Bonn: Ges. für Informatik, 2012, S. 71 – 82
-
Designing architectures from problem descriptions by interactive model transformationIn: The 27th annual ACM Symposium on Applied Computing / ACM Symposium on Applied Computing, Riva del Garda, Trento, Italy, March 26 - 30, 2012 / Ossowski, Sascha; Lecca, Paola (Hrsg.). New York: ACM, 2012, S. 1256 – 1258
-
On the Evolution of Component-Based SoftwareIn: Advances in Software Engineering Techniques: Revised Selected Papers / Szmuc, Tomasz; Szpyrka, Marcin; Zendulka, Jaroslav; 4th IFIP TC 2 Central and East European Conference on Software Engineering Techniques, CEE-SET 2009, Krakow, Poland, October 12-14, 2009. Berlin: Springer Berlin Heidelberg, 2012, S. 54 – 69
-
Ontology-Based Identification of Research Gaps and Immature Research AreasIn: Multidisciplinary Research and Practice for Information Systems: Proceedings / IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012 / Quirchmayr, Gerald; Basl, Josef (Hrsg.). Berlin [u.a.]: Springer, 2012, S. 1 – 16
-
Pattern-Based Context Establishment for Service-Oriented ArchitecturesIn: Software Service and Application Engineering: Essays Dedicated to Bernd Krämer on the Occasion of His 65th Birthday / Heisel, Maritta (Hrsg.). Berlin: Springer Berlin Heidelberg, 2012, S. 81 – 101
-
Patterns- and Security-Requirements-Engineering-based Support for Development and Documentation of Security Standard Compliant ICT SystemsIn: Doctoral Symposium of ESSoS 12 / First Doctoral Symposium of the International Symposium on Engineering Secure Software and Systems (ESSoS), 15 February 2012, Eindhoven, The Netherlands / Cuellar, Jorge; Koch, Nora (Hrsg.). Aachen: RWTH, 2012, S. 65 – 70Online Volltext (Open Access)
-
Supporting quality-driven design decisions by modeling variabilityIn: Proceedings of the 8th international ACM SIGSOFT conference on Quality of Software Architectures / QoSA '12, Bertinoro, Italy, June 25 - 28, 2012 / Grassi, Vincenzo (Hrsg.). New York: ACM, 2012, S. 43 – 48
-
Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approachesIn: EngineeEngineering Secure Software and Systemsring secure software and systems: 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings / 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 16-17 February 2012, Eindhoven, The Netherlands / Barthe, Gilles; Livshits, Benjamin; Scandariato, Riccardo (Hrsg.). Berlin: Springer, 2012, S. 14 – 21
-
Using security requirements engineering approaches to support ISO 27001 information security management systems development and documentationIn: Seventh International Conference on Availability, Reliability and Security (ARES), 2012: Proceedings / International Conference on Availability, Reliability, and Security, 20 - 24 Aug. 2012, Prague, Czech Republic. Piscataway, NJ: IEEE, 2012, S. 242 – 248
-
A Method to Derive Software Architectures from Quality RequirementsIn: Proceedings of the 18th Asia Pacific Software Engineering Conference (APSEC 2011) / APSEC 2011; Ho Chi Minh [City], Vietnam, 5 - 8 December 2011 / Tran, Dan Thu (Hrsg.). Piscataway: IEEE, 2011, S. 322 – 330
-
A UML profile and tool support for evolutionary requirements engineeringIn: 15th European Conference on Software Maintenance and Reengineering (CSMR), 2011: Proceedings / Mens, Tom; CSMR, 1 - 4 March 2011, Oldenburg, Germany. Piscataway, NJ: IEEE Computer Society, 2011, S. 161 – 170
-
Systematic Architectural Design Based on Problem PatternsIn: Relating software requirements and architectures / Avgeriou, Paris; Grundy, John; Hall, Jon G (Hrsg.). Berlin [u.a.]: Springer, 2011, S. 133 – 159
-
Systematic Development of UMLsec Design Models Based on Security RequirementsIn: Fundamental Approaches to Software Engineering: Proceedings / 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011 / Giannakopoulou, Dimitra (Hrsg.). Berlin [u.a.]: Springer, 2011, S. 232 – 246
-
Towards Systematic Integration of Quality Requirements into Software ArchitectureIn: Software Architecture / 5th European Conference, ECSA 2011, Essen, Germany, September 13-16, 2011 / Crnkovic, Ivica; Gruhn, Volker; Book, Matthias (Hrsg.). Berlin: Springer, 2011, S. 17 – 25
-
Towards a Common Body of Knowledge for Engineering Secure Software and ServicesIn: Proceedings of the International Conference on Knowledge Management and Information Sharing / International Conference on Knowledge Management and Information Sharing : Paris, France, 26 - 29 October, 2011 / Filipe, Joaquim (Hrsg.): SciTePress, 2011, S. 369 – 374
-
UML4PF : A tool for problem-oriented requirements analysisIn: 19th IEEE International Requirements Engineering Conference (RE) / 19th IEEE International Requirements Engineering Conference (RE), 2011 : Aug. 29 2011 - Sept. 2 2011, Trento, Italy / Institute of Electrical and Electronics Engineers (Hrsg.). Piscataway, NJ: IEEE, 2011, S. 349 – 350
-
A UML Profile for Requirements Analysis of Dependable SoftwareIn: Computer Safety, Reliability, and Security: Proceedings / 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010 / Schoitsch, Erwin (Hrsg.). Berlin [u.a.]: Springer, 2010, S. 317 – 331
-
A pattern-based method to develop secure softwareIn: Software engineering for secure systems: industrial and research perspectives / Mouratidis, Haralambos: IGI Global, 2010, S. 32 – 74
-
Making Pattern- and Model-Based Software Development More RigorousIn: Formal Methods and Software Engineering: 12th International Conference on Formal Engineering Methods / 12th International Conference on Formal Engineering Methods, ICFEM 2010, Shanghai, China, November 17-19, 2010 / Dong, Jin Song; Zhu, Huibiao (Hrsg.). Berlin [u.a.]: Springer, 2010, S. 253 – 269
-
A Foundation for Requirements Analysis of Dependable SoftwareIn: Computer Safety, Reliability, and Security: Proceedings / 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Berlin [u.a.]: Springer, 2009, S. 311 – 325
-
Deriving software architectures from problem descriptionsIn: Software engineering 2009 - Workshopband: Fachtagung des GI-Fachbereichs Softwaretechnik, 02. - 06.03.2009 in Kaiserslautern / 5. Fachtagung des GI-Fachbereichs Softwaretechnik (SE 2009), 02.-06.03.2009, Kaiserslautern / Münch, Jürgen; Liggesmeyer, Peter (Hrsg.). Bonn: Gesellschaft für Informatik e.V., 2009, S. 383 – 302
-
Workshop Modellgetriebene Softwarearchitektur - Evolution, Integration und Migration (MSEIM 2009)In: Software Engineering 2009: Workshopband / Fachtagung des GI-Fachbereichs Softwaretechnik, 02. - 06.03.2009 in Kaiserslautern / Münch, Jürgen; Liggesmeyer, Peter (Hrsg.). Bonn: Ges. für Informatik, 2009, S. 363 – 366
-
A Formal Metamodel for Problem FramesIn: Model Driven Engineering Languages and Systems: Proceedings / 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008 / Czarnecki, Krzysztof; Ober, Ileana; Bruel, Jean-Michel; Uhl, Axel; Völter, Markus (Hrsg.). Berlin: Springer, 2008
-
A systematic account of problem framesIn: Proceedings of the 12th European Conference on Pattern Languages of Programs: (EuroPLoP'2007 / Schümmer, Till; Hvatum, Lise B. (Hrsg.). Konstanz: UVK, Univ.-Verl. Konstanz, 2008, S. 749 – 768
-
Analysis and Component-based Realization of Security RequirementsIn: Third International Conference on Availability, Reliability and Security / Third International Conference on Availability, Reliability and Security, 2008 : ARES 08 ; 4 - 7 March 2008, Barcelona, Spain / Jakoubi, Stefan (Hrsg.). Los Alamitos, Calif. [u.a.]: IEEE Computer Society, 2008, S. 195 – 203
-
Using UML Environment Models for Test Case GenerationIn: Software Engineering 2008: Workshopband ; Fachtagung des GI-Fachbereichs Softwaretechnik, 18. - 22.02.2008 in München / Software Engineering 2008 ; Fachtagung GI-Fachbereich Softwaretechnik ; 18. - 22.02.2008, München, Germany / Maalej, Walid; Bruegge, Bernd (Hrsg.). Bonn: Gesellschaft für Informatik, 2008, S. 399 – 406
-
Workshop Modellgetriebene Softwarearchitektur : Evolution, Integration und Migration (MSEIM 2008)In: Software Engineering 2008: Workshopband ; Fachtagung des GI-Fachbereichs Softwaretechnik ; 18. - 22.02.2008 in München / Software Engineering 2008 ; Fachtagung GI-Fachbereich Softwaretechnik ; 18. - 22.02.2008, München, Germany / Maalej, Walid; Bruegge, Bernd (Hrsg.). Bonn: Gesellschaft für Informatik, 2008, S. 173 – 177
-
Workshop Modellgetriebene Softwarearchitektur - Evolution, Integration und MigrationIn: Software Engineering 2008: Fachtagung des GI-Fachbereichs Softwaretechnik ; 18. - 22.02.2008 in München / Software Engineering 2008 ; Fachtagung GI-Fachbereich Softwaretechnik ; 18. - 22.02.2008, München, Germany / Herrmann, Korbinian; Bruegge, Bernd (Hrsg.). Bonn: Gesellschaft für Informatik, 2008, S. 285 – 287
-
A Pattern System for Security Requirements EngineeringIn: The Second International Conference on Availability, Reliability and Security: Proceedings / The Second International Conference on Availability, Reliability and Security, 2007 : ARES 2007 ; 10 - 13 April 2007, Vienna, Austria / European Network and Information Security Agency; Technische Universität Wien (Hrsg.). Los Alamitos, Calif. [u.a.]: IEEE Computer Society, 2007, S. 356 – 365
-
A Security Engineering Process based on PatternsIn: 18th International Conference on Database and Expert Systems Applications / DEXA 2007; 3-7 Sept. 2007; Regensburg, Germany. Piscataway Township: IEEE, 2007
-
Enhancing Dependability of Component-Based SystemsIn: Reliable Software Technologies - Ada Europe 2007: Proceedings / 12th Ada-Europe Intenational Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007 / Abdennahder, Nabil; Kordon, Fabrice (Hrsg.). Berlin [u.a.]: Springer, 2007, S. 41 – 54
-
Pattern-based Evolution of Software ArchitecturesIn: Software Architecture: First European Conference, ECSA 2007 Madrid, Spain, September 24-26, 2007 Proceedings / First European Conference, ECSA 2007, Madrid, Spain, September 24-26, 2007 / Oquendo, Flavio (Hrsg.). Berlin/Heidelberg: Springer, 2007
-
A method for component-based software and system developmentIn: 32nd EUROMICRO Conference on Software Engineering and Advanced Applications: Proceedings / SEAA; Cavtat/Dubrovnik; Croatia; 29 August 2006 through 1 September 2006. Piscataway: IEEE, 2006, S. 72 – 80DOI, Online Volltext (Open Access)
-
Component composition through architectural patterns for problem framesIn: Proceedings of APSEC 2006, XIII Asia Pacific Software Engineering Conference / XIII Asia Pacific Software Engineering Conference; Bangalore; India; 6 - 8 December 2006 / Jalote, Pankaj (Hrsg.). Los Alamitos: IEEE Computer Society, 2006, S. 27 – 36
-
Security Engineering Using Problem FramesIn: Emerging Trends in Information and Communication Security: Proceedings / International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006 / Müller, Günter (Hrsg.). Berlin [u.a.]: Springer, 2006, S. 238 – 253
-
A Model-Based Development Process for Embedded SystemsIn: Workshop on Model-Based Development of Embedded Systems: Proceedings. Braunschweig, 2005
-
Problem Frames and Architectures for Security ProblemsIn: Computer Safety, Reliability, and Security: Proceedings / 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005 / Dahll, Gustav; Winther, Rune; Gran, Bjoern Axel (Hrsg.). Berlin [u.a.]: Springer, 2005, S. 390 – 404
-
A Problem-Oriented Approach to Common Criteria CertificationIn: Computer Safety, Reliability and Security: Proceedings / 21st International Conference, SAFECOMP 2002 Catania, Italy, September 10–13, 2002 / Anderson, Stuart; Felici, Massimo; Bologna, Sandro (Hrsg.). Berlin [u.a.]: Springer, 2002, S. 334 – 346
-
Doctoral Symposium of ESSoS 2013 : Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013)
Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013), 27 February - 01 March 2013, Rocquencort, Paris, France,Aachen: RWTH Aachen, 2013
(CEUR Workshop Proceedings ; 965)Online Volltext (Open Access) -
Technical Report on the Extension of the Layered Privacy LanguageDuisburg, Essen, 2021DOI, Online Volltext (Open Access)
-
Towards a Computer-Aided Problem-Oriented Variability Requirements Engineering MethodIn: Advanced Information Systems Engineering Workshops: Springer International Publishing, 2014, S. 136 – 147