Universität Duisburg-Essen
Logo der Organisationseinheit "Informatik"

Informatik

Software Engineering

  • Suchen
  • DE
    • English
  • Studieren an der UDE

Kristian Beckers

  1. INKO
  2. SWE
  3. Mitarbeiter
  • SOFTWARE ENGINEERING
  • MITARBEITER
  • NEWS
  • STELLENANGEBOTE
  • FORSCHUNG
    FORSCHUNG
    • Publikationen
    • Tools
  • LEHRE
    LEHRE
    • Sommersemster
    • Wintersemester
    • Informationen zu Prüfungen
    • Abschlussarbeiten
  • ANFAHRT
Arbeitsgebiete
Projekte
Publikationen
Lehre
Links
Sonstiges
  • Security Requirements Engineering and Privacy (Problem Frames)
  • Security Standards (ISO 27000, Common Criteria)
  • Formal Methods and Software Specification Techniques (Z, UML)
  • Distributed and Real Time Systems (Peer-to-Peer, Cloud Computing, Voice-over-IP)
  • Security Testing (Security Testing Patterns, Fuzzing)
  • Context-Pattern
Network of Excellence on Engineering Secure Future Internet Software.

QuickSearch:   Number of matching entries: 0.

YearTitleAuthorJournal/ProceedingsPublisher
2014 A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain

[BibTeX]

Beckers, K., Côté, I., Goeke, L., Güler, S. & Heisel, M. International Journal of Secure Software Engineering (IJSSE) - Special Issue on 7th International Workshop on Secure Software Engineering (SecSE 2013)   IGI Global  
BibTeX:
@article{Beckers2014-IJIS},
  year = {2014},
  title = {A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain},
  author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Ludger Goeke and Selim G\"{u}ler and Maritta Heisel},
  journal = {International Journal of Secure Software Engineering (IJSSE) - Special Issue on 7th International Workshop on Secure Software Engineering (SecSE 2013)},
  publisher = {IGI Global},
  volume = {5},
  number = {2},
  pages = {19 -- 41},
  url = {http://www.igi-global.com}
}
2014 Supporting Common Criteria Security Analysis with Problem Frames

[BibTeX]

Beckers, K., Hatebur, D. & Heisel, M. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)   Innovative Information Science & Technology Research Group (ISYOU)  
BibTeX:
@article{Beckers2014-Jowua},
  year = {2014},
  title = {Supporting Common Criteria Security Analysis with Problem Frames},
  author = {Kristian Beckers and Denis Hatebur and Maritta Heisel},
  journal = {Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)},
  publisher = {Innovative Information Science & Technology Research Group (ISYOU)},
  volume = {5},
  number = {1},
  pages = {37-63},
  url = {http://isyou.info/}
}
2014 Goal-based Establishment of an Information Security Management System compliant to ISO 27001

[BibTeX]

Beckers, K. SOFSEM 2014: Theory and Practice of Computer Science   Springer  
BibTeX:
@incollection{Beckers2014-sofsem},
  year = {2014},
  title = {Goal-based Establishment of an Information Security Management System compliant to ISO 27001},
  booktitle = {SOFSEM 2014: Theory and Practice of Computer Science},
  author = {Kristian Beckers},
  publisher = {Springer},
  series = {LNCS 8327},
  pages = {102-113},
  url = {http://www.springerlink.com/}
}
2014 A Threat Analysis Methodology for Smart Home Scenarios

[BibTeX]

Beckers, K., Faßbender, S., Heisel, M. & Suppan, S. Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)   Springer  
BibTeX:
@conference{BFHS2014},
  year = {2014},
  title = {{A} {T}hreat {A}nalysis {M}ethodology for {S}mart {H}ome {S}cenarios},
  booktitle = {Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)},
  author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Santiago Suppan},
  publisher = {Springer},
  series = {LNCS 8448},
  pages = {Pages 94-124},
  url = {http://www.springerlink.com/}
}
2014 Considering Attacker Motivation in Attack Graphs Analysis in a Smart Grid Scenario

[BibTeX]

Beckers, K., Heisel, M., Krautsevich, L., Maritnelli, F. & Yautsiukhin, A. Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)   Springer Berlin Heidelberg  
BibTeX:
@conference{BHKMY2014},
  year = {2014},
  title = {{C}onsidering {A}ttacker {M}otivation in {A}ttack {G}raphs {A}nalysis in a {S}mart {G}rid {S}cenario},
  booktitle = {Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)},
  author = {Kristian Beckers and Maritta Heisel and Leanid Krautsevich and Fabio Maritnelli and Artsiom Yautsiukhin},
  publisher = {Springer Berlin Heidelberg},
  series = {LNCS 8448},
  pages = {Pages 30-47},
  url = {http://www.springerlink.com/}
}
2014 ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System

[BibTeX]

Beckers, K., Heisel, M., Solhaug, B. & Stølen, K. Advances in Engineering Secure Future Internet Services and Systems   Springer  
BibTeX:
@inproceedings{BHSS2014},
  year = {2014},
  title = {ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System},
  booktitle = {Advances in Engineering Secure Future Internet Services and Systems},
  author = {Kristian Beckers and Maritta Heisel and Bj{\o}rnar Solhaug and Ketil St{\o}len},
  publisher = {Springer},
  number = {8431},
  series = {LNCS State-of-the-Art Surveys},
  pages = {315-344},
  url = {http://www.springerlink.com/}
}
2014 A Structured Comparison of Security Standards

[BibTeX]

Beckers, K., Côté, I., Fenz, S., Hatebur, D. & Heisel, M. Advances in Engineering Secure Future Internet Services and Systems   Springer  
BibTeX:
@inproceedings{Lopez2014},
  year = {2014},
  title = {A Structured Comparison of Security Standards},
  booktitle = {Advances in Engineering Secure Future Internet Services and Systems},
  author = {Kristian Beckers and Isabelle C\^{o}t\'{e} and Stefan Fenz and Denis Hatebur and Maritta Heisel},
  publisher = {Springer},
  number = {8431},
  series = {LNCS State-of-the-Art Surveys},
  pages = {1-34},
  url = {http://www.springerlink.com/}
}
2014 Trust-Aware Decision-Making Methodology for Cloud Sourcing

[BibTeX]

Moyano, F., Beckers, K. & Fernandez-Gago, C. In the proceedings of the 26th International Conference on Advanced Information Systems Engineering (CAiSE)   Springer  
BibTeX:
@conference{MBG2014},
  year = {2014},
  title = {Trust-Aware Decision-Making Methodology for Cloud Sourcing},
  booktitle = {In the proceedings of the 26th International Conference on Advanced Information Systems Engineering (CAiSE)},
  author = {Francisco Moyano and Kristian Beckers and Carmen Fernandez-Gago},
  publisher = {Springer},
  series = {LNCS 8484},
  pages = {136 -- 149},
  url = {http://www.springerlink.com/}
}
2014 Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements

[BibTeX]

Moyano, F., Fernandez-Gago, C., Beckers, K. & Heisel, M. Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)   Springer  
BibTeX:
@conference{MGBH2014},
  year = {2014},
  title = {Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements},
  booktitle = {Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)},
  author = {Francisco Moyano and Carmen Fernandez-Gago and Kristian Beckers and Maritta Heisel},
  publisher = {Springer},
  series = {LNCS 8448},
  pages = {166 -- 180},
  url = {http://www.springerlink.com/}
}
2014 Analysis of Social Engineering Threats with Attack Graphs

[BibTeX]

Beckers, K., Krautsevich, L. & Yautsiukhin, A. Proceedings of the 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA) - Affiliated workshop with ESORICS   Springer  
BibTeX:
@inproceedings{QASA2014},
  year = {2014},
  title = {{Analysis of Social Engineering Threats with Attack Graphs}},
  booktitle = {{Proceedings of the 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA) - Affiliated workshop with ESORICS}},
  author = {Kristian Beckers and Leanid Krautsevich and Artsiom Yautsiukhin},
  publisher = {Springer},
  series = {LNCS},
  pages = {to appear},
  url = {http://www.springerlink.com/}
}
2014 A Catalog of Security Requirements Patterns for the Domain of Cloud Computing Systems

[BibTeX]

Beckers, K., Côté, I. & Goeke, L. Proceedings 29th Symposium on Applied Computing   ACM  
BibTeX:
@conference{SAC2014},
  year = {2014},
  title = {{A Catalog of Security Requirements Patterns for the Domain of Cloud Computing Systems}},
  booktitle = {Proceedings 29th Symposium on Applied Computing},
  author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Ludger Goeke},
  publisher = {ACM},
  pages = {337-342},
  url = {http://dl.acm.org/}
}
2014 Systematic Derivation of Functional Safety Requirements for Automotive Systems

[BibTeX]

Beckers, K., Côté, I., Frese, T., Hatebur, D. & Heisel, M. Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP)   Springer  
BibTeX:
@inproceedings{Safecomp2014},
  year = {2014},
  title = {{Systematic Derivation of Functional Safety Requirements for Automotive Systems}},
  booktitle = {{Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP)}},
  author = {Kristian Beckers and Isabelle C\^ot\'e and Thomas Frese and Denis Hatebur and Maritta Heisel},
  publisher = {Springer},
  series = {LNCS 8666},
  pages = {65--80},
  url = {http://www.springerlink.com/}
}
2014 A Problem-based Approach for Computer Aided Privacy Threat Identification

[BibTeX]

Beckers, K., Faßbender, S., Heisel, M. & Meis, R. APF 2012   Springer  
BibTeX:
@inproceedings{threatID2012},
  year = {2014},
  title = {A Problem-based Approach for Computer Aided Privacy Threat Identification},
  booktitle = {APF 2012},
  author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Rene Meis},
  publisher = {Springer},
  volume = {8319},
  series = {LNCS},
  pages = {1--16},
  url = {http://www.springerlink.com/}
}
2014 Privacy-Aware Cloud Deployment Scenario Selection

[BibTeX]

Beckers, K., Faßbender, S., Gritzalis, S., Heisel, M., Kalloniatis, C. & Meis, R. Trust, Privacy, and Security in Digital Business   Springer  
BibTeX:
@inproceedings{TrustBus2014},
  year = {2014},
  title = {Privacy-Aware Cloud Deployment Scenario Selection},
  booktitle = {Trust, Privacy, and Security in Digital Business},
  author = {Beckers, K. and Fa\ss{}bender, S. and Gritzalis, S. and Heisel, M. and Kalloniatis, C. and Meis, R.},
  publisher = {Springer},
  volume = {8647},
  series = {LNCS},
  pages = {94-105},
  url = {http://www.springerlink.com/}
}
2013 A Problem-based Threat Analysis in compliance with Common Criteria

[BibTeX]

Beckers, K., Hatebur, D. & Heisel, M. Proceedings of the International Conference on Availability, Reliability and Security (ARES)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2013-ares1},
  year = {2013},
  title = { A Problem-based Threat Analysis in compliance with Common Criteria },
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES})},
  author = {Kristian Beckers and Denis Hatebur and Maritta Heisel},
  publisher = {IEEE Computer Society},
  pages = {111-120},
  url = {http://www.ieee.org/}
}
2013 Structured Pattern-Based Security Requirements Elicitation for Clouds

[BibTeX]

Beckers, K., Côté, I., Goeke, L., Güler, S. & Heisel, M. Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 7th International Workshop on Secure Software Engineering (SecSE 2013)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2013-ares2},
  year = {2013},
  title = {Structured Pattern-Based Security Requirements Elicitation for Clouds },
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 7th International Workshop on Secure Software Engineering (SecSE 2013)},
  author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Ludger Goeke and Selim G\"{u}ler and Maritta Heisel},
  publisher = {IEEE Computer Society},
  pages = {465-474},
  url = {http://www.ieee.org/}
}
2013 A Usability Evaluation of the NESSoS Common Body of Knowledge

[BibTeX]

Beckers, K. & Heisel, M. Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 2nd International Workshop on Security Ontologies and Taxonomies(SecOnT 2013)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2013-ares3},
  year = {2013},
  title = { A Usability Evaluation of the NESSoS Common Body of Knowledge},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 2nd International Workshop on Security Ontologies and Taxonomies(SecOnT 2013)},
  author = {Kristian Beckers and Maritta Heisel},
  publisher = {IEEE Computer Society},
  pages = {559-568},
  url = {http://www.ieee.org/}
}
2013 A mapping between ITIL and ISO 27001 processes for use by a high availability video conference service provider

[BibTeX]

Beckers, K., Hofbauer, S., Quirchmayr, G. & Wills, C. C. Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013)   Springer  
BibTeX:
@inproceedings{Beckers2013-cdares1},
  year = {2013},
  title = {A mapping between ITIL and ISO 27001 processes for use by a high availability video conference service provider},
  booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013)},
  author = {Kristian Beckers and Stefan Hofbauer and Gerald Quirchmayr and Christopher C. Wills},
  publisher = {Springer},
  series = {LNCS 8127},
  pages = {224-239},
  url = {http://www.springerlink.com/}
}
2013 Combining Goal-oriented and Problem-oriented Requirements Engineering Methods

[BibTeX]

Beckers, K., Faßbender, S., Heisel, M. & Paci, F. Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013)   Springer  
BibTeX:
@inproceedings{Beckers2013-cdares2},
  year = {2013},
  title = {Combining Goal-oriented and Problem-oriented Requirements Engineering Methods},
  booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013)},
  author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Federica Paci},
  publisher = {Springer},
  series = {LNCS 8127},
  pages = {178-194},
  url = {http://www.springerlink.com/}
}
2013 A Meta-Model Approach to the Fundamentals for a Pattern Language for Context Elicitation

[BibTeX]

Beckers, K., Faßbender, S. & Heisel, M. Proceedings of the 18th European Conference on Pattern Languages of Programs (Europlop)   ACM  
BibTeX:
@inproceedings{Beckers2013-europlop},
  year = {2013},
  title = {A Meta-Model Approach to the Fundamentals for a Pattern Language for Context Elicitation},
  booktitle = {Proceedings of the 18th European Conference on Pattern Languages of Programs (Europlop)},
  author = {Beckers, Kristian and Fa{\ss}bender, Stephan and Heisel, Maritta},
  publisher = {ACM},
  pages = {-},
  note = {Accepted for Publication},
  url = {http://dl.acm.org/}
}
2013 A Structured and Model-Based Hazard Analysis and Risk Assessment Method for Automotive Systems

[BibTeX]

Beckers, K., Frese, T., Hatebur, D. & Heisel, M. Proceedings of the 24th IEEE International Symposium on Software Reliability Engineering   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2013-issre},
  year = {2013},
  title = {{A Structured and Model-Based Hazard Analysis and Risk Assessment Method for Automotive Systems}},
  booktitle = {Proceedings of the 24th IEEE International Symposium on Software Reliability Engineering},
  author = {Kristian Beckers and Thomas Frese and Denis Hatebur and Maritta Heisel},
  publisher = {IEEE Computer Society},
  pages = {238-247},
  url = {http://www.ieee.org/}
}
2013 A pattern-based method for establishing a cloud-specific information security management system

[BibTeX]

Beckers, K., Côté, I., Faßbender, S., Heisel, M. & Hofbauer, S. Requirements Engineering   Springer-Verlag  
BibTeX:
@article{Beckers2013rohtua},
  year = {2013},
  title = {A pattern-based method for establishing a cloud-specific information security management system},
  author = {Beckers, Kristian and C{\^o}t{\'e}, Isabelle and Fa{\ss}bender, Stephan and Heisel, Maritta and Hofbauer, Stefan},
  journal = {Requirements Engineering},
  publisher = {Springer-Verlag},
  pages = {1-53},
  url = {http://www.springerlink.com/}
}
2013 Common Criteria CompliAnt Software Development (CC-CASD)

[BibTeX]

Beckers, K., Côté, I., Hatebur, D., Faßbender, S. & Heisel, M. Proceedings 28th Symposium on Applied Computing   ACM  
BibTeX:
@conference{SAC2013},
  year = {2013},
  title = {{C}ommon {C}riteria {C}ompli{A}nt {S}oftware {D}evelopment ({CC}-{CASD})},
  booktitle = {Proceedings 28th Symposium on Applied Computing},
  author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Denis Hatebur and Stephan Fa{\ss}bender and Maritta Heisel},
  publisher = {ACM},
  pages = {937-943},
  url = {http://dl.acm.org/}
}
2012 Ontology-Based Identification of Research Gaps and Immature Research Areas

[BibTeX]

Beckers, K., Eicker, S., Faßbender, S., Heisel, M., Schmidt, H. & Schwittek, W. Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012)   Springer  
BibTeX:
@inproceedings{Beckers2012-ares1},
  year = {2012},
  title = {Ontology-Based Identification of Research Gaps and Immature Research Areas},
  booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012)},
  author = {Kristian Beckers and Stefan Eicker and Stephan Fa{\ss}bender and Maritta Heisel and Holger Schmidt and Widura Schwittek},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  pages = {1-16},
  url = {http://www.springerlink.com/}
}
2012 Comparing Privacy Requirements Engineering Approaches

[BibTeX]

Beckers, K. Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 6th International Workshop on Secure Software Engineering (SecSE 2012)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2012-ares2},
  year = {2012},
  title = {Comparing Privacy Requirements Engineering Approaches},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 6th International Workshop on Secure Software Engineering (SecSE 2012)},
  author = {Kristian Beckers},
  publisher = {IEEE Computer Society},
  pages = {574-581},
  url = {http://www.ieee.org/}
}
2012 A Foundation for Requirements Analysis of Privacy Preserving Software

[BibTeX]

Beckers, K. & Heisel, M. Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012)   Springer  
BibTeX:
@inproceedings{Beckers2012-ares3},
  year = {2012},
  title = {A Foundation for Requirements Analysis of Privacy Preserving Software},
  booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012)},
  author = {Kristian Beckers and Maritta Heisel},
  publisher = {Springer},
  volume = {7465},
  series = {Lecture Notes in Computer Science},
  pages = {93-107},
  url = {http://www.springerlink.com/}
}
2012 Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation

[BibTeX]

Beckers, K., Heisel, M., Faßbender, S. & Schmidt, H. Proceedings of the International Conference on Availability, Reliability and Security (ARES)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2012-ares4},
  year = {2012},
  title = {Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES})},
  author = {Kristian Beckers and Maritta Heisel and Stephan Fa{\ss}bender and Holger Schmidt},
  publisher = {IEEE Computer Society},
  pages = {243-248},
  url = {http://www.ieee.org/}
}
2012 An integrated Method for Pattern-based Elicitation of Legal Requirements applied to a Cloud Computing Example

[BibTeX]

Beckers, K., Faßbender, S. & Schmidt, H. Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2012-ares5},
  year = {2012},
  title = {An integrated Method for Pattern-based Elicitation of Legal Requirements applied to a Cloud Computing Example},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012)},
  author = {Kristian Beckers and Stephan Fa{\ss}bender and Holger Schmidt},
  publisher = {IEEE Computer Society},
  pages = {463-472},
  url = {http://www.ieee.org/}
}
2012 Peer-to-Peer driven Software Engineering considering Security, Reliability, and Performance

[BibTeX]

Beckers, K. & Faßbender, S. Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2012-ares6},
  year = {2012},
  title = {Peer-to-Peer driven Software Engineering considering Security, Reliability, and Performance},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012)},
  author = {Kristian Beckers and Stephan Fa{\ss}bender},
  publisher = {IEEE Computer Society},
  pages = {485-494},
  url = {http://www.ieee.org/}
}
2012 A Common Body of Knowledge for Engineering Secure Software and Services

[BibTeX]

Schwittek, W., Schmidt, H., Beckers, K., Eicker, S., Faßbender, S. & Heisel, M. Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 1st International Workshop on Security Ontologies and Taxonomies(SecOnT 2012)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2012-ares7},
  year = {2012},
  title = {A Common Body of Knowledge for Engineering Secure Software and Services},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 1st International Workshop on Security Ontologies and Taxonomies(SecOnT 2012)},
  author = {Widura Schwittek and Holger Schmidt and Kristian Beckers and Stefan Eicker and Stephan Fa{\ss}bender and Maritta Heisel},
  publisher = {IEEE Computer Society},
  pages = {499-506},
  url = {http://www.ieee.org/}
}
2012 A privacy preserving approach to Call Detail Records analysis in VoIP systems

[BibTeX]

Hofbauer, S., Beckers, K. & Quirchmayr, G. Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 7th International Workshop on Frontiers in Availability, Reliabilityand Security (FARES 2012)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2012-ares8},
  year = {2012},
  title = {A privacy preserving approach to Call Detail Records analysis in VoIP systems},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 7th International Workshop on Frontiers in Availability, Reliabilityand Security (FARES 2012)},
  author = {Stefan Hofbauer AND Kristian Beckers AND Gerald Quirchmayr},
  publisher = {IEEE Computer Society},
  pages = {307-316},
  url = {http://www.ieee.org/}
}
2012 Supporting the Development and Documentation of Trustworthy ICT Systems according to Security Standard through Patterns and Security Requirements Engineering Approaches

[BibTeX]

Beckers, K. Electronic Proc. of the 1st ESSoS Doctoral Symposium, ESSoS-DS 2012   CEUR-WS.org  
BibTeX:
@conference{BeckersESoSDS2012},
  year = {2012},
  title = {{S}upporting the {D}evelopment and {D}ocumentation of {T}rustworthy {ICT} {S}ystems according to {S}ecurity {S}tandard through {P}atterns and {S}ecurity {R}equirements {E}ngineering {A}pproaches},
  booktitle = {Electronic Proc. of the 1st ESSoS Doctoral Symposium, ESSoS-DS 2012},
  author = {Kristian Beckers},
  publisher = {CEUR-WS.org},
  volume = {834},
  pages = {65-70},
  url = {http://CEUR-WS.org}
}
2012 Supporting the Context Establishment according to ISO 27005 using Patterns

[BibTeX]

Beckers, K. & Faßbender, S. Software Engineering 2012 - Workshopband   GI  
BibTeX:
@inproceedings{beckersF12zemoss},
  year = {2012},
  title = {Supporting the Context Establishment according to ISO 27005 using Patterns},
  booktitle = {Software Engineering 2012 - Workshopband},
  author = {Kristian Beckers and Stephan Fa{\ss}bender},
  publisher = {GI},
  pages = {141-146},
  note = {Workshop Zertifizierung und modellgetriebene Entwicklung sicherer Software, Software Engineering 2012 (ZeMoSS'12)},
  url = {http://www.gi.com/}
}
2012 Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches

[BibTeX]

Beckers, K., Faßbender, S., Heisel, M., Küster, J.-C. & Schmidt, H. Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS)   Springer  
BibTeX:
@inproceedings{BeckersFHKS12},
  year = {2012},
  title = {Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches},
  booktitle = {Proceedings of the International Symposium on Engineering Secure Software and Systems ({ESSoS})},
  author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Jan-Christoph K{\"u}ster and Holger Schmidt},
  publisher = {Springer},
  series = {LNCS},
  pages = {14-21},
  url = {http://www.springerlink.com/}
}
2012 A Pattern-Based Method for Identifying and Analyzing Laws

[BibTeX]

Beckers, K., Faßbender, S., Küster, J.-C. & Schmidt, H. Proceedings of the International Working Conference onRequirements Engineering: Foundation for Software Quality (REFSQ)   Springer  
BibTeX:
@inproceedings{BeckersFKS12},
  year = {2012},
  title = {A Pattern-Based Method for Identifying and Analyzing Laws},
  booktitle = {Proceedings of the International Working Conference onRequirements Engineering: Foundation for Software Quality ({REFSQ})},
  author = {Kristian Beckers and Stephan Fa{\ss}bender and Jan-Christoph K{\"u}ster and Holger Schmidt},
  publisher = {Springer},
  series = {LNCS},
  pages = {256-262},
  url = {http://www.springerlink.com/}
}
2012 Patterns- and Security-Requirements-Engineering-based Support for Development and Documentation of Security Standard Compliant ICT Systems

[BibTeX]

Beckers, K. DOKTORANDENSYMPOSIUM DER SOFTWARE ENGINEERING 2012 PROCEEDINGS   Brandenburg University of Technology  
BibTeX:
@conference{BeckersSE2012},
  year = {2012},
  title = {{P}atterns- and {S}ecurity-{R}equirements-{E}ngineering-based {S}upport for {D}evelopment and {D}ocumentation of {S}ecurity {S}tandard {C}ompliant {ICT} {S}ystems},
  booktitle = {DOKTORANDENSYMPOSIUM DER SOFTWARE ENGINEERING 2012 PROCEEDINGS},
  author = {Kristian Beckers},
  publisher = {Brandenburg University of Technology},
  volume = {01/12},
  pages = {25-30},
  url = {http://www-docs.tu-cottbus.de/programmiersprachen-compilerbau/public/publikationen/2012/DS-SE-2012.pdf}
}
2012 Conducting a Privacy Impact Analysis for the Analysis of Communication Records

[BibTeX]

Hofbauer, S., Beckers, K. & Quirchmayr, G. Proceedings of The International Conferences on Perspectives in Business Informatics Research (BIR 2012)   Springer  
BibTeX:
@inproceedings{hofbauer2012privacymethod},
  year = {2012},
  title = {Conducting a Privacy Impact Analysis for the Analysis of Communication Records},
  booktitle = {Proceedings of The International Conferences on Perspectives in Business Informatics Research (BIR 2012)},
  author = {Stefan Hofbauer AND Kristian Beckers AND Gerald Quirchmayr},
  publisher = {Springer},
  volume = {128},
  series = {Lecture Notes in Business Information Processing},
  pages = {148-161},
  url = {http://www.springerlink.com/}
}
2012 A Lightweight Privacy Preserving Approach for Analysing Communication Records to Prevent VoIP Attacks using Toll Fraud as an Example

[BibTeX]

Hofbauer, S., Beckers, K., Quirchmayr, G. & Sorge, C. Proceedings of The Second International Symposium on Anonymity and Communication Systems (ACS-2012)   IEEE Computer Society  
BibTeX:
@inproceedings{hofbauer2012spit},
  year = {2012},
  title = {A Lightweight Privacy Preserving Approach for Analysing Communication Records to Prevent VoIP Attacks using Toll Fraud as an Example},
  booktitle = {Proceedings of The Second International Symposium on Anonymity and Communication Systems (ACS-2012)},
  author = {Stefan Hofbauer AND Kristian Beckers AND Gerald Quirchmayr AND Christoph Sorge},
  publisher = {IEEE Computer Society},
  pages = {992-997},
  url = {http://www.ieee.org/}
}
2012 Pattern-based Context Establishment for Service-Oriented Architectures

[BibTeX]

Beckers, K., Faßbender, S., Heisel, M. & Meis, R. Software Service and Application Engineering   Springer  
BibTeX:
@inproceedings{sdps2012},
  year = {2012},
  title = {Pattern-based Context Establishment for Service-Oriented Architectures},
  booktitle = {Software Service and Application Engineering},
  author = {Beckers, Kristian and Fa\ss{}bender, Stephan and Heisel, Maritta and Meis, Rene},
  publisher = {Springer},
  series = {LNCS 7365},
  pages = {81-101},
  url = {http://www.springerlink.com/}
}
2011 Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing

[BibTeX]

Beckers, K., Küster, J.-C., Faßbender, S. & Schmidt, H. Proceedings of the International Conference on Availability, Reliability and Security (ARES)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2011},
  year = {2011},
  title = {Pattern-Based Support for Context Establishment and Asset Identification of the {ISO} 27000 in the Field of Cloud Computing},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES})},
  author = {Kristian Beckers and Jan-Christoph K{\"u}ster and Stephan Fa{\ss}bender and Holger Schmidt},
  publisher = {IEEE Computer Society},
  pages = {327--333},
  url = {http://www.ieee.org/}
}
2010 Security and Compliance in Clouds

[BibTeX]

Beckers, K. & Jürjens, J. ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference   Vieweg + Teubner  
BibTeX:
@inproceedings{Beckers2010},
  year = {2010},
  title = {Security and Compliance in Clouds},
  booktitle = {ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference},
  author = {Kristian Beckers and Jan J\"{u}rjens},
  publisher = {Vieweg + Teubner},
  pages = {91 - 101},
  url = {http://www.springer-vieweg.de}
}
2010 Process Intelligence in der Finanzwirtschaft

[BibTeX]

Gsell, H., Weißenberg, N., Beckers, K. & Hirsch, M. ERP ManagementSoftware as a Service, Cloud Computing und Mobile Technologien   GITO Verlag  
BibTeX:
@inproceedings{Gsell2010},
  year = {2010},
  title = {Process Intelligence in der Finanzwirtschaft},
  booktitle = {Software as a Service, Cloud Computing und Mobile Technologien},
  author = {Heiko Gsell and Norbert Wei{\ss}enberg and Kristian Beckers and Martin Hirsch},
  journal = {ERP Management},
  publisher = {GITO Verlag},
  pages = {63 - 75},
  url = {www.gito.de}
}
2010 Process Compliance und Process Intelligence in der Finanzwirtschaft

[BibTeX]

Hüning, N., Gsell, H., Weißenberg, N., Hirsch, M. & Beckers, K. ERP Management   GITO Verlag  
BibTeX:
@article{Huening2010},
  year = {2010},
  title = {Process Compliance und Process Intelligence in der Finanzwirtschaft},
  author = {Nadine H\"{u}ning and Heiko Gsell and Norbert Wei{\ss}enberg and Martin Hirsch and Kristian Beckers},
  journal = {ERP Management},
  publisher = {GITO Verlag},
  volume = {2},
  pages = {39 - 42},
  url = {www.gito.de}
}
2009 Single-message denial-of-service attacks against voice-over- internet protocol terminals

[BibTeX]

Seedorf, J., Beckers, K. & Huici, F. International Journal of Electronic Security and Digital Forensics   Inderscience Publishers  
BibTeX:
@article{sip09DOS},
  year = {2009},
  title = {Single-message denial-of-service attacks against voice-over- internet protocol terminals},
  author = {Jan Seedorf and Kristian Beckers and Felipe Huici},
  journal = {International Journal of Electronic Security and Digital Forensics},
  publisher = {Inderscience Publishers},
  volume = {2},
  pages = {29-34},
  url = {http://dx.doi.org/10.1504/IJESDF.2009.023873},
  doi = {10.1504/IJESDF.2009.023873}
}
2008 Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks

[BibTeX]

Seedorf, J., Beckers, K. & Huici, F. Communications in Computer and Information Science   Springer  
BibTeX:
@article{sip08Dos},
  year = {2008},
  title = {Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks},
  author = {Jan Seedorf and Kristian Beckers and Felipe Huici},
  journal = {Communications in Computer and Information Science},
  publisher = {Springer},
  volume = {12},
  series = {CCIS},
  pages = {61-64},
  url = {http://www.springerlink.com/}
}

Proposed Bachelor, Diploma and Master thesis

Titel Art der Arbeit

Teaching
Sommer semester 2013 - Seminar Modelbased Privacy and Security Requirements Engineering

Winter semester 2012/2013 - Seminar Online Privacy
Summer semester 2012 - Exercises for Development of Safe and Secure Software
Winter semester 2011/2012 - Exercises for Formal Specification von Softwaresystems
Winter semester 2011/2012 - Seminar Cloud Computing Architectures considering Security and Compliance
Summer semester 2011 - Exercises for Algorithms und Data Structures

Links

Talks

08.04.2013 - Essen
VDE EWNS 2012 Workshop for Network Security in Essen
Thema:"Identification of Research Gaps in the NESSoS Common Body of Knowledge"
http://wiki.uni-due.de/TdR/images/6/6e/Programm_EWNS2013.pdf

29.03.2012 - Essen
VDE EWNS 2012 Workshop for Network Security in Essen
Thema: "Eine Methode zur Anforderungsanalyse von Privacy nach Common Criteria"
http://www.vde.com/de/Veranstaltungen/Workshops/Seiten/VeranstaltungsDetails.aspx?vdeEventID=43d3d89c-9110-45f2-9a02-1d16b2705323

08.04.2011 - Darmstadt
GI Fachgruppe KuVS - Kommunikation und Verteilte Systeme Fachgespräch zu Cloud Security
Thema: "Pattern-Based Compliance and Security Engineering for Clouds"
http://www.kuvs.de/fachgespr/sicherheit-fur-cloud-computing/

19.11.2010, - Frankfurt/Main
GI Fachgruppe SECMGT - Management von Informationssicherheit Workshop zum Thema "Compliance Management"
Thema: "Compliance in Clouds – Möglichkeiten zur Überprüfung von Sicherheitszielen im Cloud Computing"
http://www1.gi-ev.de/gliederungen/fachbereiche/sicherheit/fg-secmgt/workshops/2010-11-19/

Thesis

2008 - Diploma Thesis in Collaboration with NEC Research Labs Heidelberg
Title: "Automated Vulnerability Analysis of SIP-Implementations and SIP-specific Signature Generation
for Knowledge-based Intrusion Detection Systems"

  • Infoline
  • Hilfe im Notfall
  • Impressum
  • © UDE
  • Letzte Änderung: 25.09.2014
  • @uni-due.de