QuickSearch:   Number of matching entries: 0.

YearTitleAuthorJournal/ProceedingsPublisher
2014 A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain Beckers, K., Côté, I., Goeke, L., Güler, S. & Heisel, M. International Journal of Secure Software Engineering (IJSSE) - Special Issue on 7th International Workshop on Secure Software Engineering (SecSE 2013)   IGI Global  
BibTeX:
@article{Beckers2014-IJIS},
  year = {2014},
  title = {A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain},
  author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Ludger Goeke and Selim G\"{u}ler and Maritta Heisel},
  journal = {International Journal of Secure Software Engineering (IJSSE) - Special Issue on 7th International Workshop on Secure Software Engineering (SecSE 2013)},
  publisher = {IGI Global},
  volume = {5},
  number = {2},
  pages = {19 -- 41},
  url = {http://www.igi-global.com}
}
2014 Supporting Common Criteria Security Analysis with Problem Frames Beckers, K., Hatebur, D. & Heisel, M. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)   Innovative Information Science & Technology Research Group (ISYOU)  
BibTeX:
@article{Beckers2014-Jowua},
  year = {2014},
  title = {Supporting Common Criteria Security Analysis with Problem Frames},
  author = {Kristian Beckers and Denis Hatebur and Maritta Heisel},
  journal = {Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)},
  publisher = {Innovative Information Science & Technology Research Group (ISYOU)},
  volume = {5},
  number = {1},
  pages = {37-63},
  url = {http://isyou.info/}
}
2014 Goal-based Establishment of an Information Security Management System compliant to ISO 27001 Beckers, K. SOFSEM 2014: Theory and Practice of Computer Science   Springer  
BibTeX:
@incollection{Beckers2014-sofsem},
  year = {2014},
  title = {Goal-based Establishment of an Information Security Management System compliant to ISO 27001},
  booktitle = {SOFSEM 2014: Theory and Practice of Computer Science},
  author = {Kristian Beckers},
  publisher = {Springer},
  series = {LNCS 8327},
  pages = {102-113},
  url = {http://www.springerlink.com/}
}
2014 A Threat Analysis Methodology for Smart Home Scenarios Beckers, K., Faßbender, S., Heisel, M. & Suppan, S. Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)   Springer  
BibTeX:
@conference{BFHS2014},
  year = {2014},
  title = {{A} {T}hreat {A}nalysis {M}ethodology for {S}mart {H}ome {S}cenarios},
  booktitle = {Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)},
  author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Santiago Suppan},
  publisher = {Springer},
  series = {LNCS 8448},
  pages = {Pages 94-124},
  url = {http://www.springerlink.com/}
}
2014 Considering Attacker Motivation in Attack Graphs Analysis in a Smart Grid Scenario Beckers, K., Heisel, M., Krautsevich, L., Maritnelli, F. & Yautsiukhin, A. Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)   Springer Berlin Heidelberg  
BibTeX:
@conference{BHKMY2014},
  year = {2014},
  title = {{C}onsidering {A}ttacker {M}otivation in {A}ttack {G}raphs {A}nalysis in a {S}mart {G}rid {S}cenario},
  booktitle = {Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)},
  author = {Kristian Beckers and Maritta Heisel and Leanid Krautsevich and Fabio Maritnelli and Artsiom Yautsiukhin},
  publisher = {Springer Berlin Heidelberg},
  series = {LNCS 8448},
  pages = {Pages 30-47},
  url = {http://www.springerlink.com/}
}
2014 ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System Beckers, K., Heisel, M., Solhaug, B. & Stølen, K. Advances in Engineering Secure Future Internet Services and Systems   Springer  
BibTeX:
@inproceedings{BHSS2014},
  year = {2014},
  title = {ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System},
  booktitle = {Advances in Engineering Secure Future Internet Services and Systems},
  author = {Kristian Beckers and Maritta Heisel and Bj{\o}rnar Solhaug and Ketil St{\o}len},
  publisher = {Springer},
  number = {8431},
  series = {LNCS State-of-the-Art Surveys},
  pages = {315-344},
  url = {http://www.springerlink.com/}
}
2014 A Structured Comparison of Security Standards Beckers, K., Côté, I., Fenz, S., Hatebur, D. & Heisel, M. Advances in Engineering Secure Future Internet Services and Systems   Springer  
BibTeX:
@inproceedings{Lopez2014},
  year = {2014},
  title = {A Structured Comparison of Security Standards},
  booktitle = {Advances in Engineering Secure Future Internet Services and Systems},
  author = {Kristian Beckers and Isabelle C\^{o}t\'{e} and Stefan Fenz and Denis Hatebur and Maritta Heisel},
  publisher = {Springer},
  number = {8431},
  series = {LNCS State-of-the-Art Surveys},
  pages = {1-34},
  url = {http://www.springerlink.com/}
}
2014 Trust-Aware Decision-Making Methodology for Cloud Sourcing Moyano, F., Beckers, K. & Fernandez-Gago, C. In the proceedings of the 26th International Conference on Advanced Information Systems Engineering (CAiSE)   Springer  
BibTeX:
@conference{MBG2014},
  year = {2014},
  title = {Trust-Aware Decision-Making Methodology for Cloud Sourcing},
  booktitle = {In the proceedings of the 26th International Conference on Advanced Information Systems Engineering (CAiSE)},
  author = {Francisco Moyano and Kristian Beckers and Carmen Fernandez-Gago},
  publisher = {Springer},
  series = {LNCS 8484},
  pages = {136 -- 149},
  url = {http://www.springerlink.com/}
}
2014 Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements Moyano, F., Fernandez-Gago, C., Beckers, K. & Heisel, M. Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)   Springer  
BibTeX:
@conference{MGBH2014},
  year = {2014},
  title = {Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements},
  booktitle = {Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)},
  author = {Francisco Moyano and Carmen Fernandez-Gago and Kristian Beckers and Maritta Heisel},
  publisher = {Springer},
  series = {LNCS 8448},
  pages = {166 -- 180},
  url = {http://www.springerlink.com/}
}
2014 Analysis of Social Engineering Threats with Attack Graphs Beckers, K., Krautsevich, L. & Yautsiukhin, A. Proceedings of the 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA) - Affiliated workshop with ESORICS   Springer  
BibTeX:
@inproceedings{QASA2014},
  year = {2014},
  title = {{Analysis of Social Engineering Threats with Attack Graphs}},
  booktitle = {{Proceedings of the 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA) - Affiliated workshop with ESORICS}},
  author = {Kristian Beckers and Leanid Krautsevich and Artsiom Yautsiukhin},
  publisher = {Springer},
  series = {LNCS},
  pages = {to appear},
  url = {http://www.springerlink.com/}
}
2014 A Catalog of Security Requirements Patterns for the Domain of Cloud Computing Systems Beckers, K., Côté, I. & Goeke, L. Proceedings 29th Symposium on Applied Computing   ACM  
BibTeX:
@conference{SAC2014},
  year = {2014},
  title = {{A Catalog of Security Requirements Patterns for the Domain of Cloud Computing Systems}},
  booktitle = {Proceedings 29th Symposium on Applied Computing},
  author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Ludger Goeke},
  publisher = {ACM},
  pages = {337-342},
  url = {http://dl.acm.org/}
}
2014 Systematic Derivation of Functional Safety Requirements for Automotive Systems Beckers, K., Côté, I., Frese, T., Hatebur, D. & Heisel, M. Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP)   Springer  
BibTeX:
@inproceedings{Safecomp2014},
  year = {2014},
  title = {{Systematic Derivation of Functional Safety Requirements for Automotive Systems}},
  booktitle = {{Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP)}},
  author = {Kristian Beckers and Isabelle C\^ot\'e and Thomas Frese and Denis Hatebur and Maritta Heisel},
  publisher = {Springer},
  series = {LNCS 8666},
  pages = {65--80},
  url = {http://www.springerlink.com/}
}
2014 A Problem-based Approach for Computer Aided Privacy Threat Identification Beckers, K., Faßbender, S., Heisel, M. & Meis, R. APF 2012   Springer  
BibTeX:
@inproceedings{threatID2012},
  year = {2014},
  title = {A Problem-based Approach for Computer Aided Privacy Threat Identification},
  booktitle = {APF 2012},
  author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Rene Meis},
  publisher = {Springer},
  volume = {8319},
  series = {LNCS},
  pages = {1--16},
  url = {http://www.springerlink.com/}
}
2014 Privacy-Aware Cloud Deployment Scenario Selection Beckers, K., Faßbender, S., Gritzalis, S., Heisel, M., Kalloniatis, C. & Meis, R. Trust, Privacy, and Security in Digital Business   Springer  
BibTeX:
@inproceedings{TrustBus2014},
  year = {2014},
  title = {Privacy-Aware Cloud Deployment Scenario Selection},
  booktitle = {Trust, Privacy, and Security in Digital Business},
  author = {Beckers, K. and Fa\ss{}bender, S. and Gritzalis, S. and Heisel, M. and Kalloniatis, C. and Meis, R.},
  publisher = {Springer},
  volume = {8647},
  series = {LNCS},
  pages = {94-105},
  url = {http://www.springerlink.com/}
}
2013 A Problem-based Threat Analysis in compliance with Common Criteria Beckers, K., Hatebur, D. & Heisel, M. Proceedings of the International Conference on Availability, Reliability and Security (ARES)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2013-ares1},
  year = {2013},
  title = { A Problem-based Threat Analysis in compliance with Common Criteria },
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES})},
  author = {Kristian Beckers and Denis Hatebur and Maritta Heisel},
  publisher = {IEEE Computer Society},
  pages = {111-120},
  url = {http://www.ieee.org/}
}
2013 Structured Pattern-Based Security Requirements Elicitation for Clouds Beckers, K., Côté, I., Goeke, L., Güler, S. & Heisel, M. Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 7th International Workshop on Secure Software Engineering (SecSE 2013)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2013-ares2},
  year = {2013},
  title = {Structured Pattern-Based Security Requirements Elicitation for Clouds },
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 7th International Workshop on Secure Software Engineering (SecSE 2013)},
  author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Ludger Goeke and Selim G\"{u}ler and Maritta Heisel},
  publisher = {IEEE Computer Society},
  pages = {465-474},
  url = {http://www.ieee.org/}
}
2013 A Usability Evaluation of the NESSoS Common Body of Knowledge Beckers, K. & Heisel, M. Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 2nd International Workshop on Security Ontologies and Taxonomies(SecOnT 2013)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2013-ares3},
  year = {2013},
  title = { A Usability Evaluation of the NESSoS Common Body of Knowledge},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 2nd International Workshop on Security Ontologies and Taxonomies(SecOnT 2013)},
  author = {Kristian Beckers and Maritta Heisel},
  publisher = {IEEE Computer Society},
  pages = {559-568},
  url = {http://www.ieee.org/}
}
2013 A mapping between ITIL and ISO 27001 processes for use by a high availability video conference service provider Beckers, K., Hofbauer, S., Quirchmayr, G. & Wills, C. C. Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013)   Springer  
BibTeX:
@inproceedings{Beckers2013-cdares1},
  year = {2013},
  title = {A mapping between ITIL and ISO 27001 processes for use by a high availability video conference service provider},
  booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013)},
  author = {Kristian Beckers and Stefan Hofbauer and Gerald Quirchmayr and Christopher C. Wills},
  publisher = {Springer},
  series = {LNCS 8127},
  pages = {224-239},
  url = {http://www.springerlink.com/}
}
2013 Combining Goal-oriented and Problem-oriented Requirements Engineering Methods Beckers, K., Faßbender, S., Heisel, M. & Paci, F. Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013)   Springer  
BibTeX:
@inproceedings{Beckers2013-cdares2},
  year = {2013},
  title = {Combining Goal-oriented and Problem-oriented Requirements Engineering Methods},
  booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013)},
  author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Federica Paci},
  publisher = {Springer},
  series = {LNCS 8127},
  pages = {178-194},
  url = {http://www.springerlink.com/}
}
2013 A Meta-Model Approach to the Fundamentals for a Pattern Language for Context Elicitation Beckers, K., Faßbender, S. & Heisel, M. Proceedings of the 18th European Conference on Pattern Languages of Programs (Europlop)   ACM  
BibTeX:
@inproceedings{Beckers2013-europlop},
  year = {2013},
  title = {A Meta-Model Approach to the Fundamentals for a Pattern Language for Context Elicitation},
  booktitle = {Proceedings of the 18th European Conference on Pattern Languages of Programs (Europlop)},
  author = {Beckers, Kristian and Fa{\ss}bender, Stephan and Heisel, Maritta},
  publisher = {ACM},
  pages = {-},
  note = {Accepted for Publication},
  url = {http://dl.acm.org/}
}
2013 A Structured and Model-Based Hazard Analysis and Risk Assessment Method for Automotive Systems Beckers, K., Frese, T., Hatebur, D. & Heisel, M. Proceedings of the 24th IEEE International Symposium on Software Reliability Engineering   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2013-issre},
  year = {2013},
  title = {{A Structured and Model-Based Hazard Analysis and Risk Assessment Method for Automotive Systems}},
  booktitle = {Proceedings of the 24th IEEE International Symposium on Software Reliability Engineering},
  author = {Kristian Beckers and Thomas Frese and Denis Hatebur and Maritta Heisel},
  publisher = {IEEE Computer Society},
  pages = {238-247},
  url = {http://www.ieee.org/}
}
2013 A pattern-based method for establishing a cloud-specific information security management system Beckers, K., Côté, I., Faßbender, S., Heisel, M. & Hofbauer, S. Requirements Engineering   Springer-Verlag  
BibTeX:
@article{Beckers2013rohtua},
  year = {2013},
  title = {A pattern-based method for establishing a cloud-specific information security management system},
  author = {Beckers, Kristian and C{\^o}t{\'e}, Isabelle and Fa{\ss}bender, Stephan and Heisel, Maritta and Hofbauer, Stefan},
  journal = {Requirements Engineering},
  publisher = {Springer-Verlag},
  pages = {1-53},
  url = {http://www.springerlink.com/}
}
2013 Common Criteria CompliAnt Software Development (CC-CASD) Beckers, K., Côté, I., Hatebur, D., Faßbender, S. & Heisel, M. Proceedings 28th Symposium on Applied Computing   ACM  
BibTeX:
@conference{SAC2013},
  year = {2013},
  title = {{C}ommon {C}riteria {C}ompli{A}nt {S}oftware {D}evelopment ({CC}-{CASD})},
  booktitle = {Proceedings 28th Symposium on Applied Computing},
  author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Denis Hatebur and Stephan Fa{\ss}bender and Maritta Heisel},
  publisher = {ACM},
  pages = {937-943},
  url = {http://dl.acm.org/}
}
2012 Ontology-Based Identification of Research Gaps and Immature Research Areas Beckers, K., Eicker, S., Faßbender, S., Heisel, M., Schmidt, H. & Schwittek, W. Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012)   Springer  
BibTeX:
@inproceedings{Beckers2012-ares1},
  year = {2012},
  title = {Ontology-Based Identification of Research Gaps and Immature Research Areas},
  booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012)},
  author = {Kristian Beckers and Stefan Eicker and Stephan Fa{\ss}bender and Maritta Heisel and Holger Schmidt and Widura Schwittek},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  pages = {1-16},
  url = {http://www.springerlink.com/}
}
2012 Comparing Privacy Requirements Engineering Approaches Beckers, K. Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 6th International Workshop on Secure Software Engineering (SecSE 2012)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2012-ares2},
  year = {2012},
  title = {Comparing Privacy Requirements Engineering Approaches},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 6th International Workshop on Secure Software Engineering (SecSE 2012)},
  author = {Kristian Beckers},
  publisher = {IEEE Computer Society},
  pages = {574-581},
  url = {http://www.ieee.org/}
}
2012 A Foundation for Requirements Analysis of Privacy Preserving Software Beckers, K. & Heisel, M. Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012)   Springer  
BibTeX:
@inproceedings{Beckers2012-ares3},
  year = {2012},
  title = {A Foundation for Requirements Analysis of Privacy Preserving Software},
  booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012)},
  author = {Kristian Beckers and Maritta Heisel},
  publisher = {Springer},
  volume = {7465},
  series = {Lecture Notes in Computer Science},
  pages = {93-107},
  url = {http://www.springerlink.com/}
}
2012 Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation Beckers, K., Heisel, M., Faßbender, S. & Schmidt, H. Proceedings of the International Conference on Availability, Reliability and Security (ARES)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2012-ares4},
  year = {2012},
  title = {Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES})},
  author = {Kristian Beckers and Maritta Heisel and Stephan Fa{\ss}bender and Holger Schmidt},
  publisher = {IEEE Computer Society},
  pages = {243-248},
  url = {http://www.ieee.org/}
}
2012 An integrated Method for Pattern-based Elicitation of Legal Requirements applied to a Cloud Computing Example Beckers, K., Faßbender, S. & Schmidt, H. Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2012-ares5},
  year = {2012},
  title = {An integrated Method for Pattern-based Elicitation of Legal Requirements applied to a Cloud Computing Example},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012)},
  author = {Kristian Beckers and Stephan Fa{\ss}bender and Holger Schmidt},
  publisher = {IEEE Computer Society},
  pages = {463-472},
  url = {http://www.ieee.org/}
}
2012 Peer-to-Peer driven Software Engineering considering Security, Reliability, and Performance Beckers, K. & Faßbender, S. Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2012-ares6},
  year = {2012},
  title = {Peer-to-Peer driven Software Engineering considering Security, Reliability, and Performance},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012)},
  author = {Kristian Beckers and Stephan Fa{\ss}bender},
  publisher = {IEEE Computer Society},
  pages = {485-494},
  url = {http://www.ieee.org/}
}
2012 A Common Body of Knowledge for Engineering Secure Software and Services Schwittek, W., Schmidt, H., Beckers, K., Eicker, S., Faßbender, S. & Heisel, M. Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 1st International Workshop on Security Ontologies and Taxonomies(SecOnT 2012)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2012-ares7},
  year = {2012},
  title = {A Common Body of Knowledge for Engineering Secure Software and Services},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 1st International Workshop on Security Ontologies and Taxonomies(SecOnT 2012)},
  author = {Widura Schwittek and Holger Schmidt and Kristian Beckers and Stefan Eicker and Stephan Fa{\ss}bender and Maritta Heisel},
  publisher = {IEEE Computer Society},
  pages = {499-506},
  url = {http://www.ieee.org/}
}
2012 A privacy preserving approach to Call Detail Records analysis in VoIP systems Hofbauer, S., Beckers, K. & Quirchmayr, G. Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 7th International Workshop on Frontiers in Availability, Reliabilityand Security (FARES 2012)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2012-ares8},
  year = {2012},
  title = {A privacy preserving approach to Call Detail Records analysis in VoIP systems},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 7th International Workshop on Frontiers in Availability, Reliabilityand Security (FARES 2012)},
  author = {Stefan Hofbauer AND Kristian Beckers AND Gerald Quirchmayr},
  publisher = {IEEE Computer Society},
  pages = {307-316},
  url = {http://www.ieee.org/}
}
2012 Supporting the Development and Documentation of Trustworthy ICT Systems according to Security Standard through Patterns and Security Requirements Engineering Approaches Beckers, K. Electronic Proc. of the 1st ESSoS Doctoral Symposium, ESSoS-DS 2012   CEUR-WS.org  
BibTeX:
@conference{BeckersESoSDS2012},
  year = {2012},
  title = {{S}upporting the {D}evelopment and {D}ocumentation of {T}rustworthy {ICT} {S}ystems according to {S}ecurity {S}tandard through {P}atterns and {S}ecurity {R}equirements {E}ngineering {A}pproaches},
  booktitle = {Electronic Proc. of the 1st ESSoS Doctoral Symposium, ESSoS-DS 2012},
  author = {Kristian Beckers},
  publisher = {CEUR-WS.org},
  volume = {834},
  pages = {65-70},
  url = {http://CEUR-WS.org}
}
2012 Supporting the Context Establishment according to ISO 27005 using Patterns Beckers, K. & Faßbender, S. Software Engineering 2012 - Workshopband   GI  
BibTeX:
@inproceedings{beckersF12zemoss},
  year = {2012},
  title = {Supporting the Context Establishment according to ISO 27005 using Patterns},
  booktitle = {Software Engineering 2012 - Workshopband},
  author = {Kristian Beckers and Stephan Fa{\ss}bender},
  publisher = {GI},
  pages = {141-146},
  note = {Workshop Zertifizierung und modellgetriebene Entwicklung sicherer Software, Software Engineering 2012 (ZeMoSS'12)},
  url = {http://www.gi.com/}
}
2012 Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches Beckers, K., Faßbender, S., Heisel, M., Küster, J.-C. & Schmidt, H. Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS)   Springer  
BibTeX:
@inproceedings{BeckersFHKS12},
  year = {2012},
  title = {Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches},
  booktitle = {Proceedings of the International Symposium on Engineering Secure Software and Systems ({ESSoS})},
  author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Jan-Christoph K{\"u}ster and Holger Schmidt},
  publisher = {Springer},
  series = {LNCS},
  pages = {14-21},
  url = {http://www.springerlink.com/}
}
2012 A Pattern-Based Method for Identifying and Analyzing Laws Beckers, K., Faßbender, S., Küster, J.-C. & Schmidt, H. Proceedings of the International Working Conference onRequirements Engineering: Foundation for Software Quality (REFSQ)   Springer  
BibTeX:
@inproceedings{BeckersFKS12},
  year = {2012},
  title = {A Pattern-Based Method for Identifying and Analyzing Laws},
  booktitle = {Proceedings of the International Working Conference onRequirements Engineering: Foundation for Software Quality ({REFSQ})},
  author = {Kristian Beckers and Stephan Fa{\ss}bender and Jan-Christoph K{\"u}ster and Holger Schmidt},
  publisher = {Springer},
  series = {LNCS},
  pages = {256-262},
  url = {http://www.springerlink.com/}
}
2012 Patterns- and Security-Requirements-Engineering-based Support for Development and Documentation of Security Standard Compliant ICT Systems Beckers, K. DOKTORANDENSYMPOSIUM DER SOFTWARE ENGINEERING 2012 PROCEEDINGS   Brandenburg University of Technology  
BibTeX:
@conference{BeckersSE2012},
  year = {2012},
  title = {{P}atterns- and {S}ecurity-{R}equirements-{E}ngineering-based {S}upport for {D}evelopment and {D}ocumentation of {S}ecurity {S}tandard {C}ompliant {ICT} {S}ystems},
  booktitle = {DOKTORANDENSYMPOSIUM DER SOFTWARE ENGINEERING 2012 PROCEEDINGS},
  author = {Kristian Beckers},
  publisher = {Brandenburg University of Technology},
  volume = {01/12},
  pages = {25-30},
  url = {http://www-docs.tu-cottbus.de/programmiersprachen-compilerbau/public/publikationen/2012/DS-SE-2012.pdf}
}
2012 Conducting a Privacy Impact Analysis for the Analysis of Communication Records Hofbauer, S., Beckers, K. & Quirchmayr, G. Proceedings of The International Conferences on Perspectives in Business Informatics Research (BIR 2012)   Springer  
BibTeX:
@inproceedings{hofbauer2012privacymethod},
  year = {2012},
  title = {Conducting a Privacy Impact Analysis for the Analysis of Communication Records},
  booktitle = {Proceedings of The International Conferences on Perspectives in Business Informatics Research (BIR 2012)},
  author = {Stefan Hofbauer AND Kristian Beckers AND Gerald Quirchmayr},
  publisher = {Springer},
  volume = {128},
  series = {Lecture Notes in Business Information Processing},
  pages = {148-161},
  url = {http://www.springerlink.com/}
}
2012 A Lightweight Privacy Preserving Approach for Analysing Communication Records to Prevent VoIP Attacks using Toll Fraud as an Example Hofbauer, S., Beckers, K., Quirchmayr, G. & Sorge, C. Proceedings of The Second International Symposium on Anonymity and Communication Systems (ACS-2012)   IEEE Computer Society  
BibTeX:
@inproceedings{hofbauer2012spit},
  year = {2012},
  title = {A Lightweight Privacy Preserving Approach for Analysing Communication Records to Prevent VoIP Attacks using Toll Fraud as an Example},
  booktitle = {Proceedings of The Second International Symposium on Anonymity and Communication Systems (ACS-2012)},
  author = {Stefan Hofbauer AND Kristian Beckers AND Gerald Quirchmayr AND Christoph Sorge},
  publisher = {IEEE Computer Society},
  pages = {992-997},
  url = {http://www.ieee.org/}
}
2012 Pattern-based Context Establishment for Service-Oriented Architectures Beckers, K., Faßbender, S., Heisel, M. & Meis, R. Software Service and Application Engineering   Springer  
BibTeX:
@inproceedings{sdps2012},
  year = {2012},
  title = {Pattern-based Context Establishment for Service-Oriented Architectures},
  booktitle = {Software Service and Application Engineering},
  author = {Beckers, Kristian and Fa\ss{}bender, Stephan and Heisel, Maritta and Meis, Rene},
  publisher = {Springer},
  series = {LNCS 7365},
  pages = {81-101},
  url = {http://www.springerlink.com/}
}
2011 Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing Beckers, K., Küster, J.-C., Faßbender, S. & Schmidt, H. Proceedings of the International Conference on Availability, Reliability and Security (ARES)   IEEE Computer Society  
BibTeX:
@inproceedings{Beckers2011},
  year = {2011},
  title = {Pattern-Based Support for Context Establishment and Asset Identification of the {ISO} 27000 in the Field of Cloud Computing},
  booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES})},
  author = {Kristian Beckers and Jan-Christoph K{\"u}ster and Stephan Fa{\ss}bender and Holger Schmidt},
  publisher = {IEEE Computer Society},
  pages = {327--333},
  url = {http://www.ieee.org/}
}
2010 Security and Compliance in Clouds Beckers, K. & Jürjens, J. ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference   Vieweg + Teubner  
BibTeX:
@inproceedings{Beckers2010},
  year = {2010},
  title = {Security and Compliance in Clouds},
  booktitle = {ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference},
  author = {Kristian Beckers and Jan J\"{u}rjens},
  publisher = {Vieweg + Teubner},
  pages = {91 - 101},
  url = {http://www.springer-vieweg.de}
}
2010 Process Intelligence in der Finanzwirtschaft Gsell, H., Weißenberg, N., Beckers, K. & Hirsch, M. ERP ManagementSoftware as a Service, Cloud Computing und Mobile Technologien   GITO Verlag  
BibTeX:
@inproceedings{Gsell2010},
  year = {2010},
  title = {Process Intelligence in der Finanzwirtschaft},
  booktitle = {Software as a Service, Cloud Computing und Mobile Technologien},
  author = {Heiko Gsell and Norbert Wei{\ss}enberg and Kristian Beckers and Martin Hirsch},
  journal = {ERP Management},
  publisher = {GITO Verlag},
  pages = {63 - 75},
  url = {www.gito.de}
}
2010 Process Compliance und Process Intelligence in der Finanzwirtschaft Hüning, N., Gsell, H., Weißenberg, N., Hirsch, M. & Beckers, K. ERP Management   GITO Verlag  
BibTeX:
@article{Huening2010},
  year = {2010},
  title = {Process Compliance und Process Intelligence in der Finanzwirtschaft},
  author = {Nadine H\"{u}ning and Heiko Gsell and Norbert Wei{\ss}enberg and Martin Hirsch and Kristian Beckers},
  journal = {ERP Management},
  publisher = {GITO Verlag},
  volume = {2},
  pages = {39 - 42},
  url = {www.gito.de}
}
2009 Single-message denial-of-service attacks against voice-over- internet protocol terminals Seedorf, J., Beckers, K. & Huici, F. International Journal of Electronic Security and Digital Forensics   Inderscience Publishers  
BibTeX:
@article{sip09DOS},
  year = {2009},
  title = {Single-message denial-of-service attacks against voice-over- internet protocol terminals},
  author = {Jan Seedorf and Kristian Beckers and Felipe Huici},
  journal = {International Journal of Electronic Security and Digital Forensics},
  publisher = {Inderscience Publishers},
  volume = {2},
  pages = {29-34},
  url = {http://dx.doi.org/10.1504/IJESDF.2009.023873},
  doi = {10.1504/IJESDF.2009.023873}
}
2008 Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks Seedorf, J., Beckers, K. & Huici, F. Communications in Computer and Information Science   Springer  
BibTeX:
@article{sip08Dos},
  year = {2008},
  title = {Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks},
  author = {Jan Seedorf and Kristian Beckers and Felipe Huici},
  journal = {Communications in Computer and Information Science},
  publisher = {Springer},
  volume = {12},
  series = {CCIS},
  pages = {61-64},
  url = {http://www.springerlink.com/}
}