Maritta Heisel

Prof. Dr. rer. nat. Maritta Heisel
Address Oststr. 99
Room BB 919
Phone +49 203 379 3465
Fax +49 203 379 4490
Email maritta.heisel[at]uni-duisburg-essen.de
Current Research
- Security
- Riskmanagement
- Requirements analysis
- Model-based software engineering
- Web-engineering
CV
since 2004 |
Professor for Software Engineering at the University Duisburg-Essen |
|
|
|
|
Projects
- Tool-based software risk analysis: research cooperation with Siemens
- RestAssured
- PDP4E
-
Pattern-Based Risk Identification for Model-Based Risk ManagementIn: Applicable Formal Methods for Safe Industrial Products 2023, pp. 114 - 129ISBN: 978-3-031-40132-9; 978-3-031-40131-2 ISSN: 1611-3349; 0302-9743Online Full Text: dx.doi.org/
-
PriPoCoG : Guiding Policy Authors to Define GDPR-Compliant Privacy PoliciesIn: Trust, Privacy and Security in Digital Business: Proceedings / Katsikas, Sokratis; Furnell, Steven; 19th International Conference (TrustBus 2022): Vienna, Austria; August 24, 2022 2022, pp. 1 - 16ISBN: 9783031179259; 9783031179266; 9783031179273Online Full Text: dx.doi.org/
-
ENAGRAM: An App to Evaluate Preventative Nudges for InstagramIn: Proceedings of the 2nd European Symposium on Usable Security, EuroUSEC 2022 / EuroUSEC '22: 2nd European Symposium on Usable Security; 29 - 30 September 2022; Karlsruhe, Germany 2022, pp. 53 - 63ISBN: 9781450397001Online Full Text: dx.doi.org/ (Open Access)
-
Meeting Strangers Online : Feature Models for Trustworthiness AssessmentIn: Human-Centered Software Engineering: Proceedings / 9th IFIP WG 13.2 International Working Conference, HCSE 2022, Eindhoven, The Netherlands, August 24–26, 2022, / Bernhaupt, Regina; Ardito, Carmelo; Sauer, Stefan (Eds.) 2022, pp. 3 - 22ISBN: 9783031147845; 9783031147852; 9783031147869Online Full Text: dx.doi.org/
-
The Relevance of Privacy Concerns, Trust, and Risk for Hybrid Social MediaIn: Evaluation of Novel Approaches to Software Engineering: 16th International Conference, ENASE 2021, Virtual Event, April 26-27, 2021 ; Revised Selected Papers / 16th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE) ; April 26-27, 2021, Virtual Event / Ali, Raian; Kaindl, Hermann; Maciaszek, Leszek A. (Eds.) 2022, pp. 88 - 111ISBN: 978-3-030-96647-8; 978-3-030-96648-5Online Full Text: dx.doi.org/
-
Community detection for access-control decisions : Analysing the role of homophily and information diffusion in Online Social NetworksIn: Online Social Networks and Media Vol. 29 (2022)ISSN: 2468-6964Online Full Text: dx.doi.org/ (Open Access)
-
The Role of Trustworthiness Facets for Developing Social Media Applications : A Structured Literature ReviewIn: Information Vol. 13 (2022) Nr. 1,ISSN: 2078-2489Online Full Text: dx.doi.org/ Online Full Text (Open Access)
-
P2P Frames : Pattern-based Characterization of Functional Requirements for Peer-to-peer SystemsIn: ENASE 2021: Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering : online streaming, April 26-27, 2021 / 16th International Conference on Evaluation of Novel Approaches to Software Engineering; 26-27 April 2021; Virtual / Ali, Raian; Kaindl, Hermann; Maciaszek, Leszek (Eds.) 2021, pp. 239 - 250ISBN: 978-989-758-508-1
-
Conflict identification and resolution for trust-related requirements elicitation a goal modeling approachIn: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications Vol. 12 (2021) Nr. 1, pp. 111 - 131ISSN: 2093-5382; 2093-5374Online Full Text: dx.doi.org/ (Open Access)
-
Risk Identification Based on Architectural PatternsIn: Quality of Information and Communications Technology: Proceedings / 14th International Conference, QUATIC 2021, Algarve, Portugal, September 8–11, 2021 / Paiva, Ana C. R.; Cavalli, Ana Rosa; Ventura Martins, Paula; Pérez-Castillo, Ricardo (Eds.) 2021, pp. 341 - 355ISBN: 978-3-030-85346-4; 978-3-030-85347-1Online Full Text: dx.doi.org/
-
Technical Report on the Extension of the Layered Privacy LanguageDuisburg, Essen (2021) 7 SeitenOnline Full Text: dx.doi.org/ Online Full Text (Open Access)
-
Model-Based Threat Modeling for Cyber-Physical Systems : A Computer-Aided ApproachIn: Software Technologies: Revised Selected Papers / 15th International Conference, ICSOFT 2020, Online Event, July 7–9, 2020 / van Sinderen, Marten; Maciaszek, Leszek A.; Fill, Hans-Georg (Eds.) 2021, pp. 158 - 183ISBN: 978-3-030-83006-9; 978-3-030-83007-6 ISSN: 1865-0937; 1865-0929Online Full Text: dx.doi.org/
-
Risk Treatment : An Iterative Method for Identifying ControlsIn: Evaluation of Novel Approaches to Software Engineering: Revised Selected Papers / 15th International Conference, ENASE 2020, Prague, Czech Republic, May 5–6, 2020 / Ali, Raian; Kaindl, Hermann; Maciaszek, Leszek A. (Eds.) 2021, pp. 283 - 310ISBN: 978-3-030-70005-8; 978-3-030-70006-5Online Full Text: dx.doi.org/
-
Balancing trust and privacy in computer-mediated introduction : Featuring risk as a determinant for trustworthiness requirements elicitationIn: ARES 2020: 15th International Conference on Availability, Reliability and Security / International Conference on Availability, Reliability and Security (ARES) ; 3rd Interdisciplinary Privacy and Trust Workshop (iPAT) ; August 25 – August 28, 2020, All-digital Conference / Volkamer, Melanie; Wressnegger, Christian (Eds.) 2020ISBN: 978-1-4503-8833-7Online Full Text: dx.doi.org/
-
A Conceptual Method for Eliciting Trust-related Software Features for Computer-mediated IntroductionIn: Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering: Volume 1: ENASE 2020, pp. 269 - 280ISBN: 978-989-758-421-3Online Full Text: dx.doi.org/ (Open Access)
-
Threat modeling for cyber-Physical systems : A two-dimensional taxonomy approach for structuring attack actionsIn: Proceedings of the 15th International Conference on Software Technologies / ICSOFT 2020; Virtual, Online; France; 7 - 9 July 2020 2020, pp. 160 - 171ISBN: 9789897584435
-
Correction: Nicolás E. Díaz Ferreyra, et al.: Preventative nudges: Introducing risk cues for supporting online self-disclosure decisionsIn: Information Vol. 11 (2020) Nr. 12, pp. 555ISSN: 2078-2489Online Full Text: dx.doi.org/ (Open Access)
-
Systematic risk assessment of cloud computing systems using a combined model-based approachIn: Proceedings of the 22nd International Conference on Enterprise Information Systems / ICEIS 2020; Virtual, Online; 5 - 7 May 2020 / Filipe, J.; Smialek, M.; Brodsky, A.; Hammoudi, S. (Eds.) Vol. 2 2020, pp. 53 - 66ISBN: 9789897584237
-
Preventative nudges : Introducing risk cues for supporting online self-disclosure decisionsIn: Information Vol. 11 (2020) Nr. 8, pp. 399ISSN: 2078-2489Online Full Text: dx.doi.org/ Online Full Text (Open Access)
-
Distributed frames : Pattern-based characterization of functional requirements for distributed systemsIn: Software Technologies / 14th International Conference, ICSOFT 2019, Prague, Czech Republic, July 26–28, 2019 / van Sinderen, Marten; Maciaszek, Leszek A. (Eds.) 2020, pp. 81 - 107ISBN: 978-3-030-52990-1; 978-3-030-52991-8Online Full Text: dx.doi.org/
-
Building Trustworthiness in Computer-Mediated Introduction : A Facet-Oriented FrameworkIn: 11th International Conference on Social Media and Society: Diverse Voices - Promises and Perils of Social Media for Diversity / SMSociety 2020; Virtual, Online; Canada; 22 - 24 July 2020 2020, pp. 39 - 46ISBN: 9781450376884Online Full Text: dx.doi.org/
-
Assisted generation of privacy policies using textual patternsIn: Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering / ENASE 2020; Virtual, Online; 5 - 6 May 2020 2020, pp. 347 - 358ISBN: 9789897584213
-
PDP-ReqLite : A Lightweight Approach for the Elicitation of Privacy and Data Protection RequirementsIn: Data privacy management, cryptocurrencies and blockchain technology: ESORICS 2020 International Workshops, DPM 2020 and CBT 2020 ; Guildford, UK, September 17–18, 2020 ; Revised Selected Papers / 15th International Workshop on Data Privacy Management ; DPM 2020 ; September 17–18, 2020, Guildford, UK / Garcia-Alfaro, Joaquin; Navarro-Arnibas, Guillermo; Herrera-Joancomarti, Jordi (Eds.) 2020, pp. 161 - 177ISBN: 978-3-030-66171-7; 978-3-030-66172-4Online Full Text: dx.doi.org/ Online Full Text (Open Access)
-
Persuasion meets AI : Ethical considerations for the design of social engineering countermeasuresIn: Proceedings of the 12th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management: Vol. 3 / 12th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management ; KMIS 2020 ; 2 - 4 November 2020, online 2020, pp. 204 - 211ISBN: 978-989-758-474-9
-
Risk identification : From requirements to threat modelsIn: Proceedings of the 6th International Conference on Information Systems Security and Privacy: February 25-27, 2020, in Valletta, Malta, Volume 1 / 6th International Conference on Information Systems Security and Privacy, 25.-27.02.2020, Valletta, Malta / Furnell, Steven; Mori, Paolo; Weippl, Edgar; Camp, Olivier (Eds.) 2020, pp. 385 - 396ISBN: 978-989-758-399-5Online Full Text: dx.doi.org/
-
Systematic Asset Identification and Modeling During Requirements EngineeringIn: Risks and Security of Internet and Systems: Proceedings / 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019 / Kallel, Slim; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Kacem, Ahmed Hadj (Eds.) 2020, pp. 50 - 66ISBN: 978-3-030-41567-9; 978-3-030-41568-6Online Full Text: dx.doi.org/
-
Systematic treatment of security risks during requirements engineeringIn: Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering / ENASE 2020; Virtual, Online; 5 - 6 May 2020 2020, pp. 132 - 143ISBN: 9789897584213
-
Model-Based Risk Analysis and Evaluation Using CORAS and CVSSIn: Evaluation of Novel Approaches to Software Engineering: 14th International Conference, ENASE 2019, Heraklion, Crete, Greece, May 4–5, 2019 ; Revised Selected Papers / International Conference on Evaluation of Novel Approaches to Software Engineering ; ENASE 2019 ; Heraklion, May 4–5, 2019 / Damiani, Ernesto; Spanoudakis, George (Eds.) 2020, pp. 108 - 134ISBN: 978-3-030-40222-8; 978-3-030-40223-5Online Full Text: dx.doi.org/
-
A Survey on Privacy Policy Languages : Expressiveness Concerning Data Protection RegulationsIn: 12th CMI Conference on Cybersecurity and Privacy / CMI 2019, Aalborg University Copenhagen, Copenhagen, Denmark, 28-29 November 2019 2019, pp. 8962144ISBN: 978-1-7281-2856-6; 978-1-7281-2857-3Online Full Text: dx.doi.org/
-
Integration of Development Interface Agreement, Supplier Safety Assessment and Safety Management for Driver Assistance SystemsIn: Mobilität in Zeiten der Veränderung: Technische und betriebswirtschaftliche Aspekte / Proff, Heike; Mobility in Times of Change – Past – Present - Future ; Wisseschaftsforum Mobilität ; 07.06.2018, Duisburg 2019, pp. 241 - 251ISBN: 978-3-658-26107-8; 978-3-658-26106-1Online Full Text: dx.doi.org/
-
A generic conceptual data model of social media servicesIn: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019 2019, pp. a22ISBN: 978-1-4503-6206-1Online Full Text: dx.doi.org/
-
CVSS-based Estimation and Prioritization for Security RisksIn: Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering: Volume 1: ENASE / 14th International Conference on Evaluation of Novel Approaches to Software Engineering; May 4-5, 2019; Heraklion, Crete, Greece 2019, pp. 297 - 306ISBN: 978-989-758-375-9Online Full Text: dx.doi.org/ (Open Access)
-
Combining safety and security in autonomous cars using blockchain technologiesIn: Computer Safety, Reliability, and Security: Proceedings / SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, 10.09.2019, Turku, Finland / Romanovsky, Alexander; Troubitsyna, Elena; Gashi, Ilir; Schoitsch, Erwin; Bitsch, Friedemann (Eds.) 2019, pp. 223 - 234ISBN: 978-3-030-26250-1; 978-3-030-26249-5Online Full Text: dx.doi.org/
-
RE4DIST: Model-based elicitation of functional requirements for distributed systemsIn: Proceedings of the 14th International Conference on Software Technologies / ICSOFT 2019, Prague, Czech Republic, 26 - 28 July 2019 / van Sinderen, Marten; Maciaszek, Leszek (Eds.) 2019, pp. 71 - 81ISBN: 978-989-758-379-7Online Full Text: dx.doi.org/
-
A Systematic Method to Describe and Identify Security Threats Based on Functional RequirementsIn: Risks and Security of Internet and Systems: Revised Selected Papers / 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018 / Zemmari, Akka; Mosbah, Mohamed; Cuppens-Boulahia, Nora; Cuppens, Frédéric (Eds.) 2019, pp. 205 - 221ISBN: 978-3-030-12142-6; 978-3-030-12143-3Online Full Text: dx.doi.org/
-
Architecture to manage and protect personal data utilising blockchainIn: Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering: Volume 1: ENASE / 14th International Conference on Evaluation of Novel Approaches to Software Engineering; May 4-5, 2019; Heraklion, Crete, Greece 2019, pp. 340 - 349ISBN: 978-989-758-375-9Online Full Text: dx.doi.org/ (Open Access)
-
Privacy Policy Specification Framework for Addressing End-Users’ Privacy RequirementsIn: Trust, Privacy and Security in Digital Business: Proceedings / 16th International Conference on Trust and Privacy in Digital Business (TrustBus); August 26–29, 2019; Linz, Austria / Gritzalis, Stefanos (Eds.) 2019, pp. 46 - 62ISBN: 978-3-030-27812-0Online Full Text: dx.doi.org/
-
Pattern-based modeling of cyber-physical systems for analyzing securityIn: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019 2019, pp. a23ISBN: 978-1-4503-6206-1Online Full Text: dx.doi.org/
-
Supporting the systematic goal refinement in KAOS using the six-variable modelIn: Proceedings of the 13th International Conference on Software Technologies / ICSOFT 2018, Porto, Portugal, July 26-28, 2018 / Maciaszek, Leszek (Eds.) 2019, pp. 102 - 111ISBN: 978-989-758-320-9Online Full Text: dx.doi.org/
-
Pattern-based incorporation of privacy preferences into privacy policies : Negotiating the conflicting needs of service providers and end-usersIn: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019 2019, pp. a5ISBN: 978-1-4503-6206-1Online Full Text: dx.doi.org/
-
Managing security risks : Template-based specification of controlsIn: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019 2019, pp. a10ISBN: 978-1-4503-6206-1Online Full Text: dx.doi.org/
-
Risk-Based Elicitation of Security Requirements According to the ISO 27005 StandardIn: Evaluation of Novel Approaches to Software Engineering: Revised Selected Papers / 13th International Conference, ENASE 2018, Funchal, Madeira, Portugal, March 23–24, 2018 / Damiani, Ernesto; Spanoudakis, George; Maciaszek, Leszek A. (Eds.) 2019, pp. 71 - 97ISBN: 978-3-030-22558-2; 978-3-030-22559-9Online Full Text: dx.doi.org/
-
Learning from online regrets : From deleted posts to risk awareness in social network sitesIn: ACM UMAP 2019 Adjunct - Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization / UMAP 2019; Larnaca; Cyprus; 9 - 12 June 2019 2019, pp. 117 - 125ISBN: 978-1-4503-6711-0Online Full Text: dx.doi.org/ (Open Access)
-
Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem DiagramsIn: Software Technologies: Revised Selected Papers / 13th International Conference, ICSOFT 2018, Porto, Portugal, July 26-28, 2018 / van Sinderen, Marten; Maciaszek, Leszek A. (Eds.) 2019, pp. 150 - 172ISBN: 978-3-030-29156-3; 978-3-030-29157-0 ISSN: 1865-0929; 1865-0937Online Full Text: dx.doi.org/
-
Developing secure software using UML patternsIn: Computer systems and software engineering: concepts, methodologies, tools, and applications 2018, pp. 741 - 781ISBN: 9781522539247; 9781522539230Online Full Text: dx.doi.org/
-
Developing secure software using UML patternsIn: Intelligent Systems: Concepts, Methodologies, Tools, and Applications 2018, pp. 551 - 592ISBN: 9781522556442; 1522556435; 9781522556435Online Full Text: dx.doi.org/
-
Access-Control Prediction in Social Network Sites : Examining the Role of HomophilyIn: Social Informatics: Proceedings, Part II / 10th International Conference, SocInfo 2018, St. Petersburg, Russia, September 25-28, 2018 / Staab, Steffen; Koltsova, Olessia; Ignatov, Dmitry I. (Eds.) 2018, pp. 61 - 74ISBN: 978-3-030-01159-8; 978-3-030-01158-1 ISSN: 1611-3349Online Full Text: dx.doi.org/
-
Functional Safety Processes and Advanced Driver Assistance Systems : Evolution or Revolution?In: Mobilität und Digitale Transformation: Technische und Betriebswirtschaftliche Aspekte / Proff, Heike; Fojcik, Thomas Martin (Eds.) 2018, pp. 199 - 216ISBN: 978-3-658-20778-6; 978-3-658-20779-3Online Full Text: dx.doi.org/
-
Problem-based Derivation of Trustworthiness Requirements from Users' Trust ConcernsIn: 2018 16th Annual Conference on Privacy, Security and Trust (PST) / Annual Conference on Privacy, Security and Trust, August 28-30, 2018, Belfast, Northern Ireland, United Kingdom / McLaughlin, Kieran (Eds.) 2018ISBN: 978-1-5386-7493-2; 978-1-5386-7494-9Online Full Text: dx.doi.org/
-
Secure Data Processing in the CloudIn: Advances in Service-Oriented and Cloud Computing / Workshops of ESOCC 2017, Oslo, Norway, September 27-29, 2017 / Mann, Zoltán Ádám; Stolz, Volker (Eds.) 2018, pp. 149 - 153ISBN: 978-3-319-79090-9; 9783319790893Online Full Text: dx.doi.org/ Online Full Text (Open Access)
-
Towards an end-to-end architecture for run-time data protection in the cloudIn: Proceedings - 44th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2018 / 44th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2018, Prague, Czech Republic, 29 August 2018 through 31 August 2018 2018, pp. 514 - 518ISBN: 9781538673829Online Full Text: dx.doi.org/
-
Trustworthiness Cases – Toward Preparation for the Trustworthiness CertificationIn: Trust, Privacy and Security in Digital Business: Proceedings / 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018 / Furnell, Steven; Mouratidis, Haralambos; Pernul, Günther (Eds.) 2018, pp. 244 - 259ISBN: 9783319983844; 978-3-319-98385-1 ISSN: 1611-3349; 0302-9743Online Full Text: dx.doi.org/
-
A structured method for security requirements elicitation concerning the cloud computing domainIn: Computer systems and software engineering: concepts, methodologies, tools, and applications 2018, pp. 782 - 805ISBN: 9781522539247; 9781522539230Online Full Text: dx.doi.org/
-
Problem-based elicitation of security requirements the ProCOR methodIn: ENASE 2018: Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering / International Conference on Evaluation of Novel Approaches to Software Engineering ; 23 - 24 March 2018, Funchal, Madeira, Portugal / Damiani, Ernesto; Spanoudakis, George; Maciaszek, Leszek (Eds.) 2018, pp. 26 - 38ISBN: 978-989-758-300-1Online Full Text: dx.doi.org/
-
The gender gap in wikipedia talk pagesIn: Proceedings of the 12th International AAAI Conference on Web and Social Media / ICWSM 2018; Palo Alto; United States; 25 -28 June 2018 2018, pp. 572 - 575ISBN: 9781577357988
-
Context analysis of cloud computing systems using a pattern-based approachIn: Future Internet Vol. 10 (2018) Nr. 8, pp. 72ISSN: 1999-5903Online Full Text: dx.doi.org/ (Open Access)
-
A structured and systematic model-based development method for automotive systems, considering the OEM/supplier interfaceIn: Reliability Engineering & System Safety Vol. 158 (2017) pp. 172 - 184ISSN: 0951-8320; 1879-0836Online Full Text: dx.doi.org/
-
A framework for systematic refinement of trustworthiness requirementsIn: Information Vol. 8 (2017) Nr. 2, pp. 46ISSN: 2078-2489Online Full Text: dx.doi.org/ (Open Access)
-
Computer-aided identification and validation of intervenability requirementsIn: Information Vol. 8 (2017) Nr. 1, pp. 30ISSN: 2078-2489Online Full Text: dx.doi.org/ (Open Access)
-
Deriving Safety Requirements according to ISO 26262 for complex systems : A method applied in the automotive industryIn: Innovative Produkte und Dienstleistungen in der Mobilität: Technische und betriebswirtschaftliche Aspekte / Individual, Integrated and Connected Products and Services in Mobility ; Wissenschaftsforum Mobilität ; 23.06.2016, Duisburg / Proff, Heike; Fojcik, Thomas Martin (Eds.) 2017, pp. 211 - 221ISBN: 978-3-658-18612-8; 978-3-658-18613-5Online Full Text: dx.doi.org/
-
Risiko in der Wolke? : Die Sicherheitsanalyse von Cloud-AnwendungenIn: Unikate: Berichte aus Forschung und Lehre (2017) Nr. 50: Natur-, Ingenieur- und Wirtschaftswissenschaften - High-Performance und Cloud Computing, pp. 16 - 27ISBN: 978-3-934359-50-5 ISSN: 0944-6060; 1869-3881Online Full Text: dx.doi.org/ Online Full Text (Open Access)
-
Online self-disclosure : From users’ regrets to instructional awarenessIn: Machine Learning and Knowledge Extraction: Proceedings / First IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference, CD-MAKE 2017, Reggio, Italy, August 29 – September 1, 2017 / Holzinger, Andreas; Kieseberg, Peter; Tjoa, A Min; Weippl, Edgar R. (Eds.) 2017, pp. 83 - 102ISBN: 9783319668079; 978-3-319-66808-6 ISSN: 1611-3349; 0302-9743Online Full Text: dx.doi.org/
-
Should user-generated content be a matter of privacy awareness? : A position paperIn: IC3K 2017 - Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management / IC3K 2017; Funchal, Madeira; Portugal; 1 -3 November 2017 Vol. 3 2017, pp. 212 - 216ISBN: 9789897582738
-
Performing a more realistic and complete safety analysis by means of the six-variable modelIn: Automotive - safety & security 2017: Sicherheit und Zuverlässigkeit für automobile Informationstechnik / 7. Tagung Automotive - Safety & Security 2017 - Sicherheit und Zuverlässigkeit für automobile Informationstechnik, 30.-31.5.2017, Stuttgart, Germany / Dencker, Peter; Klenk, Herbert; Keller, Hubert (Eds.) 2017, pp. 135 - 148ISBN: 978-3-88579-663-3 ISSN: 1617-5468
-
Aspect frames : Describing cross-cutting concerns in aspect-oriented requirements engineeringIn: Proceedings of the 22nd European Conference on Pattern Languages of Programs / EuroPLoP, Irsee, Germany, July 12 - 16, 2017 2017, pp. 25ISBN: 978-1-4503-4848-5Online Full Text: dx.doi.org/
-
Addressing self-disclosure in social media: An instructional awareness approachIn: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications / 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 29 November-2 December 2016 2017, pp. 7945815ISBN: 9781509043200 ISSN: 2161-5330; 2161-5322Online Full Text: dx.doi.org/
-
Facilitating reuse of control software through context modelling based on the six-variable modelIn: Software Technologies: Revised selected papers / 11th International Joint Conference, ICSOFT 2016, Lisbon, Portugal, July 24-26, 2016 / Cabello, Enrique; Cardoso, Jorge; Ludwig, André; Maciaszek, Leszek A.; Sinderen, Marten van (Eds.) 2017, pp. 332 - 358ISBN: 9783319625683 ISSN: 1865-0937Online Full Text: dx.doi.org/
-
Pattern-based representation of privacy enhancing technologies as early aspectsIn: Trust, privacy and security in digital business: Proceedings / 14th International Conference, TrustBus 2017 : Lyon, France, August 30-31, 2017 / Lopez, Javier; Fischer-Hübner, Simone; Lambrinoudakis, Costas (Eds.) 2017, pp. 49 - 65ISBN: 9783319644820 ISSN: 1611-3349; 0302-9743Online Full Text: dx.doi.org/
-
Towards systematic privacy and operability (PRIOP) studiesIn: ICT Systems Security and Privacy Protection: Proceedings / 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017 / De Capitani di Vimercati, Sabrina; Martinelli, Fabio (Eds.) 2017, pp. 427 - 441ISBN: 9783319584683; 978-3-319-58469-0 ISSN: 1868-422XOnline Full Text: dx.doi.org/
-
A framework for systematic analysis and modeling of trustworthiness requirements using i* and BPMNIn: Trust, Privacy and Security in Digital Business / 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016 / Katsikas, Sokratis (Eds.) 2016, pp. 3 - 18ISBN: 9783319443409; 978-3-319-44341-6Online Full Text: dx.doi.org/
-
Understanding the privacy goal intervenabilityIn: Trust, Privacy and Security in Digital Business / 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016 / Katsikas, Sokratis (Eds.) 2016, pp. 79 - 94ISBN: 9783319443409; 978-3-319-44341-6Online Full Text: dx.doi.org/
-
Patterns for identification of trust concerns and specification of trustworthiness requirementsIn: Proceedings of the 21st European Conference on Pattern Languages of Programs / EuroPlop '16, Kaufbeuren, Germany, July 06 - 10, 2016 2016, pp. 31ISBN: 978-1-4503-4074-8Online Full Text: dx.doi.org/
-
Computer-Aided Identification and Validation of Privacy RequirementsIn: Information Vol. 7 (2016) Nr. 2, pp. 28ISSN: 2078-2489Online Full Text: dx.doi.org/ (Open Access)
-
Enhancing business process models with trustworthiness requirementsIn: Trust Management X: Proceedings / 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 / Habib, Sheikh Mahbub; Vassileva, Julita; Mauw, Sjouke; Mühlhäuser, Max (Eds.) 2016, pp. 33 - 51ISBN: 9783319413532 ISSN: 1868-422XOnline Full Text: dx.doi.org/
-
Supporting privacy impact assessments using problem-based privacy analysisIn: Software Technologies: Revised Selected Papers / 10th International Joint Conference, ICSOFT 2015, Colmar, France, July 20-22, 2015 / Lorenz, Pascal; van Sinderen, Marten (Eds.) 2016, pp. 79 - 98ISBN: 978-3-319-30141-9Online Full Text: dx.doi.org/
-
Variability for Qualities in Software ArchitectureIn: ACM SIGSOFT software engineering notes Vol. 41 (2016) Nr. 1, pp. 32 - 35ISSN: 0163-5948Online Full Text: dx.doi.org/
-
A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier InterfaceIn: Computer Safety, Reliability, and Security: Proceedings / 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015 / Koornneef, Flor; van Gulijk, Coen (Eds.) 2015, pp. 90 - 108ISBN: 978-3-319-24254-5; 978-3-319-24255-2Online Full Text: dx.doi.org/
-
Developing secure software using UML patternsIn: Standards and Standardization: Concepts, Methodologies, Tools, and Applications 2015, pp. 228 - 264ISBN: 9781466681125; 146668111X; 9781466681118Online Full Text: dx.doi.org/
-
A structured method for security requirements elicitation concerning the cloud computing domainIn: Standards and Standardization: Concepts, Methodologies, Tools, and Applications 2015, pp. 875 - 896ISBN: 9781466681125; 146668111X; 9781466681118Online Full Text: dx.doi.org/
-
1st Workshop on VAriability for QUalIties in SofTware Architecture (VAQUITA) : Workshop IntroductionIn: Proceedings of the 2015 European Conference on Software Architecture Workshops / 9th European Conference on Software Architecture (ECSA 2015), September 7 - 11, 2015, Dubrovnik 2015 Article No. 22ISBN: 978-1-4503-3393-1Online Full Text: dx.doi.org/
-
A taxonomy of requirements for the privacy goal transparencyIn: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) / 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015 / Fischer-Hübner, Simone (Eds.) Vol. 9264 2015, pp. 195 - 209ISBN: 978-3-319-22906-5 ISSN: 1611-3349; 0302-9743Online Full Text: dx.doi.org/
-
Challenges in Rendering and Maintaining Trustworthiness for Long-Living Software SystemsIn: Software Engineering Workshops 2015: Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2015 / Workshops der Tagung Software Engineering 2015 (SE-WS 2015), 17.-18. März 2015, Dresden, Deutschland 2015, pp. 103 - 105ISSN: 1613-0073Online Full Text (Open Access)
-
Applying performance patterns for requirements analysisIn: Proceedings of the 20th European Conference on Pattern Languages of Programs / EuroPLoP 2015 20th European Conference on Pattern Languages of Programs Kaufbeuren, Germany — July 08 - 12, 2015 / Link, Claudius; Veli-Pekka, Eloranta (Eds.) 2015 Article No. 35ISBN: 978-1-4503-3847-9Online Full Text: dx.doi.org/ Online Full Text
-
Towards systematic selection of architectural patterns with respect to quality requirementsIn: Proceedings of the 20th European Conference on Pattern Languages of Programs / EuroPLoP '15, 21st European Conference on Pattern Languages of Programs, 6. - 10. Juli 2015, Kloster Irsee 2015 Article No. 40ISBN: 978-1-4503-3847-9Online Full Text: dx.doi.org/
-
Developing secure software using UML patternsIn: Handbook of Research on Innovations in Systems and Software Engineering / Garcia Dâiaz, Vincente; Cueva Lovelle, Juan Manuel; Pelayo Garcâia-Bustelo, Begona Cristina (Eds.) 2015, pp. 32 - 70ISBN: 9781466663596; 9781466663602Online Full Text: dx.doi.org/
-
Problem-based security requirements elicitation and refinement with presSuREIn: Software Technologies: Revised Selected Papers / 9th International Joint Conference, ICSOFT 2014, Vienna, Austria, August 29-31, 2014 / Holzinger, Anfreas (Eds.) 2015, pp. 311 - 330ISBN: 978-3-319-25578-1; 978-3-319-25579-8Online Full Text: dx.doi.org/
-
Systematic identification of information flows from requirements to support privacy impact assessmentsIn: ICSOFT 2015: proceedings of the 10th International Joint Conference on Software Technologies / International Joint Conference on Software Technologies, Colmar, Alsace, France, 20-22 July, 2015 2015, pp. 43 - 52ISBN: 978-1-4673-8531-2; 978-989-758-139-7
-
A Problem-, Quality-, and Aspect-Oriented Requirements Engineering MethodIn: Software Technologies: Revised Selected Papers / 9th International Joint Conference, ICSOFT 2014, Vienna, Austria, August 29-31, 2014 / Holzinger, Andreas (Eds.) 2015, pp. 291 - 310ISBN: 978-3-319-25578-1; 978-3-319-25579-8Online Full Text: dx.doi.org/
-
Towards a reliable mapping between performance and security tactics, and architectural patternsIn: Proceedings of the 20th European Conference on Pattern Languages of Programs / EuroPLoP '15, 21st European Conference on Pattern Languages of Programs, 6. - 10. Juli 2015, Kloster Irsee 2015 Article No. 39ISBN: 978-1-4503-3847-9Online Full Text: dx.doi.org/ Online Full Text
-
A Structured Comparison of Security StandardsIn: Engineering Secure Future Internet Services and Systems / Heisel, Maritta; Joosen, Wouter; Lopez, Javier (Eds.) 2014, pp. 1 - 34ISBN: 978-3-319-07452-8; 978-3-319-07451-1Online Full Text: dx.doi.org/
-
Supporting Common Criteria Security Analysis with Problem FramesIn: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) Vol. 5 (2014) Nr. 1, pp. 37 - 63ISSN: 2093-5382; 2093-5374
-
A Structured Approach for Eliciting, Modeling, and Using Quality-Related Domain KnowledgeIn: Computational Science and Its Applications – ICCSA 2014: Proceedings, Part V / 14th International Conference, Guimarães, Portugal, June 30 – July 3, 2014 / Murgante, Beniamino; Sanjay, Misra; A. C. Rocha, Ana Maria (Eds.) 2014, pp. 370 - 386ISBN: 978-3-319-09156-3; 978-3-319-09155-6Online Full Text: dx.doi.org/
-
Optimizing Functional and Quality Requirements According to Stakeholders’ GoalsIn: Relating System Quality and Software Architecture / Mistrik, Ivan; Bahsoon, Rami; Eeles, Peter; Roshandel, Roshanak; Stal, Michael (Eds.) 2014, pp. 75 - 120ISBN: 978-0-12-417009-4Online Full Text: dx.doi.org/
-
Problem-oriented security patterns for requirements engineeringIn: Proceedings of the 19th European Conference on Pattern Languages of Programs / EuroPLoP 2014 19th European Conference on Pattern Languages of Programs Irsee, Germany — July 09 - 13, 2014 / Veli-Pekka, Eloranta; van Heesch, Uwe (Eds.) 2014 Article No. 9ISBN: 978-1-4503-3416-7Online Full Text: dx.doi.org/
-
Intertwining Relationship between Requirements, Architecture, and Domain KnowledgeIn: International Conference on Software Engineering Advances (ICSEA): Proceedings / The Ninth International Conference on Software Engineering Advances ICSEA 2014 October 12 - 16, 2014 - Nice, France 2014ISBN: 978-1-61208-367-4
-
Privacy-aware cloud deployment scenario selectionIn: Trust, Privacy, and Security in Digital Business / 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014 2014, pp. 94 - 105ISBN: 978-3-319-09769-5; 978-3-319-09770-1Online Full Text: dx.doi.org/
-
Systematic Derivation of Functional Safety Requirements for Automotive SystemsIn: Computer Safety, Reliability, and Security / 33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014 / Bondavalli, Andrea (Eds.) 2014, pp. 65 - 80ISBN: 978-3-319-10505-5; 978-3-319-10506-2Online Full Text: dx.doi.org/
-
A computer-aided process from problems to laws in requirements engineeringIn: Communications in computer and information Vol. 457 (2014) pp. 215 - 234ISSN: 1865-0929Online Full Text: dx.doi.org/
-
Problem-based requirements interaction analysisIn: Requirements Engineering: Foundation for Software Quality: Proceedings / 20th International Working Conference, REFSQ 2014, Essen, Germany, April 7-10, 2014 / Salinesi, Camille; Weerd, Inge (Eds.) 2014, pp. 200 - 215ISBN: 978-3-319-05842-9; 978-3-319-05843-6Online Full Text: dx.doi.org/
-
Towards developing secure software using problem-oriented security patternsIn: Availability, Reliability, and Security in Information Systems / IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference (CD-ARES) and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD), September 8-12, 2014, Fribourg, Switzerland, 2014, pp. 45 - 62ISBN: 978-3-319-10974-9Online Full Text: dx.doi.org/
-
Towards a Computer-Aided Problem-Oriented Variability Requirements Engineering MethodIn: Advanced Information Systems Engineering Workshops 2014, pp. 136 - 147ISBN: 978-3-319-07868-7
-
A Framework for Combining Problem Frames and Goal Models to Support Context Analysis during Requirements EngineeringIn: Availability, Reliability, and Security in Information Systems and HCI: Proceedings / IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013 / Cuzzocrea, Alfredo; Kittl, Christian; Simos, Dimitris (Eds.) 2013, pp. 272 - 288ISBN: 978-3-642-40510-5; 978-3-642-40511-2Online Full Text: dx.doi.org/
-
A pattern-based method for establishing a cloud-specific information security management system : Establishing information security management systems for clouds considering security, privacy, and legal complianceIn: Requirements Engineering Vol. 18 (2013) Nr. 4, pp. 343 - 395ISSN: 0947-3602; 1432-010XOnline Full Text: dx.doi.org/
-
A Structured and Model-Based Hazard Analysis and Risk Assessment Method for Automotive SystemsIn: 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE) / 24th International Symposium on Software Reliability Engineering (ISSRE) : 4 - 7 Nov. 2013, Pasadena, CA, USA 2013, pp. 238 - 247ISBN: 978-1-5090-4462-7; 978-1-4799-2366-3Online Full Text: dx.doi.org/
-
Common criteria compliant software development (CC-CASD)In: Proceedings of the 28th Annual ACM Symposium on Applied Computing / SAC '13 Coimbra, Portugal — March 18 - 22, 2013 / Shin, Sung Y.; Maldonado, José Carlos (Eds.) 2013, pp. 1298 - 1304ISBN: 978-1-4503-1656-9Online Full Text: dx.doi.org/
-
Doctoral Symposium of ESSoS 2013 : Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013)
Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013), 27 February - 01 March 2013, Rocquencort, Paris, France,Aachen (2013)
(CEUR Workshop Proceedings ; 965)ISSN: 1613-0073Online Volltext (Open Access) -
A usability evaluation of the nessos common body of knowledgeIn: Eighth International Conference on Availability, Reliability and Security (ARES), 2013: Proceedings / Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : 2 - 6 Sept. 2013, Regensburg, Germany 2013, pp. 559 - 568ISBN: 978-1-4799-1097-7; 978-0-7695-5008-4Online Full Text: dx.doi.org/
-
Combining goal-oriented and problem-oriented requirements engineering methodsIn: Availability, Reliability, and Security in Information Systems and HCI: Proceedings / IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013 / Cuzzocrea, Alfredo; Kittl, Christian; Simos, Dimitris E.; Xu, Lida (Eds.) 2013, pp. 178 - 194ISBN: 978-3-642-40511-2; 9783642405105 ISSN: 0302-9743Online Full Text: dx.doi.org/
-
ESSoS Doctoral Symposium 2013In: Doctoral Symposium of ESSoS 2013: Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013) / Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013), 27 February - 01 March 2013, Rocquencort, Paris, France / Heisel, Maritta; Marchetti, Eda (Eds.) (2013) pp. 2 - 3ISSN: 1613-0073Online Full Text (Open Access)
-
Erratum to: A pattern-based method for establishing a cloud-specific information security management systemIn: Requirements Engineering Vol. 18 (2013) Nr. 4, pp. 397ISSN: 0947-3602; 1432-010XOnline Full Text: dx.doi.org/
-
A problem-based threat analysis in compliance with common criteriaIn: Eighth International Conference on Availability, Reliability and Security (ARES), 2013: Proceedings / Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : 2 - 6 Sept. 2013, Regensburg, Germany 2013, pp. 111 - 120ISBN: 978-1-4799-1097-7; 978-0-7695-5008-4Online Full Text: dx.doi.org/
-
Structured pattern-based security requirements elicitation for cloudsIn: Eighth International Conference on Availability, Reliability and Security (ARES), 2013: Proceedings / Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : 2 - 6 Sept. 2013, Regensburg, Germany 2013, pp. 465 - 474ISBN: 9780769550084; 978-1-4799-1097-7Online Full Text: dx.doi.org/
-
From problems to laws in requirements engineering : Using model-transformationIn: Proceedings of the 8th International Joint Conference on Software Technologies / Cordeiro, José; 8th International Joint Conference on Software Technologies, Reykjavík, Iceland, 29 - 31 July, 2013 2013, pp. 447 - 458ISBN: 9789898565686
-
Enterprise Applications : From Requirements to DesignIn: Aligning enterprise, system, and software architectures / Mistrík, Ivan (Eds.) 2013, pp. 96 - 117ISBN: 978-1-466-62199-2Online Full Text: dx.doi.org/
-
An aspect-oriented approach to relating security requirements and access controlIn: CAiSE Forum 2012: Proceedings of the CAiSE'12 Forum at the 24th International Conference on Advanced Information Systems Engineering (CAiSE) / 24th International Conference on Advanced Information Systems Engineering (CAiSE), June 28, 2012, Gdańsk, Poland / Kirikova, Marite; Janis, Stirna (Eds.) 2012, pp. 15 - 22ISSN: 1613-0073Online Full Text (Open Access)
-
Pattern-Based Context Establishment for Service-Oriented ArchitecturesIn: Software Service and Application Engineering: Essays Dedicated to Bernd Krämer on the Occasion of His 65th Birthday / Heisel, Maritta (Eds.) 2012, pp. 81 - 101ISBN: 978-3-642-30834-5; 978-3-642-30835-2 ISSN: 1611-3349; 0302-9743Online Full Text: dx.doi.org/
-
A Foundation for Requirements Analysis of Privacy Preserving SoftwareIn: Multidisciplinary Research and Practice for Information Systems: Proceedings / Quirchmayr, Gerald; Basl, Josef; You, Ilsun; Xu, Lida; Weippl, Edgar; IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012 2012, pp. 93 - 107ISBN: 978-3-642-32498-7; 978-3-642-32497-0 ISSN: 1611-3349Online Full Text: dx.doi.org/
-
Patterns- and Security-Requirements-Engineering-based Support for Development and Documentation of Security Standard Compliant ICT SystemsIn: Doctoral Symposium of ESSoS 12 / First Doctoral Symposium of the International Symposium on Engineering Secure Software and Systems (ESSoS), 15 February 2012, Eindhoven, The Netherlands / Cuellar, Jorge; Koch, Nora (Eds.) 2012, pp. 65 - 70ISSN: 1613-0073Online Full Text (Open Access)
-
Designing architectures from problem descriptions by interactive model transformationIn: The 27th annual ACM Symposium on Applied Computing / ACM Symposium on Applied Computing, Riva del Garda, Trento, Italy, March 26 - 30, 2012 / Ossowski, Sascha; Lecca, Paola (Eds.) 2012, pp. 1256 - 1258ISBN: 978-1-4503-0857-1Online Full Text: dx.doi.org/
-
Supporting quality-driven design decisions by modeling variabilityIn: Proceedings of the 8th international ACM SIGSOFT conference on Quality of Software Architectures / QoSA '12, Bertinoro, Italy, June 25 - 28, 2012 / Grassi, Vincenzo (Eds.) 2012, pp. 43 - 48ISBN: 978-1-4503-1346-9Online Full Text: dx.doi.org/
-
Deriving Quality-based Architecture Alternatives with PatternsIn: Software Engineering 2012 / Fachtagung des GI-Fachbereichs Softwaretechnik ; 27. Februar - 2. März 2012 in Berlin / Jähnichen, Stefan (Eds.) 2012, pp. 71 - 82ISBN: 978-3-88579-292-5
-
Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approachesIn: EngineeEngineering Secure Software and Systemsring secure software and systems: 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings / 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 16-17 February 2012, Eindhoven, The Netherlands / Barthe, Gilles; Livshits, Benjamin; Scandariato, Riccardo (Eds.) 2012, pp. 14 - 21ISBN: 978-3-642-28166-2; 978-3-642-28165-5Online Full Text: dx.doi.org/
-
On the Evolution of Component-Based SoftwareIn: Advances in Software Engineering Techniques: Revised Selected Papers / Szmuc, Tomasz; Szpyrka, Marcin; Zendulka, Jaroslav; 4th IFIP TC 2 Central and East European Conference on Software Engineering Techniques, CEE-SET 2009, Krakow, Poland, October 12-14, 2009 2012, pp. 54 - 69ISBN: 978-3-642-28037-5; 978-3-642-28038-2 ISSN: 1611-3349Online Full Text: dx.doi.org/
-
Ontology-Based Identification of Research Gaps and Immature Research AreasIn: Multidisciplinary Research and Practice for Information Systems: Proceedings / IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012 / Quirchmayr, Gerald; Basl, Josef (Eds.) 2012, pp. 1 - 16ISBN: 978-3-642-32497-0; 978-3-642-32498-7Online Full Text: dx.doi.org/
-
Using security requirements engineering approaches to support ISO 27001 information security management systems development and documentationIn: Seventh International Conference on Availability, Reliability and Security (ARES), 2012: Proceedings / International Conference on Availability, Reliability, and Security, 20 - 24 Aug. 2012, Prague, Czech Republic 2012, pp. 242 - 248ISBN: 978-0-7695-4775-6; 978-1-4673-2244-7Online Full Text: dx.doi.org/
-
A Method to Derive Software Architectures from Quality RequirementsIn: Proceedings of the 18th Asia Pacific Software Engineering Conference (APSEC 2011) / APSEC 2011; Ho Chi Minh [City], Vietnam, 5 - 8 December 2011 / Tran, Dan Thu (Eds.) 2011, pp. 322 - 330ISBN: 978-1-4577-2199-1Online Full Text: dx.doi.org/
-
A UML profile and tool support for evolutionary requirements engineeringIn: 15th European Conference on Software Maintenance and Reengineering (CSMR), 2011: Proceedings / Mens, Tom; CSMR, 1 - 4 March 2011, Oldenburg, Germany 2011, pp. 161 - 170ISBN: 978-0-7695-4343-7; 978-1-61284-259-2 ISSN: 1534-5351Online Full Text: dx.doi.org/
-
UML4PF : A tool for problem-oriented requirements analysisIn: 19th IEEE International Requirements Engineering Conference (RE) / 19th IEEE International Requirements Engineering Conference (RE), 2011 : Aug. 29 2011 - Sept. 2 2011, Trento, Italy / Institute of Electrical and Electronics Engineers (Eds.) 2011, pp. 349 - 350ISBN: 978-1-4577-0924-1; 978-1-4577-0921-0; 978-1-4577-0923-4Online Full Text: dx.doi.org/
-
Systematic Architectural Design Based on Problem PatternsIn: Relating software requirements and architectures / Avgeriou, Paris; Grundy, John; Hall, Jon G (Eds.) 2011, pp. 133 - 159ISBN: 978-3-642-21000-6; 978-3-642-21001-3Online Full Text: dx.doi.org/
-
Systematic Development of UMLsec Design Models Based on Security RequirementsIn: Fundamental Approaches to Software Engineering: Proceedings / 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011 / Giannakopoulou, Dimitra (Eds.) 2011, pp. 232 - 246ISBN: 978-3-642-19810-6; 978-3-642-19811-3Online Full Text: dx.doi.org/
-
Towards Systematic Integration of Quality Requirements into Software ArchitectureIn: Software Architecture / 5th European Conference, ECSA 2011, Essen, Germany, September 13-16, 2011 / Crnkovic, Ivica; Gruhn, Volker; Book, Matthias (Eds.) 2011, pp. 17 - 25ISBN: 978-3-642-23797-3; 978-3-642-23798-0Online Full Text: dx.doi.org/
-
Towards a Common Body of Knowledge for Engineering Secure Software and ServicesIn: Proceedings of the International Conference on Knowledge Management and Information Sharing / International Conference on Knowledge Management and Information Sharing : Paris, France, 26 - 29 October, 2011 / Filipe, Joaquim (Eds.) 2011, pp. 369 - 374ISBN: 978-989-8425-81-2
-
A comparison of security requirements engineering methodsIn: Requirements Engineering Vol. 15 (2010) Nr. 1, pp. 7 - 40ISSN: 0947-3602; 1432-010XOnline Full Text: dx.doi.org/
-
A pattern-based method to develop secure softwareIn: Software engineering for secure systems: industrial and research perspectives / Mouratidis, Haralambos 2010, pp. 32 - 74ISBN: 9781615208371Online Full Text: dx.doi.org/
-
Making Pattern- and Model-Based Software Development More RigorousIn: Formal Methods and Software Engineering: 12th International Conference on Formal Engineering Methods / 12th International Conference on Formal Engineering Methods, ICFEM 2010, Shanghai, China, November 17-19, 2010 / Dong, Jin Song; Zhu, Huibiao (Eds.) 2010, pp. 253 - 269ISBN: 978-3-642-16900-7; 978-3-642-16901-4Online Full Text: dx.doi.org/
-
A UML Profile for Requirements Analysis of Dependable SoftwareIn: Computer Safety, Reliability, and Security: Proceedings / 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010 / Schoitsch, Erwin (Eds.) 2010, pp. 317 - 331ISBN: 978-3-642-15650-2; 978-3-642-15651-9Online Full Text: dx.doi.org/
-
Workshop Modellgetriebene Softwarearchitektur - Evolution, Integration und Migration (MSEIM 2009)In: Software Engineering 2009: Workshopband / Fachtagung des GI-Fachbereichs Softwaretechnik, 02. - 06.03.2009 in Kaiserslautern / Münch, Jürgen; Liggesmeyer, Peter (Eds.) 2009, pp. 363 - 366ISBN: 9783885792444
-
A Foundation for Requirements Analysis of Dependable SoftwareIn: Computer Safety, Reliability, and Security: Proceedings / 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009 2009, pp. 311 - 325ISBN: 978-3-642-04467-0; 978-3-642-04468-7Online Full Text: dx.doi.org/
-
Deriving software architectures from problem descriptionsIn: Software engineering 2009 - Workshopband: Fachtagung des GI-Fachbereichs Softwaretechnik, 02. - 06.03.2009 in Kaiserslautern / 5. Fachtagung des GI-Fachbereichs Softwaretechnik (SE 2009), 02.-06.03.2009, Kaiserslautern / Münch, Jürgen; Liggesmeyer, Peter (Eds.) 2009, pp. 383 - 302ISBN: 3-88579-244-3; 978-3-88579-244-4
-
Workshop Modellgetriebene Softwarearchitektur : Evolution, Integration und Migration (MSEIM 2008)In: Software Engineering 2008: Workshopband ; Fachtagung des GI-Fachbereichs Softwaretechnik ; 18. - 22.02.2008 in München / Software Engineering 2008 ; Fachtagung GI-Fachbereich Softwaretechnik ; 18. - 22.02.2008, München, Germany / Maalej, Walid; Bruegge, Bernd (Eds.) 2008, pp. 173 - 177ISBN: 978-3-88579-216-1; 3-88579-216-8
-
A Formal Metamodel for Problem FramesIn: Model Driven Engineering Languages and Systems: Proceedings / 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008 / Czarnecki, Krzysztof; Ober, Ileana; Bruel, Jean-Michel; Uhl, Axel; Völter, Markus (Eds.) 2008ISBN: 978-3-540-87874-2; 978-3-540-87875-9Online Full Text: dx.doi.org/
-
Workshop Modellgetriebene Softwarearchitektur - Evolution, Integration und MigrationIn: Software Engineering 2008: Fachtagung des GI-Fachbereichs Softwaretechnik ; 18. - 22.02.2008 in München / Software Engineering 2008 ; Fachtagung GI-Fachbereich Softwaretechnik ; 18. - 22.02.2008, München, Germany / Herrmann, Korbinian; Bruegge, Bernd (Eds.) 2008, pp. 285 - 287ISBN: 978-3-88579-215-4; 3-88579-215-X
-
Using UML Environment Models for Test Case GenerationIn: Software Engineering 2008: Workshopband ; Fachtagung des GI-Fachbereichs Softwaretechnik, 18. - 22.02.2008 in München / Software Engineering 2008 ; Fachtagung GI-Fachbereich Softwaretechnik ; 18. - 22.02.2008, München, Germany / Maalej, Walid; Bruegge, Bernd (Eds.) 2008, pp. 399 - 406ISBN: 978-3-88579-216-1; 3-88579-216-8
-
Analysis and Component-based Realization of Security RequirementsIn: Third International Conference on Availability, Reliability and Security / Third International Conference on Availability, Reliability and Security, 2008 : ARES 08 ; 4 - 7 March 2008, Barcelona, Spain / Jakoubi, Stefan (Eds.) 2008, pp. 195 - 203ISBN: 978-0-7695-3102-1Online Full Text: dx.doi.org/
-
A systematic account of problem framesIn: Proceedings of the 12th European Conference on Pattern Languages of Programs: (EuroPLoP'2007 / Schümmer, Till; Hvatum, Lise B. (Eds.) 2008, pp. 749 - 768ISBN: 978-3-87940-819-1
-
A Security Engineering Process based on PatternsIn: 18th International Conference on Database and Expert Systems Applications / DEXA 2007; 3-7 Sept. 2007; Regensburg, Germany 2007Online Full Text: dx.doi.org/
-
A Pattern System for Security Requirements EngineeringIn: The Second International Conference on Availability, Reliability and Security: Proceedings / The Second International Conference on Availability, Reliability and Security, 2007 : ARES 2007 ; 10 - 13 April 2007, Vienna, Austria / European Network and Information Security Agency; Technische Universität Wien (Eds.) 2007, pp. 356 - 365ISBN: 0769527752; 9780769527758Online Full Text: dx.doi.org/
-
Enhancing Dependability of Component-Based SystemsIn: Reliable Software Technologies - Ada Europe 2007: Proceedings / 12th Ada-Europe Intenational Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007 / Abdennahder, Nabil; Kordon, Fabrice (Eds.) 2007, pp. 41 - 54ISBN: 978-3-540-73230-3; 978-3-540-73229-7Online Full Text: dx.doi.org/
-
Pattern-based Evolution of Software ArchitecturesIn: Software Architecture: First European Conference, ECSA 2007 Madrid, Spain, September 24-26, 2007 Proceedings / First European Conference, ECSA 2007, Madrid, Spain, September 24-26, 2007 / Oquendo, Flavio (Eds.) 2007ISBN: 3540751319Online Full Text: dx.doi.org/ Online Full Text
-
Pattern-based Exploration of Design Alternatives for the Evolution of Software ArchitecturesIn: International Journal of Cooperative Information Systems Vol. 16 (2007) Nr. 3-4, pp. 341 - 365ISSN: 0218-8430Online Full Text: dx.doi.org/
-
A method for component-based software and system developmentIn: 32nd EUROMICRO Conference on Software Engineering and Advanced Applications: Proceedings / SEAA; Cavtat/Dubrovnik; Croatia; 29 August 2006 through 1 September 2006 2006, pp. 72 - 80ISBN: 0769525946; 9780769525945Online Full Text: dx.doi.org/ (Open Access)
-
Component composition through architectural patterns for problem framesIn: Proceedings of APSEC 2006, XIII Asia Pacific Software Engineering Conference / XIII Asia Pacific Software Engineering Conference; Bangalore; India; 6 - 8 December 2006 / Jalote, Pankaj (Eds.) 2006, pp. 27 - 36ISBN: 978-0-7695-2685-0; 0-7695-2685-3Online Full Text: dx.doi.org/
-
Security Engineering Using Problem FramesIn: Emerging Trends in Information and Communication Security: Proceedings / International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006 / Müller, Günter (Eds.) 2006, pp. 238 - 253ISBN: 978-3-540-34640-1; 978-3-540-34642-5Online Full Text: dx.doi.org/
-
Problem Frames and Architectures for Security ProblemsIn: Computer Safety, Reliability, and Security: Proceedings / 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005 / Dahll, Gustav; Winther, Rune; Gran, Bjoern Axel (Eds.) 2005, pp. 390 - 404ISBN: 978-3-540-29200-5; 978-3-540-32000-5Online Full Text: dx.doi.org/
-
A Model-Based Development Process for Embedded SystemsIn: Workshop on Model-Based Development of Embedded Systems: Proceedings 2005
-
A Problem-Oriented Approach to Common Criteria CertificationIn: Computer Safety, Reliability and Security: Proceedings / 21st International Conference, SAFECOMP 2002 Catania, Italy, September 10–13, 2002 / Anderson, Stuart; Felici, Massimo; Bologna, Sandro (Eds.) 2002, pp. 334 - 346ISBN: 9783540457329; 978-3-540-44157-1Online Full Text: dx.doi.org/
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2002
LSF nicht erreichbar.
Current lectures
No current lectures.
Past lectures (max. 10)
No past lectures.