Kristian Beckers
- Security Requirements Engineering and Privacy (Problem Frames)
- Security Standards (ISO 27000, Common Criteria)
- Formal Methods and Software Specification Techniques (Z, UML)
- Distributed and Real Time Systems (Peer-to-Peer, Cloud Computing, Voice-over-IP)
- Security Testing (Security Testing Patterns, Fuzzing)
- Context-Pattern
Year | Title | Author | Journal/Proceedings | Publisher | |
---|---|---|---|---|---|
2014 | A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain [BibTeX] |
Beckers, K., Côté, I., Goeke, L., Güler, S. & Heisel, M. | International Journal of Secure Software Engineering (IJSSE) - Special Issue on 7th International Workshop on Secure Software Engineering (SecSE 2013) | IGI Global | |
BibTeX:
@article{Beckers2014-IJIS}, year = {2014}, title = {A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain}, author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Ludger Goeke and Selim G\"{u}ler and Maritta Heisel}, journal = {International Journal of Secure Software Engineering (IJSSE) - Special Issue on 7th International Workshop on Secure Software Engineering (SecSE 2013)}, publisher = {IGI Global}, volume = {5}, number = {2}, pages = {19 -- 41}, url = {http://www.igi-global.com} } |
|||||
2014 | Supporting Common Criteria Security Analysis with Problem Frames [BibTeX] |
Beckers, K., Hatebur, D. & Heisel, M. | Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) | Innovative Information Science & Technology Research Group (ISYOU) | |
BibTeX:
@article{Beckers2014-Jowua}, year = {2014}, title = {Supporting Common Criteria Security Analysis with Problem Frames}, author = {Kristian Beckers and Denis Hatebur and Maritta Heisel}, journal = {Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)}, publisher = {Innovative Information Science & Technology Research Group (ISYOU)}, volume = {5}, number = {1}, pages = {37-63}, url = {http://isyou.info/} } |
|||||
2014 | Goal-based Establishment of an Information Security Management System compliant to ISO 27001 [BibTeX] |
Beckers, K. | SOFSEM 2014: Theory and Practice of Computer Science | Springer | |
BibTeX:
@incollection{Beckers2014-sofsem}, year = {2014}, title = {Goal-based Establishment of an Information Security Management System compliant to ISO 27001}, booktitle = {SOFSEM 2014: Theory and Practice of Computer Science}, author = {Kristian Beckers}, publisher = {Springer}, series = {LNCS 8327}, pages = {102-113}, url = {http://www.springerlink.com/} } |
|||||
2014 | A Threat Analysis Methodology for Smart Home Scenarios [BibTeX] |
Beckers, K., Faßbender, S., Heisel, M. & Suppan, S. | Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14) | Springer | |
BibTeX:
@conference{BFHS2014}, year = {2014}, title = {{A} {T}hreat {A}nalysis {M}ethodology for {S}mart {H}ome {S}cenarios}, booktitle = {Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)}, author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Santiago Suppan}, publisher = {Springer}, series = {LNCS 8448}, pages = {Pages 94-124}, url = {http://www.springerlink.com/} } |
|||||
2014 | Considering Attacker Motivation in Attack Graphs Analysis in a Smart Grid Scenario [BibTeX] |
Beckers, K., Heisel, M., Krautsevich, L., Maritnelli, F. & Yautsiukhin, A. | Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14) | Springer Berlin Heidelberg | |
BibTeX:
@conference{BHKMY2014}, year = {2014}, title = {{C}onsidering {A}ttacker {M}otivation in {A}ttack {G}raphs {A}nalysis in a {S}mart {G}rid {S}cenario}, booktitle = {Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)}, author = {Kristian Beckers and Maritta Heisel and Leanid Krautsevich and Fabio Maritnelli and Artsiom Yautsiukhin}, publisher = {Springer Berlin Heidelberg}, series = {LNCS 8448}, pages = {Pages 30-47}, url = {http://www.springerlink.com/} } |
|||||
2014 | ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System [BibTeX] |
Beckers, K., Heisel, M., Solhaug, B. & Stølen, K. | Advances in Engineering Secure Future Internet Services and Systems | Springer | |
BibTeX:
@inproceedings{BHSS2014}, year = {2014}, title = {ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System}, booktitle = {Advances in Engineering Secure Future Internet Services and Systems}, author = {Kristian Beckers and Maritta Heisel and Bj{\o}rnar Solhaug and Ketil St{\o}len}, publisher = {Springer}, number = {8431}, series = {LNCS State-of-the-Art Surveys}, pages = {315-344}, url = {http://www.springerlink.com/} } |
|||||
2014 | A Structured Comparison of Security Standards [BibTeX] |
Beckers, K., Côté, I., Fenz, S., Hatebur, D. & Heisel, M. | Advances in Engineering Secure Future Internet Services and Systems | Springer | |
BibTeX:
@inproceedings{Lopez2014}, year = {2014}, title = {A Structured Comparison of Security Standards}, booktitle = {Advances in Engineering Secure Future Internet Services and Systems}, author = {Kristian Beckers and Isabelle C\^{o}t\'{e} and Stefan Fenz and Denis Hatebur and Maritta Heisel}, publisher = {Springer}, number = {8431}, series = {LNCS State-of-the-Art Surveys}, pages = {1-34}, url = {http://www.springerlink.com/} } |
|||||
2014 | Trust-Aware Decision-Making Methodology for Cloud Sourcing [BibTeX] |
Moyano, F., Beckers, K. & Fernandez-Gago, C. | In the proceedings of the 26th International Conference on Advanced Information Systems Engineering (CAiSE) | Springer | |
BibTeX:
@conference{MBG2014}, year = {2014}, title = {Trust-Aware Decision-Making Methodology for Cloud Sourcing}, booktitle = {In the proceedings of the 26th International Conference on Advanced Information Systems Engineering (CAiSE)}, author = {Francisco Moyano and Kristian Beckers and Carmen Fernandez-Gago}, publisher = {Springer}, series = {LNCS 8484}, pages = {136 -- 149}, url = {http://www.springerlink.com/} } |
|||||
2014 | Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements [BibTeX] |
Moyano, F., Fernandez-Gago, C., Beckers, K. & Heisel, M. | Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14) | Springer | |
BibTeX:
@conference{MGBH2014}, year = {2014}, title = {Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements}, booktitle = {Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14)}, author = {Francisco Moyano and Carmen Fernandez-Gago and Kristian Beckers and Maritta Heisel}, publisher = {Springer}, series = {LNCS 8448}, pages = {166 -- 180}, url = {http://www.springerlink.com/} } |
|||||
2014 | Analysis of Social Engineering Threats with Attack Graphs [BibTeX] |
Beckers, K., Krautsevich, L. & Yautsiukhin, A. | Proceedings of the 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA) - Affiliated workshop with ESORICS | Springer | |
BibTeX:
@inproceedings{QASA2014}, year = {2014}, title = {{Analysis of Social Engineering Threats with Attack Graphs}}, booktitle = {{Proceedings of the 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA) - Affiliated workshop with ESORICS}}, author = {Kristian Beckers and Leanid Krautsevich and Artsiom Yautsiukhin}, publisher = {Springer}, series = {LNCS}, pages = {to appear}, url = {http://www.springerlink.com/} } |
|||||
2014 | A Catalog of Security Requirements Patterns for the Domain of Cloud Computing Systems [BibTeX] |
Beckers, K., Côté, I. & Goeke, L. | Proceedings 29th Symposium on Applied Computing | ACM | |
BibTeX:
@conference{SAC2014}, year = {2014}, title = {{A Catalog of Security Requirements Patterns for the Domain of Cloud Computing Systems}}, booktitle = {Proceedings 29th Symposium on Applied Computing}, author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Ludger Goeke}, publisher = {ACM}, pages = {337-342}, url = {http://dl.acm.org/} } |
|||||
2014 | Systematic Derivation of Functional Safety Requirements for Automotive Systems [BibTeX] |
Beckers, K., Côté, I., Frese, T., Hatebur, D. & Heisel, M. | Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP) | Springer | |
BibTeX:
@inproceedings{Safecomp2014}, year = {2014}, title = {{Systematic Derivation of Functional Safety Requirements for Automotive Systems}}, booktitle = {{Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP)}}, author = {Kristian Beckers and Isabelle C\^ot\'e and Thomas Frese and Denis Hatebur and Maritta Heisel}, publisher = {Springer}, series = {LNCS 8666}, pages = {65--80}, url = {http://www.springerlink.com/} } |
|||||
2014 | A Problem-based Approach for Computer Aided Privacy Threat Identification [BibTeX] |
Beckers, K., Faßbender, S., Heisel, M. & Meis, R. | APF 2012 | Springer | |
BibTeX:
@inproceedings{threatID2012}, year = {2014}, title = {A Problem-based Approach for Computer Aided Privacy Threat Identification}, booktitle = {APF 2012}, author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Rene Meis}, publisher = {Springer}, volume = {8319}, series = {LNCS}, pages = {1--16}, url = {http://www.springerlink.com/} } |
|||||
2014 | Privacy-Aware Cloud Deployment Scenario Selection [BibTeX] |
Beckers, K., Faßbender, S., Gritzalis, S., Heisel, M., Kalloniatis, C. & Meis, R. | Trust, Privacy, and Security in Digital Business | Springer | |
BibTeX:
@inproceedings{TrustBus2014}, year = {2014}, title = {Privacy-Aware Cloud Deployment Scenario Selection}, booktitle = {Trust, Privacy, and Security in Digital Business}, author = {Beckers, K. and Fa\ss{}bender, S. and Gritzalis, S. and Heisel, M. and Kalloniatis, C. and Meis, R.}, publisher = {Springer}, volume = {8647}, series = {LNCS}, pages = {94-105}, url = {http://www.springerlink.com/} } |
|||||
2013 | A Problem-based Threat Analysis in compliance with Common Criteria [BibTeX] |
Beckers, K., Hatebur, D. & Heisel, M. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2013-ares1}, year = {2013}, title = { A Problem-based Threat Analysis in compliance with Common Criteria }, booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES})}, author = {Kristian Beckers and Denis Hatebur and Maritta Heisel}, publisher = {IEEE Computer Society}, pages = {111-120}, url = {http://www.ieee.org/} } |
|||||
2013 | Structured Pattern-Based Security Requirements Elicitation for Clouds [BibTeX] |
Beckers, K., Côté, I., Goeke, L., Güler, S. & Heisel, M. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 7th International Workshop on Secure Software Engineering (SecSE 2013) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2013-ares2}, year = {2013}, title = {Structured Pattern-Based Security Requirements Elicitation for Clouds }, booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 7th International Workshop on Secure Software Engineering (SecSE 2013)}, author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Ludger Goeke and Selim G\"{u}ler and Maritta Heisel}, publisher = {IEEE Computer Society}, pages = {465-474}, url = {http://www.ieee.org/} } |
|||||
2013 | A Usability Evaluation of the NESSoS Common Body of Knowledge [BibTeX] |
Beckers, K. & Heisel, M. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 2nd International Workshop on Security Ontologies and Taxonomies(SecOnT 2013) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2013-ares3}, year = {2013}, title = { A Usability Evaluation of the NESSoS Common Body of Knowledge}, booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 2nd International Workshop on Security Ontologies and Taxonomies(SecOnT 2013)}, author = {Kristian Beckers and Maritta Heisel}, publisher = {IEEE Computer Society}, pages = {559-568}, url = {http://www.ieee.org/} } |
|||||
2013 | A mapping between ITIL and ISO 27001 processes for use by a high availability video conference service provider [BibTeX] |
Beckers, K., Hofbauer, S., Quirchmayr, G. & Wills, C. C. | Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013) | Springer | |
BibTeX:
@inproceedings{Beckers2013-cdares1}, year = {2013}, title = {A mapping between ITIL and ISO 27001 processes for use by a high availability video conference service provider}, booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013)}, author = {Kristian Beckers and Stefan Hofbauer and Gerald Quirchmayr and Christopher C. Wills}, publisher = {Springer}, series = {LNCS 8127}, pages = {224-239}, url = {http://www.springerlink.com/} } |
|||||
2013 | Combining Goal-oriented and Problem-oriented Requirements Engineering Methods [BibTeX] |
Beckers, K., Faßbender, S., Heisel, M. & Paci, F. | Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013) | Springer | |
BibTeX:
@inproceedings{Beckers2013-cdares2}, year = {2013}, title = {Combining Goal-oriented and Problem-oriented Requirements Engineering Methods}, booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2013)}, author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Federica Paci}, publisher = {Springer}, series = {LNCS 8127}, pages = {178-194}, url = {http://www.springerlink.com/} } |
|||||
2013 | A Meta-Model Approach to the Fundamentals for a Pattern Language for Context Elicitation [BibTeX] |
Beckers, K., Faßbender, S. & Heisel, M. | Proceedings of the 18th European Conference on Pattern Languages of Programs (Europlop) | ACM | |
BibTeX:
@inproceedings{Beckers2013-europlop}, year = {2013}, title = {A Meta-Model Approach to the Fundamentals for a Pattern Language for Context Elicitation}, booktitle = {Proceedings of the 18th European Conference on Pattern Languages of Programs (Europlop)}, author = {Beckers, Kristian and Fa{\ss}bender, Stephan and Heisel, Maritta}, publisher = {ACM}, pages = {-}, note = {Accepted for Publication}, url = {http://dl.acm.org/} } |
|||||
2013 | A Structured and Model-Based Hazard Analysis and Risk Assessment Method for Automotive Systems [BibTeX] |
Beckers, K., Frese, T., Hatebur, D. & Heisel, M. | Proceedings of the 24th IEEE International Symposium on Software Reliability Engineering | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2013-issre}, year = {2013}, title = {{A Structured and Model-Based Hazard Analysis and Risk Assessment Method for Automotive Systems}}, booktitle = {Proceedings of the 24th IEEE International Symposium on Software Reliability Engineering}, author = {Kristian Beckers and Thomas Frese and Denis Hatebur and Maritta Heisel}, publisher = {IEEE Computer Society}, pages = {238-247}, url = {http://www.ieee.org/} } |
|||||
2013 | A pattern-based method for establishing a cloud-specific information security management system [BibTeX] |
Beckers, K., Côté, I., Faßbender, S., Heisel, M. & Hofbauer, S. | Requirements Engineering | Springer-Verlag | |
BibTeX:
@article{Beckers2013rohtua}, year = {2013}, title = {A pattern-based method for establishing a cloud-specific information security management system}, author = {Beckers, Kristian and C{\^o}t{\'e}, Isabelle and Fa{\ss}bender, Stephan and Heisel, Maritta and Hofbauer, Stefan}, journal = {Requirements Engineering}, publisher = {Springer-Verlag}, pages = {1-53}, url = {http://www.springerlink.com/} } |
|||||
2013 | Common Criteria CompliAnt Software Development (CC-CASD) [BibTeX] |
Beckers, K., Côté, I., Hatebur, D., Faßbender, S. & Heisel, M. | Proceedings 28th Symposium on Applied Computing | ACM | |
BibTeX:
@conference{SAC2013}, year = {2013}, title = {{C}ommon {C}riteria {C}ompli{A}nt {S}oftware {D}evelopment ({CC}-{CASD})}, booktitle = {Proceedings 28th Symposium on Applied Computing}, author = {Kristian Beckers and Isabelle C{\^o}t{\'e} and Denis Hatebur and Stephan Fa{\ss}bender and Maritta Heisel}, publisher = {ACM}, pages = {937-943}, url = {http://dl.acm.org/} } |
|||||
2012 | Ontology-Based Identification of Research Gaps and Immature Research Areas [BibTeX] |
Beckers, K., Eicker, S., Faßbender, S., Heisel, M., Schmidt, H. & Schwittek, W. | Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012) | Springer | |
BibTeX:
@inproceedings{Beckers2012-ares1}, year = {2012}, title = {Ontology-Based Identification of Research Gaps and Immature Research Areas}, booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012)}, author = {Kristian Beckers and Stefan Eicker and Stephan Fa{\ss}bender and Maritta Heisel and Holger Schmidt and Widura Schwittek}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, pages = {1-16}, url = {http://www.springerlink.com/} } |
|||||
2012 | Comparing Privacy Requirements Engineering Approaches [BibTeX] |
Beckers, K. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 6th International Workshop on Secure Software Engineering (SecSE 2012) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2012-ares2}, year = {2012}, title = {Comparing Privacy Requirements Engineering Approaches}, booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 6th International Workshop on Secure Software Engineering (SecSE 2012)}, author = {Kristian Beckers}, publisher = {IEEE Computer Society}, pages = {574-581}, url = {http://www.ieee.org/} } |
|||||
2012 | A Foundation for Requirements Analysis of Privacy Preserving Software [BibTeX] |
Beckers, K. & Heisel, M. | Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012) | Springer | |
BibTeX:
@inproceedings{Beckers2012-ares3}, year = {2012}, title = {A Foundation for Requirements Analysis of Privacy Preserving Software}, booktitle = {Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012)}, author = {Kristian Beckers and Maritta Heisel}, publisher = {Springer}, volume = {7465}, series = {Lecture Notes in Computer Science}, pages = {93-107}, url = {http://www.springerlink.com/} } |
|||||
2012 | Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation [BibTeX] |
Beckers, K., Heisel, M., Faßbender, S. & Schmidt, H. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2012-ares4}, year = {2012}, title = {Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation}, booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES})}, author = {Kristian Beckers and Maritta Heisel and Stephan Fa{\ss}bender and Holger Schmidt}, publisher = {IEEE Computer Society}, pages = {243-248}, url = {http://www.ieee.org/} } |
|||||
2012 | An integrated Method for Pattern-based Elicitation of Legal Requirements applied to a Cloud Computing Example [BibTeX] |
Beckers, K., Faßbender, S. & Schmidt, H. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2012-ares5}, year = {2012}, title = {An integrated Method for Pattern-based Elicitation of Legal Requirements applied to a Cloud Computing Example}, booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012)}, author = {Kristian Beckers and Stephan Fa{\ss}bender and Holger Schmidt}, publisher = {IEEE Computer Society}, pages = {463-472}, url = {http://www.ieee.org/} } |
|||||
2012 | Peer-to-Peer driven Software Engineering considering Security, Reliability, and Performance [BibTeX] |
Beckers, K. & Faßbender, S. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2012-ares6}, year = {2012}, title = {Peer-to-Peer driven Software Engineering considering Security, Reliability, and Performance}, booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures(RISI 2012)}, author = {Kristian Beckers and Stephan Fa{\ss}bender}, publisher = {IEEE Computer Society}, pages = {485-494}, url = {http://www.ieee.org/} } |
|||||
2012 | A Common Body of Knowledge for Engineering Secure Software and Services [BibTeX] |
Schwittek, W., Schmidt, H., Beckers, K., Eicker, S., Faßbender, S. & Heisel, M. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 1st International Workshop on Security Ontologies and Taxonomies(SecOnT 2012) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2012-ares7}, year = {2012}, title = {A Common Body of Knowledge for Engineering Secure Software and Services}, booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 1st International Workshop on Security Ontologies and Taxonomies(SecOnT 2012)}, author = {Widura Schwittek and Holger Schmidt and Kristian Beckers and Stefan Eicker and Stephan Fa{\ss}bender and Maritta Heisel}, publisher = {IEEE Computer Society}, pages = {499-506}, url = {http://www.ieee.org/} } |
|||||
2012 | A privacy preserving approach to Call Detail Records analysis in VoIP systems [BibTeX] |
Hofbauer, S., Beckers, K. & Quirchmayr, G. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 7th International Workshop on Frontiers in Availability, Reliabilityand Security (FARES 2012) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2012-ares8}, year = {2012}, title = {A privacy preserving approach to Call Detail Records analysis in VoIP systems}, booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES}) - 7th International Workshop on Frontiers in Availability, Reliabilityand Security (FARES 2012)}, author = {Stefan Hofbauer AND Kristian Beckers AND Gerald Quirchmayr}, publisher = {IEEE Computer Society}, pages = {307-316}, url = {http://www.ieee.org/} } |
|||||
2012 | Supporting the Development and Documentation of Trustworthy ICT Systems according to Security Standard through Patterns and Security Requirements Engineering Approaches [BibTeX] |
Beckers, K. | Electronic Proc. of the 1st ESSoS Doctoral Symposium, ESSoS-DS 2012 | CEUR-WS.org | |
BibTeX:
@conference{BeckersESoSDS2012}, year = {2012}, title = {{S}upporting the {D}evelopment and {D}ocumentation of {T}rustworthy {ICT} {S}ystems according to {S}ecurity {S}tandard through {P}atterns and {S}ecurity {R}equirements {E}ngineering {A}pproaches}, booktitle = {Electronic Proc. of the 1st ESSoS Doctoral Symposium, ESSoS-DS 2012}, author = {Kristian Beckers}, publisher = {CEUR-WS.org}, volume = {834}, pages = {65-70}, url = {http://CEUR-WS.org} } |
|||||
2012 | Supporting the Context Establishment according to ISO 27005 using Patterns [BibTeX] |
Beckers, K. & Faßbender, S. | Software Engineering 2012 - Workshopband | GI | |
BibTeX:
@inproceedings{beckersF12zemoss}, year = {2012}, title = {Supporting the Context Establishment according to ISO 27005 using Patterns}, booktitle = {Software Engineering 2012 - Workshopband}, author = {Kristian Beckers and Stephan Fa{\ss}bender}, publisher = {GI}, pages = {141-146}, note = {Workshop Zertifizierung und modellgetriebene Entwicklung sicherer Software, Software Engineering 2012 (ZeMoSS'12)}, url = {http://www.gi.com/} } |
|||||
2012 | Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches [BibTeX] |
Beckers, K., Faßbender, S., Heisel, M., Küster, J.-C. & Schmidt, H. | Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS) | Springer | |
BibTeX:
@inproceedings{BeckersFHKS12}, year = {2012}, title = {Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches}, booktitle = {Proceedings of the International Symposium on Engineering Secure Software and Systems ({ESSoS})}, author = {Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Jan-Christoph K{\"u}ster and Holger Schmidt}, publisher = {Springer}, series = {LNCS}, pages = {14-21}, url = {http://www.springerlink.com/} } |
|||||
2012 | A Pattern-Based Method for Identifying and Analyzing Laws [BibTeX] |
Beckers, K., Faßbender, S., Küster, J.-C. & Schmidt, H. | Proceedings of the International Working Conference onRequirements Engineering: Foundation for Software Quality (REFSQ) | Springer | |
BibTeX:
@inproceedings{BeckersFKS12}, year = {2012}, title = {A Pattern-Based Method for Identifying and Analyzing Laws}, booktitle = {Proceedings of the International Working Conference onRequirements Engineering: Foundation for Software Quality ({REFSQ})}, author = {Kristian Beckers and Stephan Fa{\ss}bender and Jan-Christoph K{\"u}ster and Holger Schmidt}, publisher = {Springer}, series = {LNCS}, pages = {256-262}, url = {http://www.springerlink.com/} } |
|||||
2012 | Patterns- and Security-Requirements-Engineering-based Support for Development and Documentation of Security Standard Compliant ICT Systems [BibTeX] |
Beckers, K. | DOKTORANDENSYMPOSIUM DER SOFTWARE ENGINEERING 2012 PROCEEDINGS | Brandenburg University of Technology | |
BibTeX:
@conference{BeckersSE2012}, year = {2012}, title = {{P}atterns- and {S}ecurity-{R}equirements-{E}ngineering-based {S}upport for {D}evelopment and {D}ocumentation of {S}ecurity {S}tandard {C}ompliant {ICT} {S}ystems}, booktitle = {DOKTORANDENSYMPOSIUM DER SOFTWARE ENGINEERING 2012 PROCEEDINGS}, author = {Kristian Beckers}, publisher = {Brandenburg University of Technology}, volume = {01/12}, pages = {25-30}, url = {http://www-docs.tu-cottbus.de/programmiersprachen-compilerbau/public/publikationen/2012/DS-SE-2012.pdf} } |
|||||
2012 | Conducting a Privacy Impact Analysis for the Analysis of Communication Records [BibTeX] |
Hofbauer, S., Beckers, K. & Quirchmayr, G. | Proceedings of The International Conferences on Perspectives in Business Informatics Research (BIR 2012) | Springer | |
BibTeX:
@inproceedings{hofbauer2012privacymethod}, year = {2012}, title = {Conducting a Privacy Impact Analysis for the Analysis of Communication Records}, booktitle = {Proceedings of The International Conferences on Perspectives in Business Informatics Research (BIR 2012)}, author = {Stefan Hofbauer AND Kristian Beckers AND Gerald Quirchmayr}, publisher = {Springer}, volume = {128}, series = {Lecture Notes in Business Information Processing}, pages = {148-161}, url = {http://www.springerlink.com/} } |
|||||
2012 | A Lightweight Privacy Preserving Approach for Analysing Communication Records to Prevent VoIP Attacks using Toll Fraud as an Example [BibTeX] |
Hofbauer, S., Beckers, K., Quirchmayr, G. & Sorge, C. | Proceedings of The Second International Symposium on Anonymity and Communication Systems (ACS-2012) | IEEE Computer Society | |
BibTeX:
@inproceedings{hofbauer2012spit}, year = {2012}, title = {A Lightweight Privacy Preserving Approach for Analysing Communication Records to Prevent VoIP Attacks using Toll Fraud as an Example}, booktitle = {Proceedings of The Second International Symposium on Anonymity and Communication Systems (ACS-2012)}, author = {Stefan Hofbauer AND Kristian Beckers AND Gerald Quirchmayr AND Christoph Sorge}, publisher = {IEEE Computer Society}, pages = {992-997}, url = {http://www.ieee.org/} } |
|||||
2012 | Pattern-based Context Establishment for Service-Oriented Architectures [BibTeX] |
Beckers, K., Faßbender, S., Heisel, M. & Meis, R. | Software Service and Application Engineering | Springer | |
BibTeX:
@inproceedings{sdps2012}, year = {2012}, title = {Pattern-based Context Establishment for Service-Oriented Architectures}, booktitle = {Software Service and Application Engineering}, author = {Beckers, Kristian and Fa\ss{}bender, Stephan and Heisel, Maritta and Meis, Rene}, publisher = {Springer}, series = {LNCS 7365}, pages = {81-101}, url = {http://www.springerlink.com/} } |
|||||
2011 | Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing [BibTeX] |
Beckers, K., Küster, J.-C., Faßbender, S. & Schmidt, H. | Proceedings of the International Conference on Availability, Reliability and Security (ARES) | IEEE Computer Society | |
BibTeX:
@inproceedings{Beckers2011}, year = {2011}, title = {Pattern-Based Support for Context Establishment and Asset Identification of the {ISO} 27000 in the Field of Cloud Computing}, booktitle = {Proceedings of the International Conference on Availability, Reliability and Security ({ARES})}, author = {Kristian Beckers and Jan-Christoph K{\"u}ster and Stephan Fa{\ss}bender and Holger Schmidt}, publisher = {IEEE Computer Society}, pages = {327--333}, url = {http://www.ieee.org/} } |
|||||
2010 | Security and Compliance in Clouds [BibTeX] |
Beckers, K. & Jürjens, J. | ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference | Vieweg + Teubner | |
BibTeX:
@inproceedings{Beckers2010}, year = {2010}, title = {Security and Compliance in Clouds}, booktitle = {ISSE 2010 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2010 Conference}, author = {Kristian Beckers and Jan J\"{u}rjens}, publisher = {Vieweg + Teubner}, pages = {91 - 101}, url = {http://www.springer-vieweg.de} } |
|||||
2010 | Process Intelligence in der Finanzwirtschaft [BibTeX] |
Gsell, H., Weißenberg, N., Beckers, K. & Hirsch, M. | ERP ManagementSoftware as a Service, Cloud Computing und Mobile Technologien | GITO Verlag | |
BibTeX:
@inproceedings{Gsell2010}, year = {2010}, title = {Process Intelligence in der Finanzwirtschaft}, booktitle = {Software as a Service, Cloud Computing und Mobile Technologien}, author = {Heiko Gsell and Norbert Wei{\ss}enberg and Kristian Beckers and Martin Hirsch}, journal = {ERP Management}, publisher = {GITO Verlag}, pages = {63 - 75}, url = {www.gito.de} } |
|||||
2010 | Process Compliance und Process Intelligence in der Finanzwirtschaft [BibTeX] |
Hüning, N., Gsell, H., Weißenberg, N., Hirsch, M. & Beckers, K. | ERP Management | GITO Verlag | |
BibTeX:
@article{Huening2010}, year = {2010}, title = {Process Compliance und Process Intelligence in der Finanzwirtschaft}, author = {Nadine H\"{u}ning and Heiko Gsell and Norbert Wei{\ss}enberg and Martin Hirsch and Kristian Beckers}, journal = {ERP Management}, publisher = {GITO Verlag}, volume = {2}, pages = {39 - 42}, url = {www.gito.de} } |
|||||
2009 | Single-message denial-of-service attacks against voice-over- internet protocol terminals [BibTeX] |
Seedorf, J., Beckers, K. & Huici, F. | International Journal of Electronic Security and Digital Forensics | Inderscience Publishers | |
BibTeX:
@article{sip09DOS}, year = {2009}, title = {Single-message denial-of-service attacks against voice-over- internet protocol terminals}, author = {Jan Seedorf and Kristian Beckers and Felipe Huici}, journal = {International Journal of Electronic Security and Digital Forensics}, publisher = {Inderscience Publishers}, volume = {2}, pages = {29-34}, url = {http://dx.doi.org/10.1504/IJESDF.2009.023873}, doi = {10.1504/IJESDF.2009.023873} } |
|||||
2008 | Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks [BibTeX] |
Seedorf, J., Beckers, K. & Huici, F. | Communications in Computer and Information Science | Springer | |
BibTeX:
@article{sip08Dos}, year = {2008}, title = {Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks}, author = {Jan Seedorf and Kristian Beckers and Felipe Huici}, journal = {Communications in Computer and Information Science}, publisher = {Springer}, volume = {12}, series = {CCIS}, pages = {61-64}, url = {http://www.springerlink.com/} } |
Proposed Bachelor, Diploma and Master thesis
Titel | Art der Arbeit |
---|
Teaching
Sommer semester 2013 - Seminar Modelbased Privacy and Security Requirements Engineering
Winter semester 2012/2013 - Seminar Online Privacy
Summer semester 2012 - Exercises for Development of Safe and Secure Software
Winter semester 2011/2012 - Exercises for Formal Specification von Softwaresystems
Winter semester 2011/2012 - Seminar Cloud Computing Architectures considering Security and Compliance
Summer semester 2011 - Exercises for Algorithms und Data Structures
Talks
08.04.2013 - Essen
VDE EWNS 2012 Workshop for Network Security in Essen
Thema:"Identification of Research Gaps in the NESSoS Common Body of Knowledge"
http://wiki.uni-due.de/TdR/images/6/6e/Programm_EWNS2013.pdf
29.03.2012 - Essen
VDE EWNS 2012 Workshop for Network Security in Essen
Thema: "Eine Methode zur Anforderungsanalyse von Privacy nach Common Criteria"
http://www.vde.com/de/Veranstaltungen/Workshops/Seiten/VeranstaltungsDetails.aspx?vdeEventID=43d3d89c-9110-45f2-9a02-1d16b2705323
08.04.2011 - Darmstadt
GI Fachgruppe KuVS - Kommunikation und Verteilte Systeme Fachgespräch zu Cloud Security
Thema: "Pattern-Based Compliance and Security Engineering for Clouds"
http://www.kuvs.de/fachgespr/sicherheit-fur-cloud-computing/
19.11.2010, - Frankfurt/Main
GI Fachgruppe SECMGT - Management von Informationssicherheit Workshop zum Thema "Compliance Management"
Thema: "Compliance in Clouds – Möglichkeiten zur Überprüfung von Sicherheitszielen im Cloud Computing"
http://www1.gi-ev.de/gliederungen/fachbereiche/sicherheit/fg-secmgt/workshops/2010-11-19/
Thesis
2008 - Diploma Thesis in Collaboration with NEC Research Labs Heidelberg
Title: "Automated Vulnerability Analysis of SIP-Implementations and SIP-specific Signature Generation
for Knowledge-based Intrusion Detection Systems"