Maritta Heisel
Prof. Dr. rer. nat. Maritta Heisel
Address Bismarckstr. 90
Room BC 307
Phone +49 203 379 3465
Fax +49 203 379 4490
Email maritta.heisel[at]uni-duisburg-essen.de
Current Research
- Security
- Riskmanagement
- Requirements analysis
- Model-based software engineering
- Web-engineering
CV
since 2004 |
Professor for Software Engineering at the University Duisburg-Essen |
|
|
|
|
Projects
- Tool-based software risk analysis: research cooperation with Siemens
- RestAssured
- PDP4E
-
Creating Privacy Policies from Data-Flow DiagramsIn: Computer Security. ESORICS 2023 International Workshops: Revised Selected Papers Part I / CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25–29, 2023 / Katsikas, Sokratis; Cuppens, Frédéric; Cuppens-Boulahia, Nora (Eds.) 2024, pp. 433 - 453Online Full Text: dx.doi.org/ Online Full Text (Open Access)
-
Extending PriPoCoG : A Privacy Policy Editor for GDPR-Compliant Privacy PoliciesIn: Proceedings of the 19th International Conference on Evaluation of Novel Approaches to Software Engineering - Volume 1: ENASE 2024, pp. 307 - 318Online Full Text: dx.doi.org/
-
Cybersecurity discussions in Stack Overflow : a developer-centred analysis of engagement and self-disclosure behaviourIn: Social Network Analysis and Mining Vol. 14 (2024) 16Online Full Text: dx.doi.org/ (Open Access)
-
P2BAC: Privacy Policy Based Access Control Using P-LPLIn: Proceedings of the 9th International Conference on Information Systems Security and Privacy ICISSP: Volume 1 / 9th International Conference on Information Systems Security and Privacy (ICISSP 2023): 22 - 24 February 2023; Lisbon, Portugal 2023, pp. 686 - 697Online Full Text: dx.doi.org/
-
Pattern-Based Risk Identification for Model-Based Risk ManagementIn: Applicable Formal Methods for Safe Industrial Products 2023, pp. 114 - 129Online Full Text: dx.doi.org/
-
ENAGRAM: An App to Evaluate Preventative Nudges for InstagramIn: Proceedings of the 2nd European Symposium on Usable Security, EuroUSEC 2022 / EuroUSEC '22: 2nd European Symposium on Usable Security; 29 - 30 September 2022; Karlsruhe, Germany 2022, pp. 53 - 63Online Full Text: dx.doi.org/ (Open Access)
-
Meeting Strangers Online : Feature Models for Trustworthiness AssessmentIn: Human-Centered Software Engineering: Proceedings / 9th IFIP WG 13.2 International Working Conference, HCSE 2022, Eindhoven, The Netherlands, August 24–26, 2022, / Bernhaupt, Regina; Ardito, Carmelo; Sauer, Stefan (Eds.) 2022, pp. 3 - 22Online Full Text: dx.doi.org/
-
Community detection for access-control decisions : Analysing the role of homophily and information diffusion in Online Social NetworksIn: Online Social Networks and Media Vol. 29 (2022) 100203Online Full Text: dx.doi.org/ (Open Access)
-
PriPoCoG : Guiding Policy Authors to Define GDPR-Compliant Privacy PoliciesIn: Trust, Privacy and Security in Digital Business: Proceedings / Katsikas, Sokratis; Furnell, Steven; 19th International Conference (TrustBus 2022): Vienna, Austria; August 24, 2022 2022, pp. 1 - 16Online Full Text: dx.doi.org/
-
The Relevance of Privacy Concerns, Trust, and Risk for Hybrid Social MediaIn: Evaluation of Novel Approaches to Software Engineering: 16th International Conference, ENASE 2021, Virtual Event, April 26-27, 2021 ; Revised Selected Papers / 16th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE) ; April 26-27, 2021, Virtual Event / Ali, Raian; Kaindl, Hermann; Maciaszek, Leszek A. (Eds.) 2022, pp. 88 - 111Online Full Text: dx.doi.org/
-
The Role of Trustworthiness Facets for Developing Social Media Applications : A Structured Literature ReviewIn: Information Vol. 13 (2022) Nr. 1, 34Online Full Text: dx.doi.org/ Online Full Text (Open Access)
-
P2P Frames : Pattern-based Characterization of Functional Requirements for Peer-to-peer SystemsIn: ENASE 2021: Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering : online streaming, April 26-27, 2021 / 16th International Conference on Evaluation of Novel Approaches to Software Engineering; 26-27 April 2021; Virtual / Ali, Raian; Kaindl, Hermann; Maciaszek, Leszek (Eds.) 2021, pp. 239 - 250
-
Risk Identification Based on Architectural PatternsIn: Quality of Information and Communications Technology: Proceedings / 14th International Conference, QUATIC 2021, Algarve, Portugal, September 8–11, 2021 / Paiva, Ana C. R.; Cavalli, Ana Rosa; Ventura Martins, Paula; Pérez-Castillo, Ricardo (Eds.) 2021, pp. 341 - 355Online Full Text: dx.doi.org/
-
Risk Treatment : An Iterative Method for Identifying ControlsIn: Evaluation of Novel Approaches to Software Engineering: Revised Selected Papers / 15th International Conference, ENASE 2020, Prague, Czech Republic, May 5–6, 2020 / Ali, Raian; Kaindl, Hermann; Maciaszek, Leszek A. (Eds.) 2021, pp. 283 - 310Online Full Text: dx.doi.org/
-
Conflict identification and resolution for trust-related requirements elicitation a goal modeling approachIn: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications Vol. 12 (2021) Nr. 1, pp. 111 - 131Online Full Text: dx.doi.org/ (Open Access)
-
Model-Based Threat Modeling for Cyber-Physical Systems : A Computer-Aided ApproachIn: Software Technologies: Revised Selected Papers / 15th International Conference, ICSOFT 2020, Online Event, July 7–9, 2020 / van Sinderen, Marten; Maciaszek, Leszek A.; Fill, Hans-Georg (Eds.) 2021, pp. 158 - 183Online Full Text: dx.doi.org/
-
Technical Report on the Extension of the Layered Privacy LanguageDuisburg, Essen (2021) 7 SeitenOnline Full Text: dx.doi.org/ Online Full Text (Open Access)
-
Balancing trust and privacy in computer-mediated introduction : Featuring risk as a determinant for trustworthiness requirements elicitationIn: ARES 2020: 15th International Conference on Availability, Reliability and Security / International Conference on Availability, Reliability and Security (ARES) ; 3rd Interdisciplinary Privacy and Trust Workshop (iPAT) ; August 25 – August 28, 2020, All-digital Conference / Volkamer, Melanie; Wressnegger, Christian (Eds.) 2020 84Online Full Text: dx.doi.org/
-
Persuasion meets AI : Ethical considerations for the design of social engineering countermeasuresIn: Proceedings of the 12th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management: Vol. 3 / 12th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management ; KMIS 2020 ; 2 - 4 November 2020, online 2020, pp. 204 - 211
-
Threat modeling for cyber-Physical systems : A two-dimensional taxonomy approach for structuring attack actionsIn: Proceedings of the 15th International Conference on Software Technologies / ICSOFT 2020; Virtual, Online; France; 7 - 9 July 2020 2020, pp. 160 - 171
-
Correction: Nicolás E. Díaz Ferreyra, et al.: Preventative nudges: Introducing risk cues for supporting online self-disclosure decisionsIn: Information Vol. 11 (2020) Nr. 12, 555Online Full Text: dx.doi.org/ (Open Access)
-
Preventative nudges : Introducing risk cues for supporting online self-disclosure decisionsIn: Information Vol. 11 (2020) Nr. 8, 399Online Full Text: dx.doi.org/ Online Full Text (Open Access)
-
Distributed frames : Pattern-based characterization of functional requirements for distributed systemsIn: Software Technologies / 14th International Conference, ICSOFT 2019, Prague, Czech Republic, July 26–28, 2019 / van Sinderen, Marten; Maciaszek, Leszek A. (Eds.) 2020, pp. 81 - 107Online Full Text: dx.doi.org/
-
Systematic risk assessment of cloud computing systems using a combined model-based approachIn: Proceedings of the 22nd International Conference on Enterprise Information Systems / ICEIS 2020; Virtual, Online; 5 - 7 May 2020 / Filipe, J.; Smialek, M.; Brodsky, A.; Hammoudi, S. (Eds.) Vol. 2 2020, pp. 53 - 66
-
A Conceptual Method for Eliciting Trust-related Software Features for Computer-mediated IntroductionIn: Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering: Volume 1: ENASE 2020, pp. 269 - 280Online Full Text: dx.doi.org/ (Open Access)
-
PDP-ReqLite : A Lightweight Approach for the Elicitation of Privacy and Data Protection RequirementsIn: Data privacy management, cryptocurrencies and blockchain technology: ESORICS 2020 International Workshops, DPM 2020 and CBT 2020 ; Guildford, UK, September 17–18, 2020 ; Revised Selected Papers / 15th International Workshop on Data Privacy Management ; DPM 2020 ; September 17–18, 2020, Guildford, UK / Garcia-Alfaro, Joaquin; Navarro-Arnibas, Guillermo; Herrera-Joancomarti, Jordi (Eds.) 2020, pp. 161 - 177Online Full Text: dx.doi.org/ Online Full Text (Open Access)
-
Building Trustworthiness in Computer-Mediated Introduction : A Facet-Oriented FrameworkIn: 11th International Conference on Social Media and Society: Diverse Voices - Promises and Perils of Social Media for Diversity / SMSociety 2020; Virtual, Online; Canada; 22 - 24 July 2020 2020, pp. 39 - 46Online Full Text: dx.doi.org/
-
Risk Identification : From Requirements to Threat ModelsIn: Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP 2020): Volume 1 / Furnell, Steven; 6th International Conference on Information Systems Security and Privacy (ICISSP 2020): 25 - 27 February 2020; Valletta, Malta / Mori, Paolo; Weippl, Edgar; Camp, Olivier (Eds.) 2020, pp. 385 - 396Online Full Text: dx.doi.org/ (Open Access)
-
Assisted generation of privacy policies using textual patternsIn: Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering / ENASE 2020; Virtual, Online; 5 - 6 May 2020 2020, pp. 347 - 358
-
Model-Based Risk Analysis and Evaluation Using CORAS and CVSSIn: Evaluation of Novel Approaches to Software Engineering: 14th International Conference, ENASE 2019, Heraklion, Crete, Greece, May 4–5, 2019 ; Revised Selected Papers / International Conference on Evaluation of Novel Approaches to Software Engineering ; ENASE 2019 ; Heraklion, May 4–5, 2019 / Damiani, Ernesto; Spanoudakis, George (Eds.) 2020, pp. 108 - 134Online Full Text: dx.doi.org/
-
Systematic treatment of security risks during requirements engineeringIn: Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering / ENASE 2020; Virtual, Online; 5 - 6 May 2020 2020, pp. 132 - 143
-
Systematic Asset Identification and Modeling During Requirements EngineeringIn: Risks and Security of Internet and Systems: Proceedings / 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019 / Kallel, Slim; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Kacem, Ahmed Hadj (Eds.) 2020, pp. 50 - 66Online Full Text: dx.doi.org/
-
A Survey on Privacy Policy Languages : Expressiveness Concerning Data Protection RegulationsIn: 12th CMI Conference on Cybersecurity and Privacy / CMI 2019, Aalborg University Copenhagen, Copenhagen, Denmark, 28-29 November 2019 2019, pp. 8962144Online Full Text: dx.doi.org/
-
Integration of Development Interface Agreement, Supplier Safety Assessment and Safety Management for Driver Assistance SystemsIn: Mobilität in Zeiten der Veränderung: Technische und betriebswirtschaftliche Aspekte / Proff, Heike; Mobility in Times of Change – Past – Present - Future ; Wisseschaftsforum Mobilität ; 07.06.2018, Duisburg 2019, pp. 241 - 251Online Full Text: dx.doi.org/
-
Privacy Policy Specification Framework for Addressing End-Users’ Privacy RequirementsIn: Trust, Privacy and Security in Digital Business: Proceedings / 16th International Conference on Trust and Privacy in Digital Business (TrustBus); August 26–29, 2019; Linz, Austria / Gritzalis, Stefanos (Eds.) 2019, pp. 46 - 62Online Full Text: dx.doi.org/
-
Pattern-based modeling of cyber-physical systems for analyzing securityIn: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019 2019, pp. a23Online Full Text: dx.doi.org/
-
Pattern-based incorporation of privacy preferences into privacy policies : Negotiating the conflicting needs of service providers and end-usersIn: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019 2019, pp. a5Online Full Text: dx.doi.org/
-
RE4DIST: Model-based elicitation of functional requirements for distributed systemsIn: Proceedings of the 14th International Conference on Software Technologies / ICSOFT 2019, Prague, Czech Republic, 26 - 28 July 2019 / van Sinderen, Marten; Maciaszek, Leszek (Eds.) 2019, pp. 71 - 81Online Full Text: dx.doi.org/
-
A Systematic Method to Describe and Identify Security Threats Based on Functional RequirementsIn: Risks and Security of Internet and Systems: Revised Selected Papers / 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018 / Zemmari, Akka; Mosbah, Mohamed; Cuppens-Boulahia, Nora; Cuppens, Frédéric (Eds.) 2019, pp. 205 - 221Online Full Text: dx.doi.org/
-
Risk-Based Elicitation of Security Requirements According to the ISO 27005 StandardIn: Evaluation of Novel Approaches to Software Engineering: Revised Selected Papers / 13th International Conference, ENASE 2018, Funchal, Madeira, Portugal, March 23–24, 2018 / Damiani, Ernesto; Spanoudakis, George; Maciaszek, Leszek A. (Eds.) 2019, pp. 71 - 97Online Full Text: dx.doi.org/
-
Supporting the systematic goal refinement in KAOS using the six-variable modelIn: Proceedings of the 13th International Conference on Software Technologies / ICSOFT 2018, Porto, Portugal, July 26-28, 2018 / Maciaszek, Leszek (Eds.) 2019, pp. 102 - 111Online Full Text: dx.doi.org/
-
Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem DiagramsIn: Software Technologies: Revised Selected Papers / 13th International Conference, ICSOFT 2018, Porto, Portugal, July 26-28, 2018 / van Sinderen, Marten; Maciaszek, Leszek A. (Eds.) 2019, pp. 150 - 172Online Full Text: dx.doi.org/
-
A generic conceptual data model of social media servicesIn: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019 2019, pp. a22Online Full Text: dx.doi.org/
-
CVSS-based Estimation and Prioritization for Security RisksIn: Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering: Volume 1: ENASE / 14th International Conference on Evaluation of Novel Approaches to Software Engineering; May 4-5, 2019; Heraklion, Crete, Greece 2019, pp. 297 - 306Online Full Text: dx.doi.org/ (Open Access)
-
Combining safety and security in autonomous cars using blockchain technologiesIn: Computer Safety, Reliability, and Security: Proceedings / SAFECOMP 2019 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, 10.09.2019, Turku, Finland / Romanovsky, Alexander; Troubitsyna, Elena; Gashi, Ilir; Schoitsch, Erwin; Bitsch, Friedemann (Eds.) 2019, pp. 223 - 234Online Full Text: dx.doi.org/
-
Architecture to manage and protect personal data utilising blockchainIn: Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering: Volume 1: ENASE / 14th International Conference on Evaluation of Novel Approaches to Software Engineering; May 4-5, 2019; Heraklion, Crete, Greece 2019, pp. 340 - 349Online Full Text: dx.doi.org/ (Open Access)
-
Managing security risks : Template-based specification of controlsIn: Proceedings of the 24th European Conference on Pattern Languages of Programs / EuroPLop '19; Irsee, Germany; 3. Juli – 7. Juli 2019 2019, pp. a10Online Full Text: dx.doi.org/
-
Learning from online regrets : From deleted posts to risk awareness in social network sitesIn: ACM UMAP 2019 Adjunct - Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization / UMAP 2019; Larnaca; Cyprus; 9 - 12 June 2019 2019, pp. 117 - 125Online Full Text: dx.doi.org/ (Open Access)
-
Developing secure software using UML patternsIn: Intelligent Systems: Concepts, Methodologies, Tools, and Applications 2018, pp. 551 - 592Online Full Text: dx.doi.org/
-
Functional Safety Processes and Advanced Driver Assistance Systems : Evolution or Revolution?In: Mobilität und Digitale Transformation: Technische und Betriebswirtschaftliche Aspekte / Proff, Heike; Fojcik, Thomas Martin (Eds.) 2018, pp. 199 - 216Online Full Text: dx.doi.org/
-
Problem-based Derivation of Trustworthiness Requirements from Users' Trust ConcernsIn: 2018 16th Annual Conference on Privacy, Security and Trust (PST) / Annual Conference on Privacy, Security and Trust, August 28-30, 2018, Belfast, Northern Ireland, United Kingdom / McLaughlin, Kieran (Eds.) 2018Online Full Text: dx.doi.org/
-
Towards an end-to-end architecture for run-time data protection in the cloudIn: Proceedings - 44th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2018 / 44th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2018, Prague, Czech Republic, 29 August 2018 through 31 August 2018 2018, pp. 514 - 518Online Full Text: dx.doi.org/
-
Access-Control Prediction in Social Network Sites : Examining the Role of HomophilyIn: Social Informatics: Proceedings, Part II / 10th International Conference, SocInfo 2018, St. Petersburg, Russia, September 25-28, 2018 / Staab, Steffen; Koltsova, Olessia; Ignatov, Dmitry I. (Eds.) 2018, pp. 61 - 74Online Full Text: dx.doi.org/
-
Problem-based elicitation of security requirements the ProCOR methodIn: ENASE 2018: Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering / International Conference on Evaluation of Novel Approaches to Software Engineering ; 23 - 24 March 2018, Funchal, Madeira, Portugal / Damiani, Ernesto; Spanoudakis, George; Maciaszek, Leszek (Eds.) 2018, pp. 26 - 38Online Full Text: dx.doi.org/
-
Secure Data Processing in the CloudIn: Advances in Service-Oriented and Cloud Computing / Workshops of ESOCC 2017, Oslo, Norway, September 27-29, 2017 / Mann, Zoltán Ádám; Stolz, Volker (Eds.) 2018, pp. 149 - 153Online Full Text: dx.doi.org/ Online Full Text (Open Access)
-
Developing secure software using UML patternsIn: Computer systems and software engineering: concepts, methodologies, tools, and applications 2018, pp. 741 - 781Online Full Text: dx.doi.org/
-
Trustworthiness Cases – Toward Preparation for the Trustworthiness CertificationIn: Trust, Privacy and Security in Digital Business: Proceedings / 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018 / Furnell, Steven; Mouratidis, Haralambos; Pernul, Günther (Eds.) 2018, pp. 244 - 259Online Full Text: dx.doi.org/
-
The gender gap in wikipedia talk pagesIn: Proceedings of the 12th International AAAI Conference on Web and Social Media / ICWSM 2018; Palo Alto; United States; 25 -28 June 2018 2018, pp. 572 - 575
-
Context analysis of cloud computing systems using a pattern-based approachIn: Future Internet Vol. 10 (2018) Nr. 8, pp. 72Online Full Text: dx.doi.org/ (Open Access)
-
A structured method for security requirements elicitation concerning the cloud computing domainIn: Computer systems and software engineering: concepts, methodologies, tools, and applications 2018, pp. 782 - 805Online Full Text: dx.doi.org/
-
Outlook and Future DirectionsIn: Software Architecture for Big Data and the Cloud / Bruce, Maxim / Mistrik, Ivan; Bahsoon, Rami; Nour, Ali; Heisel, Maritta (Eds.) 2017, pp. 391 - 402Online Full Text: dx.doi.org/
-
A structured and systematic model-based development method for automotive systems, considering the OEM/supplier interfaceIn: Reliability Engineering & System Safety Vol. 158 (2017) pp. 172 - 184Online Full Text: dx.doi.org/
-
PrefaceIn: Software Architecture for Big Data and the Cloud / Mistrik, Ivan; Bahsoon, Rami; Ali, Nour; Heisel, Maritta; Maxim, Bruce (Eds.) (2017) pp. xxxi - xxxviiiOnline Full Text: dx.doi.org/
-
Deriving Safety Requirements according to ISO 26262 for complex systems : A method applied in the automotive industryIn: Innovative Produkte und Dienstleistungen in der Mobilität: Technische und betriebswirtschaftliche Aspekte / Individual, Integrated and Connected Products and Services in Mobility ; Wissenschaftsforum Mobilität ; 23.06.2016, Duisburg / Proff, Heike; Fojcik, Thomas Martin (Eds.) 2017, pp. 211 - 221Online Full Text: dx.doi.org/
-
Risiko in der Wolke? : Die Sicherheitsanalyse von Cloud-AnwendungenIn: Unikate: Berichte aus Forschung und Lehre (2017) Nr. 50: Natur-, Ingenieur- und Wirtschaftswissenschaften - High-Performance und Cloud Computing, pp. 16 - 27Online Full Text: dx.doi.org/ Online Full Text (Open Access)
-
Computer-aided identification and validation of intervenability requirementsIn: Information Vol. 8 (2017) Nr. 1, pp. 30Online Full Text: dx.doi.org/ (Open Access)
-
Should user-generated content be a matter of privacy awareness? : A position paperIn: IC3K 2017 - Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management / IC3K 2017; Funchal, Madeira; Portugal; 1 -3 November 2017 Vol. 3 2017, pp. 212 - 216
-
A framework for systematic refinement of trustworthiness requirementsIn: Information Vol. 8 (2017) Nr. 2, pp. 46Online Full Text: dx.doi.org/ (Open Access)
-
Aspect frames : Describing cross-cutting concerns in aspect-oriented requirements engineeringIn: Proceedings of the 22nd European Conference on Pattern Languages of Programs / EuroPLoP, Irsee, Germany, July 12 - 16, 2017 2017, pp. 25Online Full Text: dx.doi.org/
-
Addressing self-disclosure in social media: An instructional awareness approachIn: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications / 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 29 November-2 December 2016 2017, pp. 7945815Online Full Text: dx.doi.org/
-
Performing a more realistic and complete safety analysis by means of the six-variable modelIn: Automotive - safety & security 2017: Sicherheit und Zuverlässigkeit für automobile Informationstechnik / 7. Tagung Automotive - Safety & Security 2017 - Sicherheit und Zuverlässigkeit für automobile Informationstechnik, 30.-31.5.2017, Stuttgart, Germany / Dencker, Peter; Klenk, Herbert; Keller, Hubert (Eds.) 2017, pp. 135 - 148
-
Pattern-based representation of privacy enhancing technologies as early aspectsIn: Trust, privacy and security in digital business: Proceedings / 14th International Conference, TrustBus 2017 : Lyon, France, August 30-31, 2017 / Lopez, Javier; Fischer-Hübner, Simone; Lambrinoudakis, Costas (Eds.) 2017, pp. 49 - 65Online Full Text: dx.doi.org/
-
Facilitating reuse of control software through context modelling based on the six-variable modelIn: Software Technologies: Revised selected papers / 11th International Joint Conference, ICSOFT 2016, Lisbon, Portugal, July 24-26, 2016 / Cabello, Enrique; Cardoso, Jorge; Ludwig, André; Maciaszek, Leszek A.; Sinderen, Marten van (Eds.) 2017, pp. 332 - 358Online Full Text: dx.doi.org/
-
Online self-disclosure : From users’ regrets to instructional awarenessIn: Machine Learning and Knowledge Extraction: Proceedings / First IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference, CD-MAKE 2017, Reggio, Italy, August 29 – September 1, 2017 / Holzinger, Andreas; Kieseberg, Peter; Tjoa, A Min; Weippl, Edgar R. (Eds.) 2017, pp. 83 - 102Online Full Text: dx.doi.org/
-
Towards systematic privacy and operability (PRIOP) studiesIn: ICT Systems Security and Privacy Protection: Proceedings / 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017 / De Capitani di Vimercati, Sabrina; Martinelli, Fabio (Eds.) 2017, pp. 427 - 441Online Full Text: dx.doi.org/
-
A framework for systematic analysis and modeling of trustworthiness requirements using i* and BPMNIn: Trust, Privacy and Security in Digital Business / 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016 / Katsikas, Sokratis (Eds.) 2016, pp. 3 - 18Online Full Text: dx.doi.org/
-
Computer-Aided Identification and Validation of Privacy RequirementsIn: Information Vol. 7 (2016) Nr. 2, pp. 28Online Full Text: dx.doi.org/ (Open Access)
-
Patterns for identification of trust concerns and specification of trustworthiness requirementsIn: Proceedings of the 21st European Conference on Pattern Languages of Programs / EuroPlop '16, Kaufbeuren, Germany, July 06 - 10, 2016 2016, pp. 31Online Full Text: dx.doi.org/
-
Enhancing business process models with trustworthiness requirementsIn: Trust Management X: Proceedings / 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 / Habib, Sheikh Mahbub; Vassileva, Julita; Mauw, Sjouke; Mühlhäuser, Max (Eds.) 2016, pp. 33 - 51Online Full Text: dx.doi.org/
-
Supporting privacy impact assessments using problem-based privacy analysisIn: Software Technologies: Revised Selected Papers / 10th International Joint Conference, ICSOFT 2015, Colmar, France, July 20-22, 2015 / Lorenz, Pascal; van Sinderen, Marten (Eds.) 2016, pp. 79 - 98Online Full Text: dx.doi.org/
-
Understanding the privacy goal intervenabilityIn: Trust, Privacy and Security in Digital Business / 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016 / Katsikas, Sokratis (Eds.) 2016, pp. 79 - 94Online Full Text: dx.doi.org/
-
Variability for Qualities in Software ArchitectureIn: ACM SIGSOFT Software Engineering Notes Vol. 41 (2016) Nr. 1, pp. 32 - 35Online Full Text: dx.doi.org/
-
Developing secure software using UML patternsIn: Standards and Standardization: Concepts, Methodologies, Tools, and Applications 2015, pp. 228 - 264Online Full Text: dx.doi.org/
-
A structured method for security requirements elicitation concerning the cloud computing domainIn: Standards and Standardization: Concepts, Methodologies, Tools, and Applications 2015, pp. 875 - 896Online Full Text: dx.doi.org/
-
Systematic identification of information flows from requirements to support privacy impact assessmentsIn: ICSOFT 2015: proceedings of the 10th International Joint Conference on Software Technologies / International Joint Conference on Software Technologies, Colmar, Alsace, France, 20-22 July, 2015 2015, pp. 43 - 52
-
A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier InterfaceIn: Computer Safety, Reliability, and Security: Proceedings / 34th International Conference, SAFECOMP 2015, Delft, The Netherlands, September 23-25, 2015 / Koornneef, Flor; van Gulijk, Coen (Eds.) 2015, pp. 90 - 108Online Full Text: dx.doi.org/
-
A taxonomy of requirements for the privacy goal transparencyIn: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) / 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015 / Fischer-Hübner, Simone (Eds.) Vol. 9264 2015, pp. 195 - 209Online Full Text: dx.doi.org/
-
Applying performance patterns for requirements analysisIn: Proceedings of the 20th European Conference on Pattern Languages of Programs / EuroPLoP 2015 20th European Conference on Pattern Languages of Programs Kaufbeuren, Germany — July 08 - 12, 2015 / Link, Claudius; Veli-Pekka, Eloranta (Eds.) 2015 Article No. 35Online Full Text: dx.doi.org/ Online Full Text
-
Challenges in Rendering and Maintaining Trustworthiness for Long-Living Software SystemsIn: Software Engineering Workshops 2015: Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2015 / Workshops der Tagung Software Engineering 2015 (SE-WS 2015), 17.-18. März 2015, Dresden, Deutschland 2015, pp. 103 - 105Online Full Text (Open Access)
-
1st Workshop on VAriability for QUalIties in SofTware Architecture (VAQUITA) : Workshop IntroductionIn: Proceedings of the 2015 European Conference on Software Architecture Workshops / 9th European Conference on Software Architecture (ECSA 2015), September 7 - 11, 2015, Dubrovnik 2015 Article No. 22Online Full Text: dx.doi.org/
-
Problem-based security requirements elicitation and refinement with presSuREIn: Software Technologies: Revised Selected Papers / 9th International Joint Conference, ICSOFT 2014, Vienna, Austria, August 29-31, 2014 / Holzinger, Anfreas (Eds.) 2015, pp. 311 - 330Online Full Text: dx.doi.org/
-
A Problem-, Quality-, and Aspect-Oriented Requirements Engineering MethodIn: Software Technologies: Revised Selected Papers / 9th International Joint Conference, ICSOFT 2014, Vienna, Austria, August 29-31, 2014 / Holzinger, Andreas (Eds.) 2015, pp. 291 - 310Online Full Text: dx.doi.org/
-
Developing secure software using UML patternsIn: Handbook of Research on Innovations in Systems and Software Engineering / Garcia Dâiaz, Vincente; Cueva Lovelle, Juan Manuel; Pelayo Garcâia-Bustelo, Begona Cristina (Eds.) 2015, pp. 32 - 70Online Full Text: dx.doi.org/
-
Towards a reliable mapping between performance and security tactics, and architectural patternsIn: Proceedings of the 20th European Conference on Pattern Languages of Programs / EuroPLoP '15, 21st European Conference on Pattern Languages of Programs, 6. - 10. Juli 2015, Kloster Irsee 2015 Article No. 39Online Full Text: dx.doi.org/ Online Full Text
-
Towards systematic selection of architectural patterns with respect to quality requirementsIn: Proceedings of the 20th European Conference on Pattern Languages of Programs / EuroPLoP '15, 21st European Conference on Pattern Languages of Programs, 6. - 10. Juli 2015, Kloster Irsee 2015 Article No. 40Online Full Text: dx.doi.org/
-
A Structured Comparison of Security StandardsIn: Engineering Secure Future Internet Services and Systems / Heisel, Maritta; Joosen, Wouter; Lopez, Javier (Eds.) 2014, pp. 1 - 34Online Full Text: dx.doi.org/
-
Optimizing Functional and Quality Requirements According to Stakeholders’ GoalsIn: Relating System Quality and Software Architecture / Mistrik, Ivan; Bahsoon, Rami; Eeles, Peter; Roshandel, Roshanak; Stal, Michael (Eds.) 2014, pp. 75 - 120Online Full Text: dx.doi.org/
-
Problem-based requirements interaction analysisIn: Requirements Engineering: Foundation for Software Quality: Proceedings / 20th International Working Conference, REFSQ 2014, Essen, Germany, April 7-10, 2014 / Salinesi, Camille; Weerd, Inge (Eds.) 2014, pp. 200 - 215Online Full Text: dx.doi.org/
-
Problem-oriented security patterns for requirements engineeringIn: Proceedings of the 19th European Conference on Pattern Languages of Programs / EuroPLoP 2014 19th European Conference on Pattern Languages of Programs Irsee, Germany — July 09 - 13, 2014 / Veli-Pekka, Eloranta; van Heesch, Uwe (Eds.) 2014 Article No. 9Online Full Text: dx.doi.org/
-
Supporting Common Criteria Security Analysis with Problem FramesIn: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications Vol. 5 (2014) Nr. 1, pp. 37 - 63
-
A Structured Approach for Eliciting, Modeling, and Using Quality-Related Domain KnowledgeIn: Computational Science and Its Applications – ICCSA 2014: Proceedings, Part V / 14th International Conference, Guimarães, Portugal, June 30 – July 3, 2014 / Murgante, Beniamino; Sanjay, Misra; A. C. Rocha, Ana Maria (Eds.) 2014, pp. 370 - 386Online Full Text: dx.doi.org/
-
Systematic Derivation of Functional Safety Requirements for Automotive SystemsIn: Computer Safety, Reliability, and Security / 33rd International Conference, SAFECOMP 2014, Florence, Italy, September 10-12, 2014 / Bondavalli, Andrea (Eds.) 2014, pp. 65 - 80Online Full Text: dx.doi.org/
-
Intertwining Relationship between Requirements, Architecture, and Domain KnowledgeIn: International Conference on Software Engineering Advances (ICSEA): Proceedings / The Ninth International Conference on Software Engineering Advances ICSEA 2014 October 12 - 16, 2014 - Nice, France 2014
-
Privacy-aware cloud deployment scenario selectionIn: Trust, Privacy, and Security in Digital Business / 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014 2014, pp. 94 - 105Online Full Text: dx.doi.org/
-
Towards a Computer-Aided Problem-Oriented Variability Requirements Engineering MethodIn: Advanced Information Systems Engineering Workshops (2014) pp. 136 - 147
-
Towards developing secure software using problem-oriented security patternsIn: Availability, Reliability, and Security in Information Systems / IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference (CD-ARES) and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD), September 8-12, 2014, Fribourg, Switzerland, 2014, pp. 45 - 62Online Full Text: dx.doi.org/
-
A Framework for Combining Problem Frames and Goal Models to Support Context Analysis during Requirements EngineeringIn: Availability, Reliability, and Security in Information Systems and HCI: Proceedings / IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013 / Cuzzocrea, Alfredo; Kittl, Christian; Simos, Dimitris (Eds.) 2013, pp. 272 - 288Online Full Text: dx.doi.org/
-
A problem-based threat analysis in compliance with common criteriaIn: Eighth International Conference on Availability, Reliability and Security (ARES), 2013: Proceedings / Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : 2 - 6 Sept. 2013, Regensburg, Germany 2013, pp. 111 - 120Online Full Text: dx.doi.org/
-
A pattern-based method for establishing a cloud-specific information security management system : Establishing information security management systems for clouds considering security, privacy, and legal complianceIn: Requirements Engineering Vol. 18 (2013) Nr. 4, pp. 343 - 395Online Full Text: dx.doi.org/
-
Doctoral Symposium of ESSoS 2013 : Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013)
Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013), 27 February - 01 March 2013, Rocquencort, Paris, France,In: CEUR Workshop Proceedings Aachen Vol. 965 (2013)Online Volltext (Open Access) -
A Structured and Model-Based Hazard Analysis and Risk Assessment Method for Automotive SystemsIn: 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE) / 24th International Symposium on Software Reliability Engineering (ISSRE) : 4 - 7 Nov. 2013, Pasadena, CA, USA 2013, pp. 238 - 247Online Full Text: dx.doi.org/
-
Combining goal-oriented and problem-oriented requirements engineering methodsIn: Availability, Reliability, and Security in Information Systems and HCI: Proceedings / IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013 / Cuzzocrea, Alfredo; Kittl, Christian; Simos, Dimitris E.; Xu, Lida (Eds.) 2013, pp. 178 - 194Online Full Text: dx.doi.org/
-
ESSoS Doctoral Symposium 2013In: Doctoral Symposium of ESSoS 2013: Proceedings of the Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013) / Doctoral Symposium at the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2013), 27 February - 01 March 2013, Rocquencort, Paris, France / Heisel, Maritta; Marchetti, Eda (Eds.) (2013) pp. 2 - 3Online Full Text (Open Access)
-
Enterprise Applications : From Requirements to DesignIn: Aligning enterprise, system, and software architectures / Mistrík, Ivan (Eds.) 2013, pp. 96 - 117Online Full Text: dx.doi.org/
-
Erratum to: A pattern-based method for establishing a cloud-specific information security management systemIn: Requirements Engineering Vol. 18 (2013) Nr. 4, pp. 397Online Full Text: dx.doi.org/
-
Common criteria compliant software development (CC-CASD)In: Proceedings of the 28th Annual ACM Symposium on Applied Computing / SAC '13 Coimbra, Portugal — March 18 - 22, 2013 / Shin, Sung Y.; Maldonado, José Carlos (Eds.) 2013, pp. 1298 - 1304Online Full Text: dx.doi.org/
-
From problems to laws in requirements engineering : Using model-transformationIn: Proceedings of the 8th International Joint Conference on Software Technologies / Cordeiro, José; 8th International Joint Conference on Software Technologies, Reykjavík, Iceland, 29 - 31 July, 2013 2013, pp. 447 - 458
-
Structured pattern-based security requirements elicitation for cloudsIn: Eighth International Conference on Availability, Reliability and Security (ARES), 2013: Proceedings / Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : 2 - 6 Sept. 2013, Regensburg, Germany 2013, pp. 465 - 474Online Full Text: dx.doi.org/
-
A usability evaluation of the nessos common body of knowledgeIn: Eighth International Conference on Availability, Reliability and Security (ARES), 2013: Proceedings / Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : 2 - 6 Sept. 2013, Regensburg, Germany 2013, pp. 559 - 568Online Full Text: dx.doi.org/
-
An aspect-oriented approach to relating security requirements and access controlIn: CAiSE Forum 2012: Proceedings of the CAiSE'12 Forum at the 24th International Conference on Advanced Information Systems Engineering (CAiSE) / 24th International Conference on Advanced Information Systems Engineering (CAiSE), June 28, 2012, Gdańsk, Poland / Kirikova, Marite; Janis, Stirna (Eds.) 2012, pp. 15 - 22Online Full Text (Open Access)
-
Patterns- and Security-Requirements-Engineering-based Support for Development and Documentation of Security Standard Compliant ICT SystemsIn: Doctoral Symposium of ESSoS 12 / First Doctoral Symposium of the International Symposium on Engineering Secure Software and Systems (ESSoS), 15 February 2012, Eindhoven, The Netherlands / Cuellar, Jorge; Koch, Nora (Eds.) 2012, pp. 65 - 70Online Full Text (Open Access)
-
A Foundation for Requirements Analysis of Privacy Preserving SoftwareIn: Multidisciplinary Research and Practice for Information Systems: Proceedings / Quirchmayr, Gerald; Basl, Josef; You, Ilsun; Xu, Lida; Weippl, Edgar; IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012 2012, pp. 93 - 107Online Full Text: dx.doi.org/
-
On the Evolution of Component-Based SoftwareIn: Advances in Software Engineering Techniques: Revised Selected Papers / Szmuc, Tomasz; Szpyrka, Marcin; Zendulka, Jaroslav; 4th IFIP TC 2 Central and East European Conference on Software Engineering Techniques, CEE-SET 2009, Krakow, Poland, October 12-14, 2009 2012, pp. 54 - 69Online Full Text: dx.doi.org/
-
Supporting quality-driven design decisions by modeling variabilityIn: Proceedings of the 8th international ACM SIGSOFT conference on Quality of Software Architectures / QoSA '12, Bertinoro, Italy, June 25 - 28, 2012 / Grassi, Vincenzo (Eds.) 2012, pp. 43 - 48Online Full Text: dx.doi.org/
-
Using security requirements engineering approaches to support ISO 27001 information security management systems development and documentationIn: Seventh International Conference on Availability, Reliability and Security (ARES), 2012: Proceedings / International Conference on Availability, Reliability, and Security, 20 - 24 Aug. 2012, Prague, Czech Republic 2012, pp. 242 - 248Online Full Text: dx.doi.org/
-
Pattern-Based Context Establishment for Service-Oriented ArchitecturesIn: Software Service and Application Engineering: Essays Dedicated to Bernd Krämer on the Occasion of His 65th Birthday / Heisel, Maritta (Eds.) 2012, pp. 81 - 101Online Full Text: dx.doi.org/
-
Ontology-Based Identification of Research Gaps and Immature Research AreasIn: Multidisciplinary Research and Practice for Information Systems: Proceedings / IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012 / Quirchmayr, Gerald; Basl, Josef (Eds.) 2012, pp. 1 - 16Online Full Text: dx.doi.org/
-
Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approachesIn: EngineeEngineering Secure Software and Systemsring secure software and systems: 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings / 4th International Symposium on Engineering Secure Software and Systems (ESSoS 2012), 16-17 February 2012, Eindhoven, The Netherlands / Barthe, Gilles; Livshits, Benjamin; Scandariato, Riccardo (Eds.) 2012, pp. 14 - 21Online Full Text: dx.doi.org/
-
Designing architectures from problem descriptions by interactive model transformationIn: The 27th annual ACM Symposium on Applied Computing / ACM Symposium on Applied Computing, Riva del Garda, Trento, Italy, March 26 - 30, 2012 / Ossowski, Sascha; Lecca, Paola (Eds.) 2012, pp. 1256 - 1258Online Full Text: dx.doi.org/
-
Deriving Quality-based Architecture Alternatives with PatternsIn: Software Engineering 2012 / Fachtagung des GI-Fachbereichs Softwaretechnik ; 27. Februar - 2. März 2012 in Berlin / Jähnichen, Stefan (Eds.) 2012, pp. 71 - 82
-
A UML profile and tool support for evolutionary requirements engineeringIn: 15th European Conference on Software Maintenance and Reengineering (CSMR), 2011: Proceedings / Mens, Tom; CSMR, 1 - 4 March 2011, Oldenburg, Germany 2011, pp. 161 - 170Online Full Text: dx.doi.org/
-
UML4PF : A tool for problem-oriented requirements analysisIn: 19th IEEE International Requirements Engineering Conference (RE) / 19th IEEE International Requirements Engineering Conference (RE), 2011 : Aug. 29 2011 - Sept. 2 2011, Trento, Italy / Institute of Electrical and Electronics Engineers (Eds.) 2011, pp. 349 - 350Online Full Text: dx.doi.org/
-
Systematic Development of UMLsec Design Models Based on Security RequirementsIn: Fundamental Approaches to Software Engineering: Proceedings / 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011 / Giannakopoulou, Dimitra (Eds.) 2011, pp. 232 - 246Online Full Text: dx.doi.org/
-
Systematic Architectural Design Based on Problem PatternsIn: Relating software requirements and architectures / Avgeriou, Paris; Grundy, John; Hall, Jon G (Eds.) 2011, pp. 133 - 159Online Full Text: dx.doi.org/
-
Towards Systematic Integration of Quality Requirements into Software ArchitectureIn: Software Architecture / 5th European Conference, ECSA 2011, Essen, Germany, September 13-16, 2011 / Crnkovic, Ivica; Gruhn, Volker; Book, Matthias (Eds.) 2011, pp. 17 - 25Online Full Text: dx.doi.org/
-
A Method to Derive Software Architectures from Quality RequirementsIn: Proceedings of the 18th Asia Pacific Software Engineering Conference (APSEC 2011) / APSEC 2011; Ho Chi Minh [City], Vietnam, 5 - 8 December 2011 / Tran, Dan Thu (Eds.) 2011, pp. 322 - 330Online Full Text: dx.doi.org/
-
Towards a Common Body of Knowledge for Engineering Secure Software and ServicesIn: Proceedings of the International Conference on Knowledge Management and Information Sharing / International Conference on Knowledge Management and Information Sharing : Paris, France, 26 - 29 October, 2011 / Filipe, Joaquim (Eds.) 2011, pp. 369 - 374
-
A pattern-based method to develop secure softwareIn: Software engineering for secure systems: industrial and research perspectives / Mouratidis, Haralambos 2010, pp. 32 - 74Online Full Text: dx.doi.org/
-
A comparison of security requirements engineering methodsIn: Requirements Engineering Vol. 15 (2010) Nr. 1, pp. 7 - 40Online Full Text: dx.doi.org/
-
A UML Profile for Requirements Analysis of Dependable SoftwareIn: Computer Safety, Reliability, and Security: Proceedings / 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010 / Schoitsch, Erwin (Eds.) 2010, pp. 317 - 331Online Full Text: dx.doi.org/
-
Making Pattern- and Model-Based Software Development More RigorousIn: Formal Methods and Software Engineering: 12th International Conference on Formal Engineering Methods / 12th International Conference on Formal Engineering Methods, ICFEM 2010, Shanghai, China, November 17-19, 2010 / Dong, Jin Song; Zhu, Huibiao (Eds.) 2010, pp. 253 - 269Online Full Text: dx.doi.org/
-
Workshop Modellgetriebene Softwarearchitektur - Evolution, Integration und Migration (MSEIM 2009)In: Software Engineering 2009: Workshopband / Fachtagung des GI-Fachbereichs Softwaretechnik, 02. - 06.03.2009 in Kaiserslautern / Münch, Jürgen; Liggesmeyer, Peter (Eds.) 2009, pp. 363 - 366
-
Deriving software architectures from problem descriptionsIn: Software engineering 2009 - Workshopband: Fachtagung des GI-Fachbereichs Softwaretechnik, 02. - 06.03.2009 in Kaiserslautern / 5. Fachtagung des GI-Fachbereichs Softwaretechnik (SE 2009), 02.-06.03.2009, Kaiserslautern / Münch, Jürgen; Liggesmeyer, Peter (Eds.) 2009, pp. 383 - 302
-
A Foundation for Requirements Analysis of Dependable SoftwareIn: Computer Safety, Reliability, and Security: Proceedings / 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009 2009, pp. 311 - 325Online Full Text: dx.doi.org/
-
Workshop Modellgetriebene Softwarearchitektur : Evolution, Integration und Migration (MSEIM 2008)In: Software Engineering 2008: Workshopband ; Fachtagung des GI-Fachbereichs Softwaretechnik ; 18. - 22.02.2008 in München / Software Engineering 2008 ; Fachtagung GI-Fachbereich Softwaretechnik ; 18. - 22.02.2008, München, Germany / Maalej, Walid; Bruegge, Bernd (Eds.) 2008, pp. 173 - 177
-
Workshop Modellgetriebene Softwarearchitektur - Evolution, Integration und MigrationIn: Software Engineering 2008: Fachtagung des GI-Fachbereichs Softwaretechnik ; 18. - 22.02.2008 in München / Software Engineering 2008 ; Fachtagung GI-Fachbereich Softwaretechnik ; 18. - 22.02.2008, München, Germany / Herrmann, Korbinian; Bruegge, Bernd (Eds.) 2008, pp. 285 - 287
-
A Formal Metamodel for Problem FramesIn: Model Driven Engineering Languages and Systems: Proceedings / 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008 / Czarnecki, Krzysztof; Ober, Ileana; Bruel, Jean-Michel; Uhl, Axel; Völter, Markus (Eds.) 2008Online Full Text: dx.doi.org/
-
Using UML Environment Models for Test Case GenerationIn: Software Engineering 2008: Workshopband ; Fachtagung des GI-Fachbereichs Softwaretechnik, 18. - 22.02.2008 in München / Software Engineering 2008 ; Fachtagung GI-Fachbereich Softwaretechnik ; 18. - 22.02.2008, München, Germany / Maalej, Walid; Bruegge, Bernd (Eds.) 2008, pp. 399 - 406
-
Analysis and Component-based Realization of Security RequirementsIn: Third International Conference on Availability, Reliability and Security / Third International Conference on Availability, Reliability and Security, 2008 : ARES 08 ; 4 - 7 March 2008, Barcelona, Spain / Jakoubi, Stefan (Eds.) 2008, pp. 195 - 203Online Full Text: dx.doi.org/
-
A systematic account of problem framesIn: Proceedings of the 12th European Conference on Pattern Languages of Programs: (EuroPLoP'2007 / Schümmer, Till; Hvatum, Lise B. (Eds.) 2008, pp. 749 - 768
-
A Security Engineering Process based on PatternsIn: 18th International Conference on Database and Expert Systems Applications / DEXA 2007; 3-7 Sept. 2007; Regensburg, Germany 2007Online Full Text: dx.doi.org/
-
A Pattern System for Security Requirements EngineeringIn: The Second International Conference on Availability, Reliability and Security: Proceedings / The Second International Conference on Availability, Reliability and Security, 2007 : ARES 2007 ; 10 - 13 April 2007, Vienna, Austria / European Network and Information Security Agency; Technische Universität Wien (Eds.) 2007, pp. 356 - 365Online Full Text: dx.doi.org/
-
Enhancing Dependability of Component-Based SystemsIn: Reliable Software Technologies - Ada Europe 2007: Proceedings / 12th Ada-Europe Intenational Conference on Reliable Software Technologies, Geneva, Switzerland, June 25-29, 2007 / Abdennahder, Nabil; Kordon, Fabrice (Eds.) 2007, pp. 41 - 54Online Full Text: dx.doi.org/
-
Pattern-based Exploration of Design Alternatives for the Evolution of Software ArchitecturesIn: International Journal of Cooperative Information Systems Vol. 16 (2007) Nr. 3-4, pp. 341 - 365Online Full Text: dx.doi.org/
-
Pattern-based Evolution of Software ArchitecturesIn: Software Architecture: First European Conference, ECSA 2007 Madrid, Spain, September 24-26, 2007 Proceedings / First European Conference, ECSA 2007, Madrid, Spain, September 24-26, 2007 / Oquendo, Flavio (Eds.) 2007Online Full Text: dx.doi.org/ Online Full Text
-
A method for component-based software and system developmentIn: 32nd EUROMICRO Conference on Software Engineering and Advanced Applications: Proceedings / SEAA; Cavtat/Dubrovnik; Croatia; 29 August 2006 through 1 September 2006 2006, pp. 72 - 80Online Full Text: dx.doi.org/ (Open Access)
-
Component composition through architectural patterns for problem framesIn: Proceedings of APSEC 2006, XIII Asia Pacific Software Engineering Conference / XIII Asia Pacific Software Engineering Conference; Bangalore; India; 6 - 8 December 2006 / Jalote, Pankaj (Eds.) 2006, pp. 27 - 36Online Full Text: dx.doi.org/
-
Security Engineering Using Problem FramesIn: Emerging Trends in Information and Communication Security: Proceedings / International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006 / Müller, Günter (Eds.) 2006, pp. 238 - 253Online Full Text: dx.doi.org/
-
A Model-Based Development Process for Embedded SystemsIn: Workshop on Model-Based Development of Embedded Systems: Proceedings 2005
-
Problem Frames and Architectures for Security ProblemsIn: Computer Safety, Reliability, and Security: Proceedings / 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005 / Dahll, Gustav; Winther, Rune; Gran, Bjoern Axel (Eds.) 2005, pp. 390 - 404Online Full Text: dx.doi.org/
-
A Problem-Oriented Approach to Common Criteria CertificationIn: Computer Safety, Reliability and Security: Proceedings / 21st International Conference, SAFECOMP 2002 Catania, Italy, September 10–13, 2002 / Anderson, Stuart; Felici, Massimo; Bologna, Sandro (Eds.) 2002, pp. 334 - 346Online Full Text: dx.doi.org/
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2002
Current lectures
No current lectures.
Past lectures (max. 10)
-
2023 WS
-
2023 SS
- Übung zu "Entwicklung sicherer Software"
- Entwicklung sicherer Software
- Übung zu "Muster- und Komponentenbasierte Softwareentwicklung"
- Muster- und Komponentenbasierte Softwareentwicklung
- Softwaretechnik
- Formale Spezifikation von Software-Systemen
- Muster- und komponentenbasierte Software-Entwicklung
- Entwicklung sicherer Software