-
1
-
-
34547449378
-
-
Brændeland, G. and K. Stølen, Using model-based security analysis in component-oriented system development, in: Proceedings of Quality of Protection (QoP) (2006), pp. 11-18
-
Brændeland, G. and K. Stølen, Using model-based security analysis in component-oriented system development, in: Proceedings of Quality of Protection (QoP) (2006), pp. 11-18
-
-
-
-
3
-
-
20444393153
-
Experiences from using the CORAS methodology to analyze a web application
-
den Braber F., Mildal A.B., Nes J., Stølen K., and Vraalsen F. Experiences from using the CORAS methodology to analyze a web application. Journal of Cases in Information Technology 7 (2005) 110-130
-
(2005)
Journal of Cases in Information Technology
, vol.7
, pp. 110-130
-
-
den Braber, F.1
Mildal, A.B.2
Nes, J.3
Stølen, K.4
Vraalsen, F.5
-
5
-
-
35048841167
-
Requirements engineering meets trust management: Model, methodology, and reasoning
-
Trust Management
-
Giorgini P., Massacci F., Mylopoulos J., and Zannone N. Requirements engineering meets trust management: Model, methodology, and reasoning. Trust Management. LNCS 2995 (2004) 176-190
-
(2004)
LNCS
, vol.2995
, pp. 176-190
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
8
-
-
84858658369
-
Probabilistic logic under uncertainty
-
Thirteenth Computing: The Australasian Theory Symposium. (CATS2007)
-
Jøsang A. Probabilistic logic under uncertainty. Thirteenth Computing: The Australasian Theory Symposium. (CATS2007). Conferences in Research and Practice in Information Technology (CRPIT) 65 (2007) 101-110
-
(2007)
Conferences in Research and Practice in Information Technology (CRPIT)
, vol.65
, pp. 101-110
-
-
Jøsang, A.1
-
10
-
-
24944524211
-
Can we manage trust?
-
Trust Management
-
Jøsang A., Keser C., and Dimitrakos T. Can we manage trust?. Trust Management. LNCS 3477 (2005) 93-107
-
(2005)
LNCS
, vol.3477
, pp. 93-107
-
-
Jøsang, A.1
Keser, C.2
Dimitrakos, T.3
-
11
-
-
39349102621
-
-
Lysemose, T., T. Mahler, B. Solhaug, J. Bing, D. Elgesem and K. Stølen, ENFORCE conceptual framework, Technical Report A1209, SINTEF ICT (2007)
-
Lysemose, T., T. Mahler, B. Solhaug, J. Bing, D. Elgesem and K. Stølen, ENFORCE conceptual framework, Technical Report A1209, SINTEF ICT (2007)
-
-
-
-
12
-
-
39349109932
-
-
Object Management Group, "UML 2.1 Superstructure Specification," Document: ptc/06-04-02 edition (2006)
-
Object Management Group, "UML 2.1 Superstructure Specification," Document: ptc/06-04-02 edition (2006)
-
-
-
-
13
-
-
33745443561
-
Specification and refinement of soft real-time requirements using sequence diagrams
-
Proceedings of Formal Modeling and Analysis of Timed Systems. (FORMATS)
-
Refsdal A., Husa K.E., and Stølen K. Specification and refinement of soft real-time requirements using sequence diagrams. Proceedings of Formal Modeling and Analysis of Timed Systems. (FORMATS). LNCS 3829 (2005) 32-48
-
(2005)
LNCS
, vol.3829
, pp. 32-48
-
-
Refsdal, A.1
Husa, K.E.2
Stølen, K.3
-
14
-
-
33746216413
-
Underspecification, inherent nondeterminism and probability in sequence diagrams
-
Proceedings of Formal Methods for Open Object-Based Distributed Systems. (FMOODS)
-
Refsdal A., Runde R.K., and Stølen K. Underspecification, inherent nondeterminism and probability in sequence diagrams. Proceedings of Formal Methods for Open Object-Based Distributed Systems. (FMOODS). LNCS 4037 (2006) 138-155
-
(2006)
LNCS
, vol.4037
, pp. 138-155
-
-
Refsdal, A.1
Runde, R.K.2
Stølen, K.3
-
15
-
-
33746187762
-
Refining UML interactions with underspecification and nondeterminism
-
Runde R., Haugen Ø., and Stølen K. Refining UML interactions with underspecification and nondeterminism. Nordic Journal of Computing 12 2 (2005) 157-188
-
(2005)
Nordic Journal of Computing
, vol.12
, Issue.2
, pp. 157-188
-
-
Runde, R.1
Haugen, Ø.2
Stølen, K.3
-
16
-
-
84864556649
-
Experiences from using model-based risk assessment to evaluate the security of a telemedicine application
-
(TICD)
-
Stamatiou Y.C., Henriksen E., Lund M.S., Mantzouranis E., Psarros M., Skipenes E., Stathiakis N., and Stølen K. Experiences from using model-based risk assessment to evaluate the security of a telemedicine application. Proceedings of Telemedicine in Care Delivery. (TICD) (2002) 115-119
-
(2002)
Proceedings of Telemedicine in Care Delivery
, pp. 115-119
-
-
Stamatiou, Y.C.1
Henriksen, E.2
Lund, M.S.3
Mantzouranis, E.4
Psarros, M.5
Skipenes, E.6
Stathiakis, N.7
Stølen, K.8
|