Why is Application Reliability an Issue for an Ultra-Reliable 6G Network? | 0 | 0.34 | 2021 |
Ontology-driven evolution of software security | 0 | 0.34 | 2021 |
A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements | 1 | 0.35 | 2020 |
Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings | 0 | 0.34 | 2019 |
Privacy-enhanced system design modeling based on privacy features. | 0 | 0.34 | 2019 |
Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements. | 2 | 0.38 | 2018 |
Model-based discrimination analysis: a position paper. | 0 | 0.34 | 2018 |
Supporting privacy impact assessment by model-based privacy analysis. | 3 | 0.38 | 2018 |
Data Security And Consumer Trust In Fintech Innovation In Germany | 0 | 0.34 | 2018 |
From Secure Business Process Modeling to Design-Level Security Verification | 4 | 0.39 | 2017 |
Information Security Management And The Human Aspect In Organizations | 0 | 0.34 | 2017 |
Model-based privacy and security analysis with CARiSMA | 5 | 0.43 | 2017 |
Model-Based Security Verification and Testing for Smart-cards | 3 | 0.37 | 2011 |
Guiding a general-purpose C verifier to prove cryptographic protocols. | 16 | 0.63 | 2011 |
Towards the secure modelling of OLAP users behaviour | 4 | 0.45 | 2010 |
Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote) | 0 | 0.34 | 2010 |
Model-Driven Development for secure information systems | 16 | 0.68 | 2009 |
The Logical Modularity of Programs | 3 | 0.41 | 2009 |
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects | 2 | 0.35 | 2009 |
Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09) | 0 | 0.34 | 2009 |
Extracting Domain Ontologies from Domain Specific APIs | 23 | 0.95 | 2008 |
Incorporating Database Systems into a Secure Software Development Methodology | 1 | 0.36 | 2008 |
Model-Based Security Engineering of Distributed Information Systems Using UMLsec | 27 | 1.35 | 2007 |
The Reality of Libraries | 5 | 0.58 | 2007 |
Developing Secure Embedded Systems: Pitfalls and How to Avoid Them | 3 | 0.40 | 2007 |
Security Analysis of Crypto-based Java Programs using Automated Theorem Provers | 23 | 1.35 | 2006 |
Cost-Benefit Trade-Off Analysis Using BBN for Aspect-Oriented Risk-Driven Development | 9 | 0.94 | 2005 |
Understanding security goals provided by crypto-protocol implementations | 1 | 0.37 | 2005 |
Introducing Security Aspects with Model Transformations | 9 | 0.63 | 2005 |
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers | 4 | 0.54 | 2005 |
MoDeII: Modeling and Analyzing Time-Constraints | 0 | 0.34 | 2005 |
Model-Based Design and Analysis of Permission-Based Security | 5 | 0.42 | 2005 |