Risk-Based Elicitation of Security Requirements According to the ISO 27005 Standard. | 0 | 0.34 | 2018 |
Evaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case Study. | 0 | 0.34 | 2016 |
The FLUIDE Framework for Specifying Emergency Response User Interfaces Employed to a Search and Rescue Case. | 2 | 0.39 | 2016 |
Design Decisions In The Development Of A Graphical Language For Risk-Driven Security Testing | 0 | 0.34 | 2016 |
A case-based assessment of the FLUIDE framework for specifying emergency response user interfaces. | 0 | 0.34 | 2016 |
Stepwise refinement of sequence diagrams with soft real-time constraints | 0 | 0.34 | 2015 |
Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies | 0 | 0.34 | 2015 |
Security risk analysis of system changes exemplified within the oil and gas domain | 1 | 0.36 | 2015 |
Approaches for the combined use of risk analysis and testing: a systematic literature review | 11 | 0.49 | 2014 |
Schematic Generation of English-Prose Semantics for a Risk Analysis Language Based on UML Interactions | 0 | 0.34 | 2014 |
A Systematic Method For Risk-Driven Test Case Design Using Annotated Sequence Diagrams | 2 | 0.48 | 2013 |
An approach to select cost-effective risk countermeasures | 3 | 0.52 | 2013 |
Relating computer systems to sequence diagrams: the impact of underspecification and inherent nondeterminism. | 2 | 0.37 | 2013 |
An Approach to Select Cost-Effective Risk Countermeasures Exemplified in CORAS | 3 | 0.59 | 2013 |
A pattern-based method for safe control systems exemplified within nuclear power production | 8 | 0.74 | 2012 |
Assessing practical usefulness and performance of the PREDIQT method: An industrial case study | 3 | 0.48 | 2012 |
Generic functionality in user interfaces for emergency response | 9 | 0.97 | 2011 |
An architectural pattern for enterprise level monitoring tools | 3 | 0.42 | 2011 |
An evaluation of the graphical modeling framework (GMF) based on the development of the CORAS tool | 7 | 0.80 | 2011 |
Experiences from Using Indicators to Validate Expert Judgments in Security Risk Analysis | 0 | 0.34 | 2011 |
A Denotational Model for Component-Based Risk Analysis. | 1 | 0.48 | 2011 |
Preservation of Policy Adherence under Refinement. | 2 | 0.41 | 2011 |
Towards Patterns For Handling Safety Critical Adaptive Control Software | 0 | 0.34 | 2011 |
Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study | 1 | 0.40 | 2011 |
Risk analysis of changing and evolving systems using CORAS | 13 | 1.41 | 2011 |
Uncertainty, subjectivity, trust and risk: how it all fits together | 3 | 0.49 | 2011 |
SACS: a pattern language for safe adaptive control software. | 2 | 0.40 | 2011 |
Evolution in Relation to Risk and Trust Management | 15 | 1.85 | 2010 |
Experiences from using a UML-based method for trust analysis in an industrial project on electronic procurement | 1 | 0.38 | 2010 |
Modular analysis and modelling of risk scenarios with dependencies | 9 | 0.87 | 2010 |
Idea: a feasibility study in model based prediction of impact of changes on system quality | 4 | 0.51 | 2010 |
Ad Hoc Networks and Mobile Devices in Emergency Response - A Perfect Match? - (Invited Paper) | 4 | 0.45 | 2010 |
Simplifying Parametrization of Bayesian Networks in Prediction of System Quality | 1 | 0.40 | 2009 |
Employing Key Indicators to Provide a Dynamic Risk Picture with a Notion of Confidence | 7 | 0.70 | 2009 |
Adherence preserving refinement of trace-set properties in STAIRS: exemplified for information flow properties and policies | 3 | 0.38 | 2009 |
A Transformational Approach to Facilitate Monitoring of High-Level Policies | 2 | 0.37 | 2008 |
Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008 | 10 | 2.57 | 2008 |
Compositional Refinement of Policies in UML --- Exemplified for Access Control | 4 | 0.43 | 2008 |
A UML-based Method for the Development of Policies to Support Trust Management. | 5 | 1.15 | 2008 |
Extending UML sequence diagrams to model trust-dependent behavior with the aim to support risk analysis | 5 | 0.54 | 2008 |
Using dependent CORAS diagrams to analyse mutual dependency | 5 | 0.63 | 2007 |
Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007 | 12 | 1.65 | 2007 |
Specifying Policies Using UML Sequence Diagrams--An Evaluation Based on a Case Study | 4 | 0.42 | 2007 |
Semantics of UML models for dynamic behavior: a survey of different approaches | 1 | 0.36 | 2007 |
Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings | 36 | 3.92 | 2006 |
Information flow property preserving transformation of UML interaction diagrams | 6 | 0.44 | 2006 |
Underspecification, inherent nondeterminism and probability in sequence diagrams | 8 | 0.59 | 2006 |
Using model-based security analysis in component-oriented system development | 6 | 0.63 | 2006 |
A semantic paradigm for component-based specification integrating a notion of security risk | 0 | 0.34 | 2006 |
Deriving tests from UML 2.0 sequence diagrams with neg and assert | 10 | 0.64 | 2006 |