Author of the publication

Model-based Security Engineering with UML: Managed Co-Evolution of Security Knowledge and Software Models

, , , , and . Foundations of Security Analysis and Desing VII: FOSAD Tutorial Lectures, volume 8604 of Lecture Notes in Computer Science, page 34--53. (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Modelsn, , , , and . Journal of Systems and Software, (2018)Information security management and the human aspect in organizations., and . Inf. Comput. Secur., 25 (5): 494-534 (2017)Ontology-driven evolution of software security., , , and . Data Knowl. Eng., (2021)Developing Secure Systems with UMLsec - From Business Processes to Implementation.. VIS, page 151-161. Vieweg+Teubner Verlag, (2001)Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain., , , , and . ICBC, page 1-5. IEEE, (2022)Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project.. AVoCS, volume 250 of Electronic Notes in Theoretical Computer Science, page 123-136. Elsevier, (2007)Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings., , , , and . MoDELS, page 23-33. IEEE, (2019)Privacy-enhanced system design modeling based on privacy features., , and . SAC, page 1492-1499. ACM, (2019)Seventh international workshop on software engineering for secure systems: (SESS 2011), , and . Proceedings of the 33th International Conference on Software Engineering (ICSE), page 1200--1201. ACM, (2011)Tool Support for Model-Driven Development of Security-Critical Systems with UML., and . Model-Driven Software Development, Springer, (2005)