Author of the publication

Security Requirements Elicitation Using Method Weaving and Common Criteria.

, and . MoDELS (Workshops), volume 5421 of Lecture Notes in Computer Science, page 185-196. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models., , , , and . SoMeT, volume 286 of Frontiers in Artificial Intelligence and Applications, page 155-166. IOS Press, (2016)Tool to Automatically Generate a Screen Transition Model Based on a Conceptual Model., , , , and . JCKBSE, page 158-167. Springer, (2018)Requirements Exploration by Comparing and Combining Models of Different Information Systems., , and . JCKBSE, page 64-74. Springer, (2018)Checking Regulatory Compliance of Business Processes and Information Systems., , and . ICSOFT (Selected Papers), volume 50 of Communications in Computer and Information Science, page 71-84. (2009)Quantitative Analysis of Goal Oriented Requirements Models.. JCKBSE, volume 19 of Learning and Analytics in Intelligent Systems, page 1-6. Springer, (2020)Model Transformation Patterns for Introducing Suitable Information Systems., , , , , and . APSEC, page 434-439. IEEE, (2012)Identifying Fundamental Goals from Objects in a Scenario to Facilitate System Introduction., and . COMPSAC (2), page 276-277. IEEE Computer Society, (2017)978-1-5386-0367-3.Structuring utterance records of requirements elicitation meetings based on speech act theory., , , and . ICRE, page 21-30. IEEE Computer Society, (1996)Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application., , , and . RE, page 357-358. IEEE Computer Society, (2003)Improving Software Quality Requirements Specifications Using Spectrum Analysis., and . COMPSAC Workshops, page 379-384. IEEE Computer Society, (2012)