Author of the publication

Structured Pattern-Based Security Requirements Elicitation for Clouds.

, , , , and . ARES, page 465-474. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting Common Criteria Security Analysis with Problem Frames., , and . JoWUA, 5 (1): 37-63 (2014)How Accountability is Implemented and Understood in Research Tools - A Systematic Mapping Study., , , and . PROFES, volume 10611 of Lecture Notes in Computer Science, page 199-218. Springer, (2017)A Holistic Approach to Attack Modeling and Analysis., , , , and . iStar, volume 1402 of CEUR Workshop Proceedings, page 49-54. CEUR-WS.org, (2015)Security and Compliance in Clouds., and . ISSE, page 91-100. Vieweg+Teubner, (2010)ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System., , , and . Engineering Secure Future Internet Services and Systems, volume 8431 of Lecture Notes in Computer Science, Springer, (2014)A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier Interface., , , , and . SAFECOMP, volume 9337 of Lecture Notes in Computer Science, page 90-108. Springer, (2015)A Usability Evaluation of the NESSoS Common Body of Knowledge., and . ARES, page 559-568. IEEE Computer Society, (2013)Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing., , , and . ARES, page 327-333. IEEE Computer Society, (2011)Single-message denial-of-service attacks against voice-over-internet protocol terminals., , and . IJESDF, 2 (1): 29-34 (2009)Goal-Based Establishment of an Information Security Management System Compliant to ISO 27001.. SOFSEM, volume 8327 of Lecture Notes in Computer Science, page 102-113. Springer, (2014)