Author of the publication

Aligning Application Architecture to the Business Context.

, , , and . CAiSE, volume 2681 of Lecture Notes in Computer Science, page 209-225. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What you ask is what you get: Understanding architecturally significant functional requirements., , , , and . RE, page 86-95. IEEE Computer Society, (2015)Learning from Accidents: A Systematic Review of Accident Analysis Methods and Models., , , and . IJISCRAM, 10 (3): 42-62 (2018)Automated analysis of security requirements through risk-based argumentation., , , , and . Journal of Systems and Software, (2015)Architecture Alignment., , and . Enterprise Architecture at Work, 4th ed., Springer, (2017)Requirements engineering - frameworks for understanding.. Wiley, (1996)Combining Static and Dynamic Modelling Methods: A Comparison of Four Methods.. Comput. J., 38 (1): 17-30 (1995)An Execution Algorithm for UML Activity Graphs., and . UML, volume 2185 of Lecture Notes in Computer Science, page 47-61. Springer, (2001)Actor-Oriented System Specification with Dynamic Logic., and . TAPSOFT, Vol.2, volume 494 of Lecture Notes in Computer Science, page 337-357. Springer, (1991)Towards self-configuration and management of e-service provisioning in dynamic value constellations., , , and . SAC, page 566-571. ACM, (2008)CRAC: Confidentiality risk assessment and IT-infrastructure comparison., , , and . CNSM, page 322-325. IEEE, (2010)