Author of the publication

Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods.

, , , and . CD-ARES, volume 8127 of Lecture Notes in Computer Science, page 178-194. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An experiment on comparing textual vs. visual industrial methods for security risk assessment., , , and . EmpiRE, page 28-35. IEEE Computer Society, (2014)Formal Modelling of Data Integration Systems Security Policies., , , , and . Data Science and Engineering, 1 (3): 139-148 (2016)An Access-Control Framework for WS-BPEL., , and . Int. J. Web Service Res., 5 (3): 20-43 (2008)Group-Based Negotiations in P2P Systems., , , , and . IEEE Trans. Parallel Distrib. Syst., 21 (10): 1473-1486 (2010)Collective privacy management in social networks., , and . WWW, page 521-530. ACM, (2009)Assessing a requirements evolution approach: Empirical studies in the Air Traffic Management domain., , , , and . EmpiRE, page 49-56. IEEE Computer Society, (2012)Security triage: an industrial case study on the effectiveness of a lean methodology to identify security requirements., , , , , and . ESEM, page 24:1-24:8. ACM, (2014)Security for Web Services and Service-Oriented Architectures., , , and . Springer, (2010)The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals., , , , and . REFSQ, volume 9013 of Lecture Notes in Computer Science, page 98-114. Springer, (2015)Privacy-preserving Digital Identity Management for Cloud Computing., , , and . IEEE Data Eng. Bull., 32 (1): 21-27 (2009)