Author of the publication

ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System.

, , , and . Engineering Secure Future Internet Services and Systems, volume 8431 of Lecture Notes in Computer Science, Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Stølen, Ketil
add a person with the name Stølen, Ketil
 

Other publications of authors with the same name

An Approach to Select Cost-Effective Risk Countermeasures Exemplified in CORAS, , and . CoRR, (2013)Assessing practical usefulness and performance of the PREDIQT method: An industrial case study., , and . Information & Software Technology, 54 (12): 1377-1395 (2012)Shared-state design modulo weak and strong process fairness.. FORTE, volume C-10 of IFIP Transactions, page 479-498. North-Holland, (1992)Employing Key Indicators to Provide a Dynamic Risk Picture with a Notion of Confidence., and . IFIPTM, volume 300 of IFIP Advances in Information and Communication Technology, page 215-233. Springer, (2009)Uncertainty, Subjectivity, Trust and Risk: How It All Fits together., and . STM, volume 7170 of Lecture Notes in Computer Science, page 1-5. Springer, (2011)A case-based assessment of the FLUIDE framework for specifying emergency response user interfaces., and . EICS, page 97-107. ACM, (2016)The coras approach for model-based risk management applied to e-commerce domain., , , and . Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, page 169-181. Kluwer, (2002)A Method for the Development of Totally Correct Shared-State Parallel Programs.. CONCUR, volume 527 of Lecture Notes in Computer Science, page 510-525. Springer, (1991)A Pattern-Based Method for Safe Control Systems Exemplified within Nuclear Power Production., and . SAFECOMP, volume 7612 of Lecture Notes in Computer Science, page 13-24. Springer, (2012)A Systematic Method for Risk-Driven Test Case Design Using Annotated Sequence Diagrams., , and . RISK@ICTSS, volume 8418 of Lecture Notes in Computer Science, page 93-108. Springer, (2013)