Author of the publication

An Approach to Model-based Development of Secure and Reliable Systems.

, , , and . ARES, page 260-265. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining Objective Process Metrics from Repository Data., and . SEKE, page 514-519. Knowledge Systems Institute Graduate School, (2009)Goal-Directed Design for Proactive and Intelligent Device Collaboration., and . KES, volume 2774 of Lecture Notes in Computer Science, page 841-848. Springer, (2003)A Multi-Dimensional Classification for Users of Security Patterns., , and . WOSIS, page 89-98. INSTICC Press, (2008)Role oriented programming for software evolution.. University of Washington, USA, (1997)Repository mining and Six Sigma for process improvement., , and . ACM SIGSOFT Softw. Eng. Notes, 30 (4): 1-4 (2005)Patterns for WiMax security., and . EuroPLoP, page 707-720. UVK - Universitaetsverlag Konstanz, (2007)A pattern for a sensor node., , , and . PLoP, page 7:1-7:7. ACM, (2010)Eliciting Security Requirements through Misuse Activities., , and . DEXA Workshops, page 328-333. IEEE Computer Society, (2008)Defining Security Requirements Through Misuse Actions., , , and . IFIP Workshop on Advanced Software Engineering, volume 219 of IFIP, page 123-137. Springer, (2006)Using Role Components to Implement Collaboration-Based Designs., and . OOPSLA, page 359-369. ACM, (1996)SIGPLAN Notices 31(10).