Author of the publication

Modelling and reasoning about security requirements in socio-technical systems.

, , and . Data Knowl. Eng., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A data-driven, goal-oriented framework for process-focused enterprise re-engineering., , , and . Inf. Syst. E Bus. Manag., 19 (2): 683-747 (2021)A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study., , , , , , and . Visual Privacy Management, volume 12030 of Lecture Notes in Computer Science, Springer, (2020)Security attack analysis using attack patterns., , , , and . RCIS, page 1-13. IEEE, (2016)The Importance of Teaching Systematic Analysis for Conceptual Models: An Experience Report., , and . ER Workshops, volume 9382 of Lecture Notes in Computer Science, page 347-357. Springer, (2015)Goal-oriented requirements engineering: an extended systematic mapping study., , , , , , , , , and . Requir. Eng., 24 (2): 133-160 (2019)Trust-based specification of sociotechnical systems., , and . Data Knowl. Eng., (2013)PACAS: A Gamified Platform for Participatory Change Management in ATM Systems., , , and . REFSQ Workshops, volume 2075 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Consent Verification Under Evolving Privacy Policies., , , and . RE, page 422-427. IEEE, (2019)Consent verification monitoring., , , and . CoRR, (2022)Modeling Design Patterns with Description Logics: A Case Study., , and . CAiSE, volume 6741 of Lecture Notes in Computer Science, page 169-183. Springer, (2011)