Author of the publication

Use Case Maps for the Capture and Validation of Distributed Systems Requirements.

, , , and . RE, page 44-. IEEE Computer Society, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Immaturity and Potential of Formal Methods: A Personal View.. FIW, page 9-13. IOS Press, (2000)Feature Interaction Filtering with Use Case Maps at Requirements Stage., , , and . FIW, page 163-178. IOS Press, (2000)Derivation of Useful Execution Trees from LOTOS by using an Interpreter., and . FORTE, page 311-325. North-Holland, (1988)Formal Support for Design Techniques: A Timethreads-LOTOS Approach., , , and . FORTE, volume 43 of IFIP Conference Proceedings, page 57-72. Chapman & Hall, (1995)Typing for Conflict Detection in Access Control Policies., , , , and . MCETECH, volume 26 of Lecture Notes in Business Information Processing, page 212-226. Springer, (2009)A Metamodel for Hybrid Access Control Policies., , and . J. Softw., 10 (7): 784-797 (2015)An Introduction to LOTOS: Learning by Examples., , and . Computer Networks and ISDN Systems, 23 (5): 325-342 (1992)Corrigendum: Computer Networks and ISDN Systems 25(1): 99-100 (1992).Specifying telephone systems in LOTOS., and . IEEE Commun. Mag., 31 (8): 38-45 (1993)Dynamic risk-based decision methods for access control systems., , and . Comput. Secur., 31 (4): 447-464 (2012)Configuring Data Flows in the Internet of Things for Security and Privacy Requirements., and . FPS, volume 11358 of Lecture Notes in Computer Science, page 115-130. Springer, (2018)