Author of the publication

A Tool for Monitoring and Maintaining System Thrustworthiness at Runtime.

, , , , , , , and . REFSQ Workshops, volume 1342 of CEUR Workshop Proceedings, page 142-147. CEUR-WS.org, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evidence-Based Trustworthiness of Internet-Based Services Through Controlled Software Development., , and . CSP Forum, volume 530 of Communications in Computer and Information Science, page 91-102. Springer, (2015)A generic conceptual data model of social media services., , , and . EuroPLoP, page 22:1-22:12. ACM, (2019)Trustworthy Cyber-Physical Systems - A Systematic Framework towards Design and Evaluation of Trust and Trustworthiness. Springer Vieweg, (2019)Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem Diagrams., , , and . ICSOFT (Selected Papers), volume 1077 of Communications in Computer and Information Science, page 150-172. Springer, (2018)A Tool for Monitoring and Maintaining System Thrustworthiness at Runtime., , , , , , , and . REFSQ Workshops, volume 1342 of CEUR Workshop Proceedings, page 142-147. CEUR-WS.org, (2015)Cyber-Physical Systems Design for Runtime Thrustworthiness Maintenance Supported by Tools., , , , , , , and . REFSQ Workshops, volume 1342 of CEUR Workshop Proceedings, page 148-155. CEUR-WS.org, (2015)Assisted Generation of Privacy Policies using Textual Patterns., , , and . ENASE, page 347-358. SCITEPRESS, (2020)Problem-based Derivation of Trustworthiness Requirements from Users' Trust Concerns., , and . PST, page 1-10. IEEE Computer Society, (2018)Privacy Policy Specification Framework for Addressing End-Users' Privacy Requirements., , , and . TrustBus, volume 11711 of Lecture Notes in Computer Science, page 46-62. Springer, (2019)Systematic Asset Identification and Modeling During Requirements Engineering., , and . CRiSIS, volume 12026 of Lecture Notes in Computer Science, page 50-66. Springer, (2019)