Author of the publication

ARM: Actor Relationship Matrix.

, , and . JCKBSE, volume 180 of Frontiers in Artificial Intelligence and Applications, page 423-426. IOS Press, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fingerprint Authentication System for Smart Cards., , and . I3E, volume 202 of IFIP Conference Proceedings, page 97-112. Kluwer, (2001)Mobile Security Assurance for Automotive Software Through ArchiMate., , and . MobiSec, volume 797 of Communications in Computer and Information Science, page 10-20. Springer, (2016)Integrating Mobile IT/Cloud into Enterprise Architecture: a Comparative Analysis., , and . PACIS, page 4. (2016)Argument Algebra: A Formalization of Assurance Case Development.. JCKBSE, volume 466 of Communications in Computer and Information Science, page 717-725. Springer, (2014)e-Healthcare Service Design Using Model Based Jobs Theory., , and . IIMSS, volume 98 of Smart Innovation, Systems and Technologies, page 198-207. Springer, (2018)Evaluation and introduction of the structured methodology and a CASE tool., , , and . J. Syst. Softw., 28 (1): 49-58 (1995)A system theoretic assurance case review., and . ICCSE, page 992-996. IEEE, (2016)An Evaluation of Argument Patterns Based on Data Flow.. ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 432-437. Springer, (2014)A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process., and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 457-464. Springer, (2013)Deriving Successful Factors for Practical AI System Development Projects Using Assurance Case., , and . JCKBSE, page 22-32. Springer, (2018)