Author of the publication

Validating Security Design Patterns Application Using Model Testing.

, , , , , and . ARES, page 62-71. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models., , , , and . SoMeT, volume 286 of Frontiers in Artificial Intelligence and Applications, page 155-166. IOS Press, (2016)Landscape of Architecture and Design Patterns for IoT Systems., , , , , and . IEEE Internet Things J., 7 (10): 10091-10101 (2020)A Tool to Manage Traceability on Several Models and Its Use Case., , , , , , and . KES, volume 176 of Procedia Computer Science, page 1449-1458. Elsevier, (2020)Misuse Cases + Assets + Security Goals., , and . CSE (3), page 424-429. IEEE Computer Society, (2009)Experimental Evaluation of Traceability Checking Tool for Goal Dependency Modeling., , , , , , , and . JCKBSE, volume 19 of Learning and Analytics in Intelligent Systems, page 70-83. Springer, (2020)The design of secure IoT applications using patterns: State of the art and directions for research., , , and . Internet Things, (2021)A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base., , , , , , and . RE Workshops, page 134-140. IEEE, (2019)CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development., , , , , , , , , and 1 other author(s). Int. J. Syst. Softw. Secur. Prot., 12 (2): 68-85 (2021)Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to a Security Model With Cache., , , , , and . IEEE Access, (2019)Efficient secure DevOps using process mining and Attack Defense Trees., and . KES, volume 207 of Procedia Computer Science, page 446-455. Elsevier, (2022)