Author of the publication

Validating Security Design Patterns Application Using Model Testing.

, , , , , and . ARES, page 62-71. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Checking Regulatory Compliance of Business Processes and Information Systems., , and . ICSOFT (Selected Papers), volume 50 of Communications in Computer and Information Science, page 71-84. (2009)Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models., , , , and . SoMeT, volume 286 of Frontiers in Artificial Intelligence and Applications, page 155-166. IOS Press, (2016)Quantitative Analysis of Goal Oriented Requirements Models.. JCKBSE, volume 19 of Learning and Analytics in Intelligent Systems, page 1-6. Springer, (2020)Tool to Automatically Generate a Screen Transition Model Based on a Conceptual Model., , , , and . JCKBSE, page 158-167. Springer, (2018)Requirements Exploration by Comparing and Combining Models of Different Information Systems., , and . JCKBSE, page 64-74. Springer, (2018)Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment., , , and . Int. J. Secur. Softw. Eng., 4 (3): 42-63 (2013)VDM over PSP: A Pilot Course for VDM Beginners to Confirm its Suitability for Their Development., , and . COMPSAC, page 327-. IEEE Computer Society, (2003)Model Transformation Patterns for Introducing Suitable Information Systems., , , , , and . APSEC, page 434-439. IEEE, (2012)A Tool to Manage Traceability on Several Models and Its Use Case., , , , , , and . KES, volume 176 of Procedia Computer Science, page 1449-1458. Elsevier, (2020)A Proposal to Find Mutually Contributable Business or Life Activities Using Conformance Checking., , , , , and . KES, volume 207 of Procedia Computer Science, page 542-551. Elsevier, (2022)