Author of the publication

Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations.

, , and . REFSQ, volume 6182 of Lecture Notes in Computer Science, page 255-261. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security-Aware Elasticity for NoSQL Databases., , , and . MEDI, volume 9344 of Lecture Notes in Computer Science, page 181-197. Springer, (2015)Cyber-attack path discovery in a dynamic supply chain maritime risk management system., , and . Comput. Stand. Interfaces, (2018)A framework to support alignment of secure software engineering with legal regulations., , and . Softw. Syst. Model., 10 (3): 369-394 (2011)Cyber Security Resilience in Business Informatics: An Exploratory Paper., , and . BIR, volume 398 of Lecture Notes in Business Information Processing, page 53-66. Springer, (2020)Selecting a Cloud Service Provider in the age of cybercrime., and . Comput. Secur., (2013)Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach., , and . Domain-Specific Conceptual Modeling, Springer, (2016)Apparatus: A framework for security analysis in internet of things systems., , , and . Ad Hoc Networks, (2019)Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)., , and . EANN, volume 1000 of Communications in Computer and Information Science, page 476-487. Springer, (2019)Towards the Derivation of Secure Business Process Designs., , and . ER Workshops, volume 9382 of Lecture Notes in Computer Science, page 248-258. Springer, (2015)Supporting Secure Business Process Design via Security Process Patterns., , and . BPMDS/EMMSAD@CAiSE, volume 287 of Lecture Notes in Business Information Processing, page 19-33. Springer, (2017)