Author of the publication

Capturing Security Requirements Using Essential Use Cases (EUCs).

, , , and . APRES, volume 432 of Communications in Computer and Information Science, page 16-30. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Architecture Modelling and Performance Analysis with Argo/MTE., , , and . SEKE, page 276-281. (2004)Ink Features for Diagram Recognition., , , and . SBIM, page 131-138. Eurographics Association, (2007)Inconsistency Management for Multiple-View Software Development Environments, , and . 24 (11): 960-981 (1998)External Requirements of Groupware Development Tools., and . EHCI, volume 150 of IFIP Conference Proceedings, page 363-376. Kluwer, (1998)An Architecture for Efficient, Flexible Enterprise System Integration., , , , and . International Conference on Internet Computing, page 350-356. CSREA Press, (2003)End-user oriented critic specification for domain-specific visual language tools., , , and . ASE, page 297-300. ACM, (2010)Meta tools for implementing domain specific visual languages., and . ASE, page 576. ACM, (2007)A Faceted Taxonomy of Requirements Changes in Agile Contexts., , and . IEEE Trans. Software Eng., 48 (10): 3737-3752 (2022)Graph-Based Optimal Data Caching in Edge Computing., , , , , , , and . ICSOC, volume 11895 of Lecture Notes in Computer Science, page 477-493. Springer, (2019)Web-Enabling an Integrated Health Information System., and . OOIS, page 477-485. Springer, (2001)