Author of the publication

An Extended Ontology for Security Requirements.

, , , , and . CAiSE Workshops, volume 83 of Lecture Notes in Business Information Processing, page 622-636. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nòmos: from Strategic Dependencies to Obligations., , , , and . iStar, volume 766 of CEUR Workshop Proceedings, page 72-77. CEUR-WS.org, (2011)Designing Sociotechnical Systems with Protos., , and . iStar, volume 1157 of CEUR Workshop Proceedings, CEUR-WS.org, (2014)Tutorial on Artificial Intelligence Research.. Workshop on Data Abstraction, Databases and Conceptual Modelling, 11, page 13-18. ACM Press, (1980)A Perspective for Research on Conceptual Modelling.. Workshop on Data Abstraction, Databases and Conceptual Modelling, 11, page 167-170. ACM Press, (1980)Panel on Next Generation Database Systems Won't Work Without Semantics!. SIGMOD Conference, page 497. ACM Press, (1998)SWWS 2007 PC Co-chairs' Message., and . OTM Workshops (2), volume 4806 of Lecture Notes in Computer Science, page 1203. Springer, (2007)Detailing Architectural Design in Requirements Driven Software Development: The Tropos Case., , and . SBES, page 79-94. SBC, (2003)2nd Workshop on Software Techniques for Engineering Cyber Physical Systems., , and . CASCON, page 243-244. ACM, (2022)Engineering Smart Contracts with Symboleo: A Progress Report., , , , , , , , , and 1 other author(s). CASCON, page 235-237. ACM, (2023)A Generic Integration Architecture for Cooperative Information Systems., , , and . CoopIS, page 208-217. IEEE Computer Society, (1996)