Follow
Kristian Beckers
Title
Cited by
Year
2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)
K Beckers, S Faily, SW Lee, N Mead
2014
2nd International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE 2015)
K Beckers, S Faily, SW Lee, N Mead
2015
A Catalog of Context-Patterns
K Beckers, K Beckers
Pattern and Security Requirements: Engineering-Based Establishment of …, 2015
2015
A catalog of security requirements patterns for the domain of cloud computing systems
K Beckers, I Côté, L Goeke
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 337-342, 2014
362014
A common body of knowledge for engineering secure software and services
W Schwittek, H Schmidt, K Beckers, S Eicker, S Faßbender, M Heisel
2012 Seventh International Conference on Availability, Reliability and …, 2012
62012
A comprehensive framework for security in engineering projects-based on IEC 62443
M Maidl, D Kröselberg, J Christ, K Beckers
2018 IEEE International Symposium on Software Reliability Engineering …, 2018
182018
A foundation for requirements analysis of privacy preserving software
K Beckers, M Heisel
Multidisciplinary Research and Practice for Information Systems: IFIP WG 8.4 …, 2012
112012
A holistic approach to security attack modeling and analysis
T Li, J Horkoff, K Beckers, E Paja, J Mylopoulos
Proceedings of the Eighth International i* Workshop, 49-54, 2015
112015
A light-weight tool for the self-assessment of security compliance in software development–an industry case
F Moyón, C Bayr, D Mendez, S Dännart, K Beckers
International conference on current trends in theory and practice of …, 2020
72020
A lightweight privacy preserving approach for analyzing communication records to prevent voip attacks using toll fraud as an example
S Hofbauer, K Beckers, G Quirchmayr, C Sorge
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
102012
A lightweight threat analysis approach intertwining safety and security for the automotive domain
J Dürrwang, K Beckers, R Kriesten
Computer Safety, Reliability, and Security: 36th International Conference …, 2017
452017
A meta-model approach to the fundamentals for a pattern language for context elicitation
K Beckers, S Faßbender, M Heisel
Proceedings of the 18th European Conference on Pattern Languages of Programs …, 2013
142013
A meta-model for context-patterns
K Beckers, S Fassbender, M Heisel
Proceedings of the 18th European Conference on Pattern Languages of Program …, 2013
62013
A meta-pattern and pattern form for context-patterns
K Beckers, S Faßbender, M Heisel, S Suppan
Proceedings of the 19th European Conference on Pattern Languages of Programs …, 2014
52014
A method for re-using existing ITIL processes for creating an ISO 27001 ISMS process applied to a high availability video conferencing cloud scenario
K Beckers, S Hofbauer, G Quirchmayr, CC Wills
Availability, Reliability, and Security in Information Systems and HCI: IFIP …, 2013
62013
A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering …
K Beckers, I Côté, S Faßbender, M Heisel, S Hofbauer
Requirements Engineering 18, 343-395, 2013
812013
A pattern-based method for identifying and analyzing laws
K Beckers, S Faßbender, JC Küster, H Schmidt
Requirements Engineering: Foundation for Software Quality: 18th …, 2012
252012
A privacy preserving approach to call detail records analysis in VoIP systems
S Hofbauer, K Beckers, G Quirchmayr
2012 Seventh International Conference on Availability, Reliability and …, 2012
32012
A problem-based approach for computer-aided privacy threat identification
K Beckers, S Faßbender, M Heisel, R Meis
Privacy Technologies and Policy: First Annual Privacy Forum, APF 2012 …, 2014
532014
A problem-based threat analysis in compliance with common criteria
K Beckers, D Hatebur, M Heisel
2013 International Conference on Availability, Reliability and Security, 111-120, 2013
262013
The system can't perform the operation now. Try again later.
Articles 1–20