2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) K Beckers, S Faily, SW Lee, N Mead | | 2014 |
2nd International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE 2015) K Beckers, S Faily, SW Lee, N Mead | | 2015 |
A Catalog of Context-Patterns K Beckers, K Beckers Pattern and Security Requirements: Engineering-Based Establishment of …, 2015 | | 2015 |
A catalog of security requirements patterns for the domain of cloud computing systems K Beckers, I Côté, L Goeke Proceedings of the 29th Annual ACM Symposium on Applied Computing, 337-342, 2014 | 36 | 2014 |
A common body of knowledge for engineering secure software and services W Schwittek, H Schmidt, K Beckers, S Eicker, S Faßbender, M Heisel 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 6 | 2012 |
A comprehensive framework for security in engineering projects-based on IEC 62443 M Maidl, D Kröselberg, J Christ, K Beckers 2018 IEEE International Symposium on Software Reliability Engineering …, 2018 | 18 | 2018 |
A foundation for requirements analysis of privacy preserving software K Beckers, M Heisel Multidisciplinary Research and Practice for Information Systems: IFIP WG 8.4 …, 2012 | 11 | 2012 |
A holistic approach to security attack modeling and analysis T Li, J Horkoff, K Beckers, E Paja, J Mylopoulos Proceedings of the Eighth International i* Workshop, 49-54, 2015 | 11 | 2015 |
A light-weight tool for the self-assessment of security compliance in software development–an industry case F Moyón, C Bayr, D Mendez, S Dännart, K Beckers International conference on current trends in theory and practice of …, 2020 | 7 | 2020 |
A lightweight privacy preserving approach for analyzing communication records to prevent voip attacks using toll fraud as an example S Hofbauer, K Beckers, G Quirchmayr, C Sorge 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 10 | 2012 |
A lightweight threat analysis approach intertwining safety and security for the automotive domain J Dürrwang, K Beckers, R Kriesten Computer Safety, Reliability, and Security: 36th International Conference …, 2017 | 45 | 2017 |
A meta-model approach to the fundamentals for a pattern language for context elicitation K Beckers, S Faßbender, M Heisel Proceedings of the 18th European Conference on Pattern Languages of Programs …, 2013 | 14 | 2013 |
A meta-model for context-patterns K Beckers, S Fassbender, M Heisel Proceedings of the 18th European Conference on Pattern Languages of Program …, 2013 | 6 | 2013 |
A meta-pattern and pattern form for context-patterns K Beckers, S Faßbender, M Heisel, S Suppan Proceedings of the 19th European Conference on Pattern Languages of Programs …, 2014 | 5 | 2014 |
A method for re-using existing ITIL processes for creating an ISO 27001 ISMS process applied to a high availability video conferencing cloud scenario K Beckers, S Hofbauer, G Quirchmayr, CC Wills Availability, Reliability, and Security in Information Systems and HCI: IFIP …, 2013 | 6 | 2013 |
A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering … K Beckers, I Côté, S Faßbender, M Heisel, S Hofbauer Requirements Engineering 18, 343-395, 2013 | 81 | 2013 |
A pattern-based method for identifying and analyzing laws K Beckers, S Faßbender, JC Küster, H Schmidt Requirements Engineering: Foundation for Software Quality: 18th …, 2012 | 25 | 2012 |
A privacy preserving approach to call detail records analysis in VoIP systems S Hofbauer, K Beckers, G Quirchmayr 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 3 | 2012 |
A problem-based approach for computer-aided privacy threat identification K Beckers, S Faßbender, M Heisel, R Meis Privacy Technologies and Policy: First Annual Privacy Forum, APF 2012 …, 2014 | 53 | 2014 |
A problem-based threat analysis in compliance with common criteria K Beckers, D Hatebur, M Heisel 2013 International Conference on Availability, Reliability and Security, 111-120, 2013 | 26 | 2013 |