Bjørnar Solhaug

According to our database1, Bjørnar Solhaug authored at least 28 papers between 2005 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Cyber-Risk Management
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-23570-7, 2015

Security risk analysis of system changes exemplified within the oil and gas domain.
Int. J. Softw. Tools Technol. Transf., 2015

Mitigating Risk with Cyberinsurance.
IEEE Secur. Priv., 2015

2014
Divide and Conquer - Towards a Notion of Risk Model Encapsulation.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Model-driven risk analysis of evolving critical infrastructures.
J. Ambient Intell. Humaniz. Comput., 2014

Evolution of Security Engineering Artifacts: A State of the Art Survey.
Int. J. Secur. Softw. Eng., 2014

EMFASE - An Empirical Framework for Security Design and Economic Trade-off.
Proceedings of the Ninth International Conference on Availability, 2014

2013
An Approach to Select Cost-Effective Risk Countermeasures Exemplified in CORAS
CoRR, 2013

Elicitation of Quality Characteristics for AAL Systems and Services.
Proceedings of the Ambient Intelligence - Software and Applications, 2013

An Approach to Select Cost-Effective Risk Countermeasures.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Beyond Traceability: Compared Approaches to Consistent Security Risk Assessments.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Assessing practical usefulness and performance of the PREDIQT method: An industrial case study.
Inf. Softw. Technol., 2012

Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Preservation of Policy Adherence under Refinement.
Int. J. Softw. Informatics, 2011

Uncertainty, Subjectivity, Trust and Risk: How It All Fits together.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

Evolutionary Risk Analysis: Expert Judgement.
Proceedings of the Computer Safety, Reliability, and Security, 2011

Risk Analysis of Changing and Evolving Systems Using CORAS.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

Model-Driven Risk Analysis - The CORAS Approach.
Springer, ISBN: 978-3-642-12322-1, 2011

2010
Evolution in Relation to Risk and Trust Management.
Computer, 2010

2009
Adherence preserving refinement of trace-set properties in STAIRS: exemplified for information flow properties and policies.
Softw. Syst. Model., 2009

2008
A UML-based Method for the Development of Policies to Support Trust Management.
Proceedings of the Trust Management II, 2008

Compositional Refinement of Policies in UML - Exemplified for Access Control.
Proceedings of the Computer Security, 2008

2007
Specifying Policies Using UML Sequence Diagrams - An Evaluation Based on a Case Study.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

2005
Semantics for multi-agent only knowing: extended abstract.
Proceedings of the 10th Conference on Theoretical Aspects of Rationality and Knowledge (TARK-2005), 2005

Logical Spaces in Multi-agent Only Knowing Systems.
Proceedings of the Computational Logic in Multi-Agent Systems, 6th International Workshop, 2005


  Loading...