Inger Anne Tøndel

Orcid: 0000-0001-7599-0342

According to our database1, Inger Anne Tøndel authored at least 65 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Continuous software security through security prioritisation meetings.
J. Syst. Softw., 2022

Influencing the security prioritisation of an agile software development project.
Comput. Secur., 2022

Needs and Challenges Concerning Cyber-risk Assessment in the Cyber-physical Smart Grid.
Proceedings of the 17th International Conference on Software Technologies, 2022

Adapting Cyber-Risk Assessment for the Planning of Cyber-Physical Smart Grids Based on Industrial Needs.
Proceedings of the Software Technologies - 17th International Conference, 2022

SecureScale: Exploring Synergies between Security and Scalability in Software Development and Operation.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

2021
Improving smart grid security through 5G enabled IoT and edge computing.
Concurr. Comput. Pract. Exp., 2021

Hunting Dependencies: Using Bow-Tie for Combined Analysis of Power and Cyber Security.
Proceedings of the 2nd International Conference on Societal Automation, 2021

The Quality Triage Method: Quickly Identifying User Stories with Quality Risks.
Proceedings of the 2nd International Conference on Societal Automation, 2021

Tool-assisted Threat Modeling for Smart Grid Cyber Security.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

2020
Towards a Conceptual Framework for Security Requirements Work in Agile Software Development.
Int. J. Syst. Softw. Secur. Prot., 2020

IT Security Is From Mars, Software Security Is From Venus.
IEEE Secur. Priv., 2020

Using Situational and Narrative Analysis for Investigating the Messiness of Software Security.
Proceedings of the ESEM '20: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2020

Achieving "Good Enough" Software Security: The Role of Objectivity.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

What Could Possibly Go Wrong? Smart Grid Misuse Case Scenarios.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

2019
Collaborative security risk estimation in agile software development.
Inf. Comput. Secur., 2019

The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Accountability Requirements in the Cloud Provider Chain.
Symmetry, 2018

A Secure MANET Routing Protocol for Crisis Situations.
Int. J. Syst. Softw. Secur. Prot., 2018

Security Incident Information Exchange for Cloud Service Provisioning Chains.
Cryptogr., 2018

Understanding challenges to adoption of the Microsoft elevation of privilege game.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Understanding Challenges to Adoption of the Protection Poker Software Security Game.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects.
Proceedings of the 25th Australasian Software Engineering Conference, 2018

2017
Risk Centric Activities in Secure Software Development in Public Organisations.
Int. J. Secur. Softw. Eng., 2017

Facing Uncertainty in Cyber Insurance Policies.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Accountability Requirements for the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

2016
Current practices and challenges in industrial control organizations regarding information security incident management - Does size matter? Information security incident management in large and small industrial control organizations.
Int. J. Crit. Infrastructure Prot., 2016

Playing Protection Poker for Practical Software Security.
Proceedings of the Product-Focused Software Process Improvement, 2016

Security Incident Information Exchange for Cloud Services.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Zebras and Lions: Better Incident Handling Through Improved Cooperation.
Proceedings of the Innovations for Community Services - 16th International Conference, 2016

Differentiating Cyber Risk of Insurance Customers: The Insurance Company Perspective.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
Mitigating Risk with Cyberinsurance.
IEEE Secur. Priv., 2015

Software Security Maturity in Public Organisations.
Proceedings of the Information Security - 18th International Conference, 2015

Assessing Information Security Risks of AMI - What Makes it so Difficult?.
Proceedings of the ICISSP 2015, 2015

How Much Cloud Can You Handle?
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Information security incident management: Current practice as reported in the literature.
Comput. Secur., 2014

Information Security Incident Management: Planning for Failure.
Proceedings of the Eighth International Conference on IT Security Incident Management & IT Forensics, 2014

2013
Forewarned is Forearmed: Indicators for Evaluating Information Security Incident Management.
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013

Towards Improved Understanding and Holistic Management of the Cyber Security Challenges in Power Transmission Systems.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013

GPRS Security for Smart Meters.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013

2012
Threat Modeling of AMI.
Proceedings of the Critical Information Infrastructures Security, 2012

Design and Implementation of a CBR-based Privacy Agent.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Visualization Control for Event-Based Public Display Systems Used in a Hospital Setting.
Proceedings of the Information Security Technology for Applications, 2011

Personal Health Information on Display: Balancing Needs, Usability and Legislative Requirements.
Proceedings of the User Centered Networked Health Care - Proceedings of MIE 2011, 2011

Cyber security challenges in Smart Grids.
Proceedings of the 2nd IEEE PES International Conference and Exhibition on "Innovative Smart Grid Technologies", 2011

Towards a Similarity Metric for Comparing Machine-Readable Privacy Policies.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

Learning Privacy Preferences.
Proceedings of the Sixth International Conference on Availability, 2011

A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Experimental Threat Model Reuse with Misuse Case Diagrams.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Idea: Reusability of Threat Models - Two Approaches with an Experimental Evaluation.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

Combining Misuse Cases with Attack Trees and Security Activity Models.
Proceedings of the ARES 2010, 2010

2009
A framework for incident response management in the petroleum industry.
Int. J. Crit. Infrastructure Prot., 2009

Visualizing Patient Trajectories on Wall-Mounted Boards - Information Security Challenges.
Proceedings of the Medical Informatics in a United and Healthy Europe - Proceedings of MIE 2009, The XXIInd International Congress of the European Federation for Medical Informatics, Sarajevo, Bosnia and Herzegovina, August 30, 2009

Trusting User Defined Context in MANETs: Experience from the MIDAS Approach.
Proceedings of the The Forth International Conference on Availability, 2009

An Architectural Foundation for Security Model Sharing and Reuse.
Proceedings of the The Forth International Conference on Availability, 2009

Reusable Security Requirements for Healthcare Applications.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Security Requirements for the Rest of Us: A Survey.
IEEE Softw., 2008

Learning by Failing (and Fixing).
IEEE Secur. Priv., 2008

Learning from Software Security Testing.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

A Structured Approach to Incident Response Management in the Oil and Gas Industry.
Proceedings of the Critical Information Infrastructure Security, 2008

A Study of Information Security Practice in a Critical Infrastructure Application.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Covering Your Assets in Software Engineering.
Proceedings of the The Third International Conference on Availability, 2008

2007
Handling Consent to Patient Data Access in a Hospital Setting.
Proceedings of the MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics, 2007

How can the developer benefit from security modeling?
Proceedings of the The Second International Conference on Availability, 2007

2006
Improving Availability of Emergency Health Information without Sacrificing Patient Privacy.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets.
Proceedings of the Security and Privacy in Dynamic Environments, 2006


  Loading...