Ketil Stølen

According to our database1, Ketil Stølen authored at least 101 papers between 1991 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Privacy-Aware IoT: State-of-the-Art and Challenges.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Technology Research Explained - Design of Software, Architectures, Methods, and Technology in General
Springer, ISBN: 978-3-031-25816-9, 2023

2018
Problem-based Elicitation of Security Requirements - The ProCOR Method.
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 2018

Risk-Based Elicitation of Security Requirements According to the ISO 27005 Standard.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2018

2016
Design Decisions in the Development of a Graphical Language for Risk-Driven Security Testing.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016

The FLUIDE Framework for Specifying Emergency Response User Interfaces Employed to a Search and Rescue Case.
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016

Evaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case Study.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

A case-based assessment of the FLUIDE framework for specifying emergency response user interfaces.
Proceedings of the 8th ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2016

Mandatory and Potential Choice: Comparing Event-B and STAIRS.
Proceedings of the From Action Systems to Distributed Systems - The Refinement Approach., 2016

2015
Cyber-Risk Management
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-23570-7, 2015

Security risk analysis of system changes exemplified within the oil and gas domain.
Int. J. Softw. Tools Technol. Transf., 2015

Stepwise refinement of sequence diagrams with soft real-time constraints.
J. Comput. Syst. Sci., 2015

Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies.
Int. J. Secur. Softw. Eng., 2015

2014
Divide and Conquer - Towards a Notion of Risk Model Encapsulation.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Approaches for the combined use of risk analysis and testing: a systematic literature review.
Int. J. Softw. Tools Technol. Transf., 2014

Schematic Generation of English-Prose Semantics for a Risk Analysis Language Based on UML Interactions.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

2013
Relating computer systems to sequence diagrams: the impact of underspecification and inherent nondeterminism.
Formal Aspects Comput., 2013

An Approach to Select Cost-Effective Risk Countermeasures Exemplified in CORAS
CoRR, 2013

A Systematic Method for Risk-Driven Test Case Design Using Annotated Sequence Diagrams.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

An Approach to Select Cost-Effective Risk Countermeasures.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2012
Assessing practical usefulness and performance of the PREDIQT method: An industrial case study.
Inf. Softw. Technol., 2012

A Pattern-Based Method for Safe Control Systems Exemplified within Nuclear Power Production.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Geographic Visualization of Risk as Decision Support in Emergency Situations.
Proceedings of the 2012 5th International Conference on Human System Interactions, 2012

2011
Preservation of Policy Adherence under Refinement.
Int. J. Softw. Informatics, 2011

Uncertainty, Subjectivity, Trust and Risk: How It All Fits together.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

SACS: a pattern language for safe adaptive control software.
Proceedings of the 18th Conference on Pattern Languages of Programs, 2011

Generic functionality in user interfaces for emergency response.
Proceedings of the Annual Meeting of the Australian Special Interest Group for Computer Human Interaction, OzCHI '11, Canberra, Australia, November 28, 2011

An architectural pattern for enterprise level monitoring tools.
Proceedings of the 5th IEEE International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems, 2011

An Evaluation of the Graphical Modeling Framework (GMF) Based on the Development of the CORAS Tool.
Proceedings of the Theory and Practice of Model Transformations, 2011

Towards Patterns for Handling Safety Critical Adaptive Control Software.
Proceedings of the ICINCO 2011 - Proceedings of the 8th International Conference on Informatics in Control, Automation and Robotics, Volume 1, Noordwijkerhout, The Netherlands, 28, 2011

Risk Analysis of Changing and Evolving Systems Using CORAS.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

A Denotational Model for Component-Based Risk Analysis.
Proceedings of the Formal Aspects of Component Software - 8th International Symposium, 2011

Experiences from Using Indicators to Validate Expert Judgments in Security Risk Analysis.
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011

Model-Driven Risk Analysis - The CORAS Approach.
Springer, ISBN: 978-3-642-12322-1, 2011

2010
Modular analysis and modelling of risk scenarios with dependencies.
J. Syst. Softw., 2010

Experiences from using a UML-based method for trust analysis in an industrial project on electronic procurement.
Electron. Commer. Res., 2010

Evolution in Relation to Risk and Trust Management.
Computer, 2010

Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

Ad Hoc Networks and Mobile Devices in Emergency Response - A Perfect Match? - (Invited Paper).
Proceedings of the Ad Hoc Networks - Second International Conference, 2010

2009
Adherence preserving refinement of trace-set properties in STAIRS: exemplified for information flow properties and policies.
Softw. Syst. Model., 2009

Information flow security, abstraction and composition.
IET Inf. Secur., 2009

Simplifying Parametrization of Bayesian Networks in Prediction of System Quality.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Employing Key Indicators to Provide a Dynamic Risk Picture with a Notion of Confidence.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

2008
A Transformational Approach to Facilitate Monitoring of High-Level Policies.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

A UML-based Method for the Development of Policies to Support Trust Management.
Proceedings of the Trust Management II, 2008

Compositional Refinement of Policies in UML - Exemplified for Access Control.
Proceedings of the Computer Security, 2008

2007
Extending UML Sequence Diagrams to Model Trust-dependent Behavior With the Aim to Support Risk Analysis.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007

Specifying Policies Using UML Sequence Diagrams - An Evaluation Based on a Case Study.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Semantics of UML Models for Dynamic Behavior - A Survey of Different Approaches.
Proceedings of the Model-Based Engineering of Embedded Real-Time Systems, 2007

Using Dependent CORAS Diagrams to Analyse Mutual Dependency.
Proceedings of the Critical Information Infrastructures Security, 2007

2006
Information flow property preserving transformation of UML interaction diagrams.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

A Graphical Approach to Risk Identification, Motivated by Empirical Investigations.
Proceedings of the Model Driven Engineering Languages and Systems, 2006

Maintaining Information Flow Security Under Refinement and Transformation.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

The TrustCoM Approach to Enforcing Agreements between Interoperating Enterprises.
Proceedings of the Enterprise Interoperability, 2006

Deriving Tests from UML 2.0 Sequence Diagrams with neg and assert.
Proceedings of the 2006 International Workshop on Automation of Software Test, 2006

Underspecification, Inherent Nondeterminism and Probability in Sequence Diagrams.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2006

A Fully General Operational Semantics for UML 2.0 Sequence Diagrams with Potential and Mandatory Choice.
Proceedings of the FM 2006: Formal Methods, 2006

Using model-based security analysis in component-oriented system development.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

2005
STAIRS towards formal design with sequence diagrams.
Softw. Syst. Model., 2005

Refining UML Interactions with Underspecification and Nondeterminism.
Nord. J. Comput., 2005

Experiences from Using the CORAS Methodology to Analyze a Web Application.
J. Cases Inf. Technol., 2005

On the Comprehension of Security Risk Scenarios.
Proceedings of the 13th International Workshop on Program Comprehension (IWPC 2005), 2005

Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language.
Proceedings of the Trust Management, Third International Conference, 2005

The CORAS Tool for Security Risk Analysis.
Proceedings of the Trust Management, Third International Conference, 2005

Risk analysis terminology for IT-systems: does it match intuition?
Proceedings of the 2005 International Symposium on Empirical Software Engineering (ISESE 2005), 2005

Graphical Specification of Dynamic Network Structure.
Proceedings of the ICEIS 2005, 2005

Specification and Refinement of Soft Real-Time Requirements Using Sequence Diagrams.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2005

The Pragmatics of STAIRS.
Proceedings of the Formal Methods for Components and Objects, 4th International Symposium, 2005

Integrating Security in the Development Process with UML.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
Using Risk Analysis to Assess User Trust: A Net-Bank Scenario.
Proceedings of the Trust Management, Second International Conference, 2004

2003
STAIRS - Steps to Analyze Interactions with Refinement Semantics.
Proceedings of the «UML» 2003, 2003

The CORAS approach for model-based risk management applied to a telemedicine service.
Proceedings of the New Navigators: from Professionals to Patients, 2003

Why Timed Sequence Diagrams Require Three-Event Semantics.
Proceedings of the Scenarios: Models, 2003

Maintaining Results from Security Assessment.
Proceedings of the 7th European Conference on Software Maintenance and Reengineering (CSMR 2003), 2003

2002
The CORAS Framework for a Model-Based Risk Management Process.
Proceedings of the Computer Safety, 2002

Integrating Model-based Security Risk Management into eBusiness Systems Development: The CORAS Approach.
Proceedings of the Towards The Knowledge Society: eCommerce, 2002

Model Based Security Risk Analysis for Web Applications.
Proceedings of the Web and the Grid: from e-science to e-business. EuroWeb 2002 Conference, 2002

Model-Based Risk Assessment to Improve Enterprise Security.
Proceedings of the 6th International Enterprise Distributed Object Computing Conference (EDOC 2002), 2002

The coras approach for model-based risk management applied to e-commerce domain.
Proceedings of the Advanced Communications and Multimedia Security, 2002

2001
Specification and Development of Interactive Systems - Focus on Streams, Interfaces, and Refinement
Monographs in Computer Science, Springer, ISBN: 978-1-4613-0091-5, 2001

Stream-Based Specification of Mobile Systems.
Formal Aspects Comput., 2001

2000
Experience from Using MSC, UML and SDL in the Development of the FAME Communication Manager.
Proceedings of the SAM 2000, 2000

1999
Specification of Dynamic Reconfiguration in the Context of Input/Output Relations.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 1999

1998
An Exercise in Conditional Refinement.
Proceedings of the Prospects for Hardware Foundations, ESPRIT Working Group 8533, NADA, 1998

1996
Refinement Principles Supporting the Transition from Asynchronous to Synchronous Communication.
Sci. Comput. Program., 1996

Specification and Refinement of Networks of Asynchronously Communicating Agents Using the Assumption/Commitment Paradigm.
Formal Aspects Comput., 1996

Assumption/Commitment Rules for Dataflow Networks - With an Emphasis on Completeness.
Proceedings of the Programming Languages and Systems, 1996

A Model for Mobile Point-to-Point Data-flow Networks without Channel Sharing.
Proceedings of the Algebraic Methodology and Software Technology, 1996

1995
A Refinement Relation Supporting the Transition from Unbounded to Bounded Communication Buffers.
Proceedings of the Mathematics of Program Construction, 1995

1994
Specification and Refinement of Finite Dataflow Networks - a Relational Approach.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, Third International Symposium Organized Jointly with the Working Group Provably Correct Systems, 1994

An attempt to embed a restricted version of SDL as a target language in Focus.
Proceedings of the Formal Description Techniques VII, 1994

Using Relations to Solve the RPC-Memory Specification Problem.
Proceedings of the Formal Systems Specification, 1994

1993
Development of a distributed min max component
Forschungsberichte, TU Munich, 1993

Assumption, commitment rules for networks of asynchronously communicating agents
Forschungsberichte, TU Munich, 1993

1992
Proving Total Correctness with Respect to a Fair (Shared-State) Parallel Language.
Proceedings of the 5th Refinement Workshop, 1992

Shared-state design modulo weak and strong process fairness.
Proceedings of the Formal Description Techniques, 1992

1991
An Attempt to Reason about Shared-State Concurrency in the Style of VDM.
Proceedings of the VDM '91, 1991

A Method for the Development of Totally Correct Shared-State Parallel Programs.
Proceedings of the CONCUR '91, 1991


  Loading...