Maritta Heisel

Orcid: 0000-0002-3275-2819

Affiliations:
  • University of Duisburg-Essen, Germany


According to our database1, Maritta Heisel authored at least 206 papers between 1986 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cybersecurity discussions in Stack Overflow: a developer-centred analysis of engagement and self-disclosure behaviour.
Soc. Netw. Anal. Min., December, 2023

Model-Based Documentation of Architectures for Cloud-Based Systems.
Proceedings of the 18th International Conference on Software Technologies, 2023

P2BAC: Privacy Policy Based Access Control Using P-LPL.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Creating Privacy Policies from Data-Flow Diagrams.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Pattern-Based Risk Identification for Model-Based Risk Management.
Proceedings of the Applicable Formal Methods for Safe Industrial Products, 2023

2022
Community detection for access-control decisions: Analysing the role of homophily and information diffusion in Online Social Networks.
Online Soc. Networks Media, 2022

The Role of Trustworthiness Facets for Developing Social Media Applications: A Structured Literature Review.
Inf., 2022

PriPoCoG: Guiding Policy Authors to Define GDPR-Compliant Privacy Policies.
Proceedings of the Trust, Privacy and Security in Digital Business, 2022

Meeting Strangers Online: Feature Models for Trustworthiness Assessment.
Proceedings of the Human-Centered Software Engineering, 2022

ENAGRAM: An App to Evaluate Preventative Nudges for Instagram.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

2021
Conflict Identification and Resolution for Trust-Related Requirements Elicitation A Goal Modeling Approach.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Risk Identification Based on Architectural Patterns.
Proceedings of the Quality of Information and Communications Technology, 2021

P2P Frames: Pattern-based Characterization of Functional Requirements for Peer-to-peer Systems.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021

The Relevance of Privacy Concerns, Trust, and Risk for Hybrid Social Media.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2021

Mitigating Privacy Concerns by Developing Trust-related Software Features for a Hybrid Social Media Application.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021

2020
Correction: Díaz Ferreyra, N.E., et al. Preventative Nudges: Introducing Risk Cues for Supporting Online Self-Disclosure Decisions. Information 2020, 11, 399.
Inf., 2020

Preventative Nudges: Introducing Risk Cues for Supporting Online Self-Disclosure Decisions.
Inf., 2020

Building Trustworthiness in Computer-Mediated Introduction: A Facet-Oriented Framework.
Proceedings of the SMSociety'20: International Conference on Social Media and Society, 2020

Model-Based Threat Modeling for Cyber-Physical Systems: A Computer-Aided Approach.
Proceedings of the Software Technologies - 15th International Conference, 2020

Threat Modeling for Cyber-Physical Systems: A Two-dimensional Taxonomy Approach for Structuring Attack Actions.
Proceedings of the 15th International Conference on Software Technologies, 2020

Risk Identification: From Requirements to Threat Models.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Systematic Risk Assessment of Cloud Computing Systems using a Combined Model-based Approach.
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020

Persuasion Meets AI: Ethical Considerations for the Design of Social Engineering Countermeasures.
Proceedings of the 12th International Joint Conference on Knowledge Discovery, 2020

PDP-ReqLite: A Lightweight Approach for the Elicitation of Privacy and Data Protection Requirements.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

Risk Treatment: An Iterative Method for Identifying Controls.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2020

Systematic Treatment of Security Risks during Requirements Engineering.
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020

Assisted Generation of Privacy Policies using Textual Patterns.
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020

A Conceptual Method for Eliciting Trust-related Software Features for Computer-mediated Introduction.
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020

Balancing trust and privacy in computer-mediated introduction: featuring risk as a determinant for trustworthiness requirements elicitation.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Learning from Online Regrets: From Deleted Posts to Risk Awareness in Social Network Sites.
Proceedings of the Adjunct Publication of the 27th Conference on User Modeling, 2019

Privacy Policy Specification Framework for Addressing End-Users' Privacy Requirements.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019

Combining Safety and Security in Autonomous Cars Using Blockchain Technologies.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Distributed Frames: Pattern-Based Characterization of Functional Requirements for Distributed Systems.
Proceedings of the Software Technologies - 14th International Conference, 2019

RE4DIST: Model-based Elicitation of Functional Requirements for Distributed Systems.
Proceedings of the 14th International Conference on Software Technologies, 2019

Managing security risks: template-based specification of controls.
Proceedings of the 24th European Conference on Pattern Languages of Programs, 2019

Pattern-based incorporation of privacy preferences into privacy policies: negotiating the conflicting needs of service providers and end-users.
Proceedings of the 24th European Conference on Pattern Languages of Programs, 2019

A generic conceptual data model of social media services.
Proceedings of the 24th European Conference on Pattern Languages of Programs, 2019

Pattern-based modeling of cyber-physical systems for analyzing security.
Proceedings of the 24th European Conference on Pattern Languages of Programs, 2019

Model-Based Risk Analysis and Evaluation Using CORAS and CVSS.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2019

CVSS-based Estimation and Prioritization for Security Risks.
Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019

Architecture to Manage and Protect Personal Data Utilising Blockchain.
Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019

Systematic Asset Identification and Modeling During Requirements Engineering.
Proceedings of the Risks and Security of Internet and Systems, 2019

Context Modelling for Variability-intensive Systems During Requirements Engineering.
Proceedings of the Software Engineering for Variability Intensive Systems, 2019

2018
Context Analysis of Cloud Computing Systems Using a Pattern-Based Approach.
Future Internet, 2018

Trustworthiness Cases - Toward Preparation for the Trustworthiness Certification.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Access-Control Prediction in Social Network Sites: Examining the Role of Homophily.
Proceedings of the Social Informatics, 2018

Problem-based Derivation of Trustworthiness Requirements from Users' Trust Concerns.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

At Your Own Risk: Shaping Privacy Heuristics for Online Self-disclosure.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

The Gender Gap in Wikipedia Talk Pages.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018

Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem Diagrams.
Proceedings of the Software Technologies - 13th International Conference, 2018

Supporting the Systematic Goal Refinement in KAOS using the Six-Variable Model.
Proceedings of the 13th International Conference on Software Technologies, 2018

Towards an End-to-End Architecture for Run-Time Data Protection in the Cloud.
Proceedings of the 44th Euromicro Conference on Software Engineering and Advanced Applications, 2018

Problem-based Elicitation of Security Requirements - The ProCOR Method.
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 2018

Risk-Based Elicitation of Security Requirements According to the ISO 27005 Standard.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2018

A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements.
Proceedings of the Risks and Security of Internet and Systems, 2018

2017
A structured and systematic model-based development method for automotive systems, considering the OEM/supplier interface.
Reliab. Eng. Syst. Saf., 2017

A Framework for Systematic Refinement of Trustworthiness Requirements.
Inf., 2017

Computer-Aided Identification and Validation of Intervenability Requirements.
Inf., 2017

Pattern-Based Representation of Privacy Enhancing Technologies as Early Aspects.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

Towards Systematic Privacy and Operability (PRIOP) Studies.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Should User-generated Content be a Matter of Privacy Awareness? - A Position Paper.
Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2017

Aspect Frames: Describing Cross-Cutting Concerns in Aspect-Oriented Requirements Engineering.
Proceedings of the 22nd European Conference on Pattern Languages of Programs, 2017

Secure Data Processing in the Cloud.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2017

Towards an ILP Approach for Learning Privacy Heuristics from Users' Regrets.
Proceedings of the Network Intelligence Meets User Centered Social Media Networks [4th European Network Intelligence Conference, 2017

Online Self-disclosure: From Users' Regrets to Instructional Awareness.
Proceedings of the Machine Learning and Knowledge Extraction, 2017

Performing a More Realistic Safety Analysis by Means of the Six-Variable Model.
Proceedings of the Automotive - Safety & Security 2017, 2017

2016
Variability for Qualities in Software Architecture.
ACM SIGSOFT Softw. Eng. Notes, 2016

Computer-Aided Identification and Validation of Privacy Requirements.
Inf., 2016

A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

Understanding the Privacy Goal Intervenability.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

Enhancing Business Process Models with Trustworthiness Requirements.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

Introducing Product Line Engineering in a Bottom-up Approach.
Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - Volume 2: ICSOFT-PT, Lisbon, Portugal, July 24, 2016

Facilitating Reuse of Control Software Through Context Modelling Based on the Six-Variable Model.
Proceedings of the Software Technologies, 11th International Joint Conference, 2016

The Six-Variable Model - Context Modelling Enabling Systematic Reuse of Control Software.
Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - Volume 2: ICSOFT-PT, Lisbon, Portugal, July 24, 2016

Patterns for identification of trust concerns and specification of trustworthiness requirements.
Proceedings of the 21st European Conference on Pattern Languages of Programs, 2016

Addressing self-disclosure in social media: An instructional awareness approach.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
A Taxonomy of Requirements for the Privacy Goal Transparency.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Challenges in Rendering and Maintaining Trustworthiness for Long-Living Software Systems.
Proceedings of the Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2015, 2015

A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier Interface.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Engineering trust- and reputation-based security controls for future internet systems.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Supporting Privacy Impact Assessments Using Problem-Based Privacy Analysis.
Proceedings of the Software Technologies - 10th International Joint Conference, 2015

Systematic Identification of Information Flows from Requirements to Support Privacy Impact Assessments.
Proceedings of the ICSOFT-PT 2015, 2015

Applying performance patterns for requirements analysis.
Proceedings of the 20th European Conference on Pattern Languages of Programs, 2015

Towards systematic selection of architectural patterns with respect to quality requirements.
Proceedings of the 20th European Conference on Pattern Languages of Programs, 2015

Towards a reliable mapping between performance and security tactics, and architectural patterns.
Proceedings of the 20th European Conference on Pattern Languages of Programs, 2015

1st Workshop on VAriability for QUalIties in SofTware Architecture (VAQUITA): Workshop Introduction.
Proceedings of the 2015 European Conference on Software Architecture Workshops, 2015

2014
ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

A Structured Comparison of Security Standards.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Supporting Common Criteria Security Analysis with Problem Frames.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain.
Int. J. Secur. Softw. Eng., 2014

Privacy-Aware Cloud Deployment Scenario Selection.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

A Threat Analysis Methodology for Smart Home Scenarios.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Systematic Derivation of Functional Safety Requirements for Automotive Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Problem-Based Requirements Interaction Analysis.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2014

Problem-Based Security Requirements Elicitation and Refinement with PresSuRE.
Proceedings of the Software Technologies - 9th International Joint Conference, 2014

A Problem-, Quality-, and Aspect-Oriented Requirements Engineering Method.
Proceedings of the Software Technologies - 9th International Joint Conference, 2014

Aspect-oriented Requirements Engineering with Problem Frames.
Proceedings of the ICSOFT-PT 2014, 2014

Functional Requirements Under Security PresSuRE.
Proceedings of the ICSOFT-PT 2014, 2014

A Structured Approach for Eliciting, Modeling, and Using Quality-Related Domain Knowledge.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014

A meta-pattern and pattern form for context-patterns.
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014

Deriving a pattern language syntax for context-patterns.
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014

Problem-oriented security patterns for requirements engineering.
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014

Towards a Computer-Aided Problem-Oriented Variability Requirements Engineering Method.
Proceedings of the Advanced Information Systems Engineering Workshops, 2014

Towards Developing Secure Software Using Problem-Oriented Security Patterns.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

Optimizing Functional and Quality Requirements According to Stakeholders' Goals.
Proceedings of the Relating System Quality and Software Architecture, 2014

2013
Erratum to: A pattern-based method for establishing a cloud-specific information security management system.
Requir. Eng., 2013

A pattern-based method for establishing a cloud-specific information security management system - Establishing information security management systems for clouds considering security, privacy, and legal compliance.
Requir. Eng., 2013

Engineering Resilient Systems: Models, Methods and Tools (Dagstuhl Seminar 13022).
Dagstuhl Reports, 2013

Common criteria compliant software development (CC-CASD).
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

A structured and model-based hazard analysis and risk assessment method for automotive systems.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

A Computer-Aided Process from Problems to Laws in Requirements Engineering.
Proceedings of the Software Technologies - 8th International Joint Conference, 2013

From Problems to Laws in Requirements Engineering - Using Model-Transformation.
Proceedings of the ICSOFT 2013, 2013

A meta-model for context-patterns.
Proceedings of the 18th European Conference on Pattern Languages of Program, 2013

A Framework for Combining Problem Frames and Goal Models to Support Context Analysis during Requirements Engineering.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013

A Problem-Based Threat Analysis in Compliance with Common Criteria.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Structured Pattern-Based Security Requirements Elicitation for Clouds.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

A Usability Evaluation of the NESSoS Common Body of Knowledge.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013

2012
Deriving Quality-based Architecture Alternatives with Patterns.
Proceedings of the Software Engineering 2012: Fachtagung des GI-Fachbereichs Softwaretechnik, 27. Februar, 2012

Designing architectures from problem descriptions by interactive model transformation.
Proceedings of the ACM Symposium on Applied Computing, 2012

Supporting quality-driven design decisions by modeling variability.
Proceedings of the 8th international ACM SIGSOFT conference on Quality of Software Architectures, 2012

Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

An Aspect-Oriented Approach to Relating Security Requirements and Access Control.
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012

Pattern-Based Context Establishment for Service-Oriented Architectures.
Proceedings of the Software Service and Application Engineering, 2012

A Problem-Based Approach for Computer-Aided Privacy Threat Identification.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

A Common Body of Knowledge for Engineering Secure Software and Services.
Proceedings of the Seventh International Conference on Availability, 2012

A Foundation for Requirements Analysis of Privacy Preserving Software.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation.
Proceedings of the Seventh International Conference on Availability, 2012

Ontology-Based Identification of Research Gaps and Immature Research Areas.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
UML4PF - A tool for problem-oriented requirements analysis.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Towards a Common Body of Knowledge for Engineering Secure Software and Services.
Proceedings of the KMIS 2011, 2011

Systematic Development of UMLsec Design Models Based on Security Requirements.
Proceedings of the Fundamental Approaches to Software Engineering, 2011

Towards Systematic Integration of Quality Requirements into Software Architecture.
Proceedings of the Software Architecture - 5th European Conference, 2011

A UML Profile and Tool Support for Evolutionary Requirements Engineering.
Proceedings of the 15th European Conference on Software Maintenance and Reengineering, 2011

A Method to Derive Software Architectures from Quality Requirements.
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011

Systematic Architectural Design Based on Problem Patterns.
Proceedings of the Relating Software Requirements and Architectures., 2011

2010
A comparison of security requirements engineering methods.
Requir. Eng., 2010

A UML Profile for Requirements Analysis of Dependable Software.
Proceedings of the Computer Safety, 2010

Making Pattern- and Model-Based Software Development More Rigorous.
Proceedings of the Formal Methods and Software Engineering, 2010

2009
Deriving Software Architectures from Problem Descriptions.
Proceedings of the Software Engineering 2009, 2009

Workshop Modellgetriebene Softwarearchitektur - Evolution, Integration und Migration (MSEIM2009).
Proceedings of the Software Engineering 2009, 2009

Modellgetriebene Softwarearchitektur - Evolution, Integration und Migration (MSEIM 2009).
Proceedings of the Software Engineering 2009: Fachtagung des GI-Fachbereichs Softwaretechnik 02.-06.03. 2009 in Kaiserslautern, 2009

A Foundation for Requirements Analysis of Dependable Software.
Proceedings of the Computer Safety, 2009

On the Evolution of Component-Based Software.
Proceedings of the Advances in Software Engineering Techniques, 2009

Problem-Oriented Documentation of Design Patterns.
Proceedings of the Fundamental Approaches to Software Engineering, 2009

2008
Testing Against Requirements Using UML Environment Models.
Softwaretechnik-Trends, 2008

Using UML Environment Models for Test Case Generation.
Proceedings of the Software Engineering 2008, 2008

Workshop Modellgetriebene Softwarearchitektur - Evolution, Integration und Migration (MSEIM 2008).
Proceedings of the Software Engineering 2008, 2008

Workshop Modellgetriebene Softwarearchitektur -Evolution, Integration und Migration.
Proceedings of the Software Engineering 2008. Fachtagung des GI-Fachbereichs Softwaretechnik, 2008

A Formal Metamodel for Problem Frames.
Proceedings of the Model Driven Engineering Languages and Systems, 2008

Analysis and Component-based Realization of Security Requirements.
Proceedings of the The Third International Conference on Availability, 2008

2007
Bericht über den Workshop <i>Software-Architektur und Migration</i> im Rahmen der Software-Engineering 2007, 27. März 2007 in Hamburg.
Softwaretechnik-Trends, 2007

Guest Editorial.
Reliab. Eng. Syst. Saf., 2007

Pattern-Based Exploration of Design Alternatives for the Evolution of Software Architectures.
Int. J. Cooperative Inf. Syst., 2007

Einführung.
Proceedings of the Software Engineering 2007, 2007

WG5: Workshop Softwarearchitektur und Migration.
Proceedings of the Software Engineering 2007, 2007

A Systematic Account of Problem Frames.
Proceedings of the 12th European Conference on Pattern Languages of Programs (EuroPLoP '2007), 2007

Pattern-Based Evolution of Software Architectures.
Proceedings of the Software Architecture, First European Conference, 2007

A Security Engineering Process based on Patterns.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

Enhancing Dependability of Component-Based Systems.
Proceedings of the Reliable Software Technologies, 2007

A Pattern System for Security Requirements Engineering.
Proceedings of the The Second International Conference on Availability, 2007

2006
Methods to Create and Use Cross-Domain Analysis Patterns.
Proceedings of the EuroPLoP' 2006, 2006

A Method for Component-Based Software and System Development.
Proceedings of the 32nd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2006), August 29, 2006

Security Engineering Using Problem Frames.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

Component composition through architectural patterns for problem frames.
Proceedings of the 13th Asia-Pacific Software Engineering Conference (APSEC 2006), 2006

2005
Architectural patterns for problem frames.
IEE Proc. Softw., 2005

Proving Component Interoperability with B Refinement.
Proceedings of the International Workshop on Formal Aspects of Component Software, 2005

Problem Frames and Architectures for Security Problems.
Proceedings of the Computer Safety, 2005

A Model-Based Development Process for Embedded System.
Proceedings of the Dagstuhl-Workshop MBEES: Modellbasierte Entwicklung eingebetteter Systeme I, 2005

2004
A method for guiding software evolution.
Proceedings of the IASTED International Conference on Software Engineering, 2004

2003
Adding Features to Component-Based Systems.
Proceedings of the Objects, 2003

2002
Use of Patterns in Formal Development: Systematic Transition from Problems to Architectural Designs.
Proceedings of the Recent Trends in Algebraic Development Techniques, 2002

A Problem-Oriented Approach to Common Criteria Certification.
Proceedings of the Computer Safety, 2002

Toward a Formal Model of Software Components.
Proceedings of the Formal Methods and Software Engineering, 2002

Confidentiality-Preserving Refinement is Compositional - Sometimes.
Proceedings of the Computer Security, 2002

2001
Specifying embedded systems with statecharts and Z: an agenda for cyclic software components.
Sci. Comput. Program., 2001

Confidentiality-Preserving Refinement.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

2000
A Heuristic Algorithm to Detect Feature Interactions in Requirements.
Proceedings of the Language Constructs for Describing Features, 2000

1999
Modeling Safety-Critical Systems with Z and Petri Nets.
Proceedings of the Computer Safety, 1999

A Method for Requirements Elicitation and Formal Specification.
Proceedings of the Conceptual Modeling, 1999

1998
An Agenda for Specifying Software Components with Complex Data Models.
Proceedings of the Computer Safety, 1998

Methodological Support for Requirements Elicitation and Formal Specification.
Proceedings of the 9th International Workshop on Software Specification and Design, 1998

Tutorium: Entwicklung sicherheitskritischer eingebetteter Systeme: Der ESPRESS-Ansatz.
Proceedings of the Informatik '98, 1998

A Heuristic Approach to Detect Feature Interactions in Requirements.
Proceedings of the Feature Interactions in Telecommunications and Software Systems V, September 29, 1998

Specifying Embedded Systems with Staecharts and Z: An Agenda for Cyclic Software Components.
Proceedings of the Fundamental Approaches to Software Engineering, 1998

1997
Using LOTOS Patterns to Characterize Architectural Styles.
Proceedings of the TAPSOFT'97: Theory and Practice of Software Development, 1997

Methodological Support for Formally Specifying Safety-Critical Software.
Proceedings of the 16th International Conference on Computer Safety, 1997

A Two-Layered Approach to Support Systematic Software Development.
Proceedings of the Requirements Targeting Software and Systems Engineering, 1997

1996
Formal Specification of Safety-Critical Software with Z and Real-Time CSP.
Proceedings of the 15th International Conference on Computer Safety, 1996

1995
Six Steps Towards Provably Safe Software.
Proceedings of the 14th International Conference on Computer Safety, 1995

Tool Support for Formal Software Development: A Generic Architecture.
Proceedings of the 5th European Software Engineering Conference, 1995

Specification of the Unix File System: A Comparative Case Study.
Proceedings of the Algebraic Methodology and Software Technology, 1995

1994
Korrekte Software: Nur eine Illusion?
Inform. Forsch. Entwickl., 1994

1993
"Frauenspezifische Informatik" und Frauenförderpläne: Wie paßt das zusammen?.
Proceedings of the Frauen in Mathematik und Informatik, 1993

1992
Formale Programmentwicklung mit dynamischer Logik.
PhD thesis, 1992

Formalizing and Implementing Gries' Program Development Method in Dynamic Logic.
Sci. Comput. Program., 1992

1990
Tactical Theorem Proving in Program Verification.
Proceedings of the 10th International Conference on Automated Deduction, 1990

1989
Machine-Assisted Program Construction and Modification.
Proceedings of the GWAI-89, 1989

A Dynamic Logic for Program Verification.
Proceedings of the Logic at Botik '89, 1989

1988
Bericht über den Workshop "Logik und Wissensrepräsentation".
Künstliche Intell., 1988

Implementing Verification Strategies in the KIV-System.
Proceedings of the 9th International Conference on Automated Deduction, 1988

1987
Program Verification by Symbolic Execution and Induction.
Proceedings of the GWAI-87, 11th German Workshop on Artificial Intelligence, Geseke, Germany, September 28, 1987

Program Verification Using Dynamic Logic.
Proceedings of the CSL '87, 1987

1986
An Interactive Verification System Based on Dynamic Logic.
Proceedings of the 8th International Conference on Automated Deduction, Oxford, England, July 27, 1986


  Loading...