Rene Meis

Orcid: 0000-0001-5274-0324

According to our database1, Rene Meis authored at least 33 papers between 2010 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Learning from Online Regrets: From Deleted Posts to Risk Awareness in Social Network Sites.
Proceedings of the Adjunct Publication of the 27th Conference on User Modeling, 2019

2018
Problem-based privacy analysis (ProPAn) - a computer-aided privacy requirements engineering method.
PhD thesis, 2018

At Your Own Risk: Shaping Privacy Heuristics for Online Self-disclosure.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Problem-based Elicitation of Security Requirements - The ProCOR Method.
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 2018

Risk-Based Elicitation of Security Requirements According to the ISO 27005 Standard.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2018

2017
Computer-Aided Identification and Validation of Intervenability Requirements.
Inf., 2017

Pattern-Based Representation of Privacy Enhancing Technologies as Early Aspects.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

Towards Systematic Privacy and Operability (PRIOP) Studies.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Should User-generated Content be a Matter of Privacy Awareness? - A Position Paper.
Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2017

Aspect Frames: Describing Cross-Cutting Concerns in Aspect-Oriented Requirements Engineering.
Proceedings of the 22nd European Conference on Pattern Languages of Programs, 2017

Towards an ILP Approach for Learning Privacy Heuristics from Users' Regrets.
Proceedings of the Network Intelligence Meets User Centered Social Media Networks [4th European Network Intelligence Conference, 2017

Online Self-disclosure: From Users' Regrets to Instructional Awareness.
Proceedings of the Machine Learning and Knowledge Extraction, 2017

2016
Computer-Aided Identification and Validation of Privacy Requirements.
Inf., 2016

Understanding the Privacy Goal Intervenability.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

Introducing Product Line Engineering in a Bottom-up Approach.
Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - Volume 2: ICSOFT-PT, Lisbon, Portugal, July 24, 2016

Facilitating Reuse of Control Software Through Context Modelling Based on the Six-Variable Model.
Proceedings of the Software Technologies, 11th International Joint Conference, 2016

The Six-Variable Model - Context Modelling Enabling Systematic Reuse of Control Software.
Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - Volume 2: ICSOFT-PT, Lisbon, Portugal, July 24, 2016

2015
A Taxonomy of Requirements for the Privacy Goal Transparency.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Supporting Privacy Impact Assessments Using Problem-Based Privacy Analysis.
Proceedings of the Software Technologies - 10th International Joint Conference, 2015

Systematic Identification of Information Flows from Requirements to Support Privacy Impact Assessments.
Proceedings of the ICSOFT-PT 2015, 2015

2014
Privacy-Aware Cloud Deployment Scenario Selection.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Problem-Based Requirements Interaction Analysis.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2014

Problem-Based Security Requirements Elicitation and Refinement with PresSuRE.
Proceedings of the Software Technologies - 9th International Joint Conference, 2014

A Problem-, Quality-, and Aspect-Oriented Requirements Engineering Method.
Proceedings of the Software Technologies - 9th International Joint Conference, 2014

Aspect-oriented Requirements Engineering with Problem Frames.
Proceedings of the ICSOFT-PT 2014, 2014

Functional Requirements Under Security PresSuRE.
Proceedings of the ICSOFT-PT 2014, 2014

A Structured Approach for Eliciting, Modeling, and Using Quality-Related Domain Knowledge.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014

2013
Problem-Based Consideration of Privacy-Relevant Domain Knowledge.
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013

2012
A Separation Logic Framework for Imperative HOL.
Arch. Formal Proofs, 2012

Pattern-Based Context Establishment for Service-Oriented Architectures.
Proceedings of the Software Service and Application Engineering, 2012

A Problem-Based Approach for Computer-Aided Privacy Threat Identification.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

2010
Binomial Heaps and Skew Binomial Heaps.
Arch. Formal Proofs, 2010


  Loading...