Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Erlend Andreas Gjære"'
Autor:
Erlend Andreas Gjære, Per Håkon Meland
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 148, Iss Proc. GraMSec 2014, Pp 1-14 (2014)
Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we de
Externí odkaz:
https://doaj.org/article/a099cbe65fbe437a87d822cdf4106a75
Autor:
Elda Paja, Erlend Andreas Gjære, Per Håkon Meland, Paolo Giorgini, Fabiano Dalpiaz, Stéphane Paul
Publikováno v:
International Journal of Secure Software Engineering. 5:1-19
Goal and threat modelling are important activities of security requirements engineering: goals express why a system is needed, while threats motivate the need for security. Unfortunately, existing approaches mostly consider goals and threats separate
Autor:
Per Håkon Meland, Erlend Andreas Gjære
Publikováno v:
International Journal of Secure Software Engineering. 4:1-18
The Business Process Modeling Notation (BPMN) has become a popular standard for expressing high level business processes as well as technical specifications for software systems. However, the specification does not contain native support to express s
Publikováno v:
ICISSP
Security Awareness and Training (SAT) programs are commonly put in place to reduce risk related to insecure behaviour among employees. There are however studies questioning how effective SAT programs are in terms of improving end-user behaviours. In
Publikováno v:
Lecture Notes in Computer Science
International Conference on Availability, Reliability, and Security (CD-ARES)
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.175-190, ⟨10.1007/978-3-319-45507-5_12⟩
Lecture Notes in Computer Science ISBN: 9783319455068
CD-ARES
International Conference on Availability, Reliability, and Security (CD-ARES)
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.175-190, ⟨10.1007/978-3-319-45507-5_12⟩
Lecture Notes in Computer Science ISBN: 9783319455068
CD-ARES
Part 1: The International Cross Domain Conference (CD-ARES 2016); International audience; As a basis for offering policy and setting tariffs, cyber-insurance carriers need to assess the cyber risk of companies. This paper explores the challenges insu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::abbfa3703b23c262b3184d154bcffa4b
https://hal.inria.fr/hal-01635023/document
https://hal.inria.fr/hal-01635023/document
Publikováno v:
IoTBD
Publikováno v:
ARES
Publikováno v:
Secure and Trustworthy Service Composition ISBN: 9783319135175
Secure and Trustworthy Service Composition
Secure and Trustworthy Service Composition
In order to assess the industrial relevance of the Aniketos design-time framework, we report on its application to a typical use-case of the Air Traffic Management (ATM) System Wide Information Management (SWIM) system: a meteorological information r
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6ed1e2b0f9ec45315ceac6c7c83b1540
https://doi.org/10.1007/978-3-319-13518-2_14
https://doi.org/10.1007/978-3-319-13518-2_14
Publikováno v:
ARES
Both goal and threat modelling are well-known activities related to high-level requirements engineering. While goals express why a system is needed, threats tell us why security for our system is needed. Still, you will often find that goals and thre
Autor:
Per Håkon Meland, Erlend Andreas Gjære
Publikováno v:
ARES
The Business Process Modeling Notation (BPMN) has become a broadly accepted standard for process modeling, but is mostly being used to express the normal execution flow of business processes. In some situations there is also a need to express threats