Bjørnar Solhaug
According to our database1,
Bjørnar Solhaug
authored at least 28 papers
between 2005 and 2015.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2015
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-23570-7, 2015
Int. J. Softw. Tools Technol. Transf., 2015
2014
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
J. Ambient Intell. Humaniz. Comput., 2014
Int. J. Secur. Softw. Eng., 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
CoRR, 2013
Proceedings of the Ambient Intelligence - Software and Applications, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Assessing practical usefulness and performance of the PREDIQT method: An industrial case study.
Inf. Softw. Technol., 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
Proceedings of the Security and Trust Management - 7th International Workshop, 2011
Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011
Proceedings of the Computer Safety, Reliability, and Security, 2011
Proceedings of the Foundations of Security Analysis and Design VI, 2011
Springer, ISBN: 978-3-642-12322-1, 2011
2010
2009
Adherence preserving refinement of trace-set properties in STAIRS: exemplified for information flow properties and policies.
Softw. Syst. Model., 2009
2008
Proceedings of the Trust Management II, 2008
Proceedings of the Computer Security, 2008
2007
Specifying Policies Using UML Sequence Diagrams - An Evaluation Based on a Case Study.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
2005
Proceedings of the 10th Conference on Theoretical Aspects of Rationality and Knowledge (TARK-2005), 2005
Proceedings of the Computational Logic in Multi-Agent Systems, 6th International Workshop, 2005