Holger Schmidt

Affiliations:
  • University of Applied Sciences Düsseldorf, Germany
  • University of Duisburg-Essen, Germany (former)
  • TU Dortmund, Germany (former)


According to our database1, Holger Schmidt authored at least 27 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
CopypastaVulGuard - A browser extension to prevent copy and paste spreading of vulnerable source code in forum posts.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2012
A Pattern-Based Method for Identifying and Analyzing Laws.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2012

Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

A Common Body of Knowledge for Engineering Secure Software and Services.
Proceedings of the Seventh International Conference on Availability, 2012

An Integrated Method for Pattern-Based Elicitation of Legal Requirements Applied to a Cloud Computing Example.
Proceedings of the Seventh International Conference on Availability, 2012

Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation.
Proceedings of the Seventh International Conference on Availability, 2012

Ontology-Based Identification of Research Gaps and Immature Research Areas.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Threat and Risk-Driven Security Requirements Engineering.
Int. J. Mob. Comput. Multim. Commun., 2011

Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications.
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011

UML4PF - A tool for problem-oriented requirements analysis.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Towards a Common Body of Knowledge for Engineering Secure Software and Services.
Proceedings of the KMIS 2011, 2011

Systematic Development of UMLsec Design Models Based on Security Requirements.
Proceedings of the Fundamental Approaches to Software Engineering, 2011

The Security Twin Peaks.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Incremental Security Verification for Evolving UMLsec models.
Proceedings of the Modelling Foundations and Applications - 7th European Conference, 2011

Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec.
Proceedings of the Advanced Information Systems Engineering, 2011

Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing.
Proceedings of the Sixth International Conference on Availability, 2011

2010
A pattern- and component-based method to develop secure software.
PhD thesis, 2010

A comparison of security requirements engineering methods.
Requir. Eng., 2010

Threat- and Risk-Analysis During Early Security Requirements Engineering.
Proceedings of the ARES 2010, 2010

2009
Pattern-Based Confidentiality-Preserving Refinement.
Proceedings of the Engineering Secure Software and Systems, 2009

2008
A Formal Metamodel for Problem Frames.
Proceedings of the Model Driven Engineering Languages and Systems, 2008

Analysis and Component-based Realization of Security Requirements.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Systematic Account of Problem Frames.
Proceedings of the 12th European Conference on Pattern Languages of Programs (EuroPLoP '2007), 2007

A Security Engineering Process based on Patterns.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

A Pattern System for Security Requirements Engineering.
Proceedings of the The Second International Conference on Availability, 2007

2006
Preserving Software Quality Characteristics from Requirements Analysis to Architectural Design.
Proceedings of the Software Architecture, Third European Workshop, 2006

Security Engineering Using Problem Frames.
Proceedings of the Emerging Trends in Information and Communication Security, 2006


  Loading...