Ketil Stølen
According to our database1,
Ketil Stølen
authored at least 102 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Technology Research Explained - Design of Software, Architectures, Methods, and Technology in General
Springer, ISBN: 978-3-031-25816-9, 2023
2018
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 2018
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2018
2016
Design Decisions in the Development of a Graphical Language for Risk-Driven Security Testing.
Proceedings of the Risk Assessment and Risk-Driven Quality Assurance, 2016
The FLUIDE Framework for Specifying Emergency Response User Interfaces Employed to a Search and Rescue Case.
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016
Evaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case Study.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
A case-based assessment of the FLUIDE framework for specifying emergency response user interfaces.
Proceedings of the 8th ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2016
Proceedings of the From Action Systems to Distributed Systems - The Refinement Approach., 2016
2015
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-23570-7, 2015
Int. J. Softw. Tools Technol. Transf., 2015
J. Comput. Syst. Sci., 2015
Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies.
Int. J. Secur. Softw. Eng., 2015
2014
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
Approaches for the combined use of risk analysis and testing: a systematic literature review.
Int. J. Softw. Tools Technol. Transf., 2014
Schematic Generation of English-Prose Semantics for a Risk Analysis Language Based on UML Interactions.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014
2013
Relating computer systems to sequence diagrams: the impact of underspecification and inherent nondeterminism.
Formal Aspects Comput., 2013
CoRR, 2013
A Systematic Method for Risk-Driven Test Case Design Using Annotated Sequence Diagrams.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
2012
Assessing practical usefulness and performance of the PREDIQT method: An industrial case study.
Inf. Softw. Technol., 2012
A Pattern-Based Method for Safe Control Systems Exemplified within Nuclear Power Production.
Proceedings of the Computer Safety, Reliability, and Security, 2012
Proceedings of the 2012 5th International Conference on Human System Interactions, 2012
2011
Proceedings of the Security and Trust Management - 7th International Workshop, 2011
Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011
Proceedings of the 18th Conference on Pattern Languages of Programs, 2011
Proceedings of the Annual Meeting of the Australian Special Interest Group for Computer Human Interaction, OzCHI '11, Canberra, Australia, November 28, 2011
Proceedings of the 5th IEEE International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems, 2011
An Evaluation of the Graphical Modeling Framework (GMF) Based on the Development of the CORAS Tool.
Proceedings of the Theory and Practice of Model Transformations, 2011
Towards Patterns for Handling Safety Critical Adaptive Control Software.
Proceedings of the ICINCO 2011 - Proceedings of the 8th International Conference on Informatics in Control, Automation and Robotics, Volume 1, Noordwijkerhout, The Netherlands, 28, 2011
Proceedings of the Foundations of Security Analysis and Design VI, 2011
Proceedings of the Formal Aspects of Component Software - 8th International Symposium, 2011
Experiences from Using Indicators to Validate Expert Judgments in Security Risk Analysis.
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011
Springer, ISBN: 978-3-642-12322-1, 2011
2010
J. Syst. Softw., 2010
Experiences from using a UML-based method for trust analysis in an industrial project on electronic procurement.
Electron. Commer. Res., 2010
Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
Ad Hoc Networks and Mobile Devices in Emergency Response - A Perfect Match? - (Invited Paper).
Proceedings of the Ad Hoc Networks - Second International Conference, 2010
2009
Adherence preserving refinement of trace-set properties in STAIRS: exemplified for information flow properties and policies.
Softw. Syst. Model., 2009
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009
Employing Key Indicators to Provide a Dynamic Risk Picture with a Notion of Confidence.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
2008
Extending UML sequence diagrams to model trust-dependent behavior with the aim to support risk analysis.
Sci. Comput. Program., 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Proceedings of the Trust Management II, 2008
Proceedings of the Computer Security, 2008
2007
Specifying Policies Using UML Sequence Diagrams - An Evaluation Based on a Case Study.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the Model-Based Engineering of Embedded Real-Time Systems, 2007
Proceedings of the Critical Information Infrastructures Security, 2007
2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the Model Driven Engineering Languages and Systems, 2006
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006
A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006
Proceedings of the Enterprise Interoperability, 2006
Proceedings of the 2006 International Workshop on Automation of Software Test, 2006
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2006
A Fully General Operational Semantics for UML 2.0 Sequence Diagrams with Potential and Mandatory Choice.
Proceedings of the FM 2006: Formal Methods, 2006
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006
2005
Refining UML Interactions with Underspecification and Nondeterminism.
Nord. J. Comput., 2005
J. Cases Inf. Technol., 2005
Proceedings of the 13th International Workshop on Program Comprehension (IWPC 2005), 2005
Proceedings of the Trust Management, Third International Conference, 2005
Proceedings of the Trust Management, Third International Conference, 2005
Proceedings of the 2005 International Symposium on Empirical Software Engineering (ISESE 2005), 2005
Graphical Specification of Dynamic Network Structure.
Proceedings of the ICEIS 2005, 2005
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2005
Proceedings of the Formal Methods for Components and Objects, 4th International Symposium, 2005
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005
2004
Proceedings of the Trust Management, Second International Conference, 2004
2003
Proceedings of the «UML» 2003, 2003
The CORAS approach for model-based risk management applied to a telemedicine service.
Proceedings of the New Navigators: from Professionals to Patients, 2003
Proceedings of the Scenarios: Models, 2003
Proceedings of the 7th European Conference on Software Maintenance and Reengineering (CSMR 2003), 2003
2002
Proceedings of the Computer Safety, 2002
Integrating Model-based Security Risk Management into eBusiness Systems Development: The CORAS Approach.
Proceedings of the Towards The Knowledge Society: eCommerce, 2002
Proceedings of the Web and the Grid: from e-science to e-business. EuroWeb 2002 Conference, 2002
Proceedings of the 6th International Enterprise Distributed Object Computing Conference (EDOC 2002), 2002
Proceedings of the Advanced Communications and Multimedia Security, 2002
2001
Specification and Development of Interactive Systems - Focus on Streams, Interfaces, and Refinement
Monographs in Computer Science, Springer, ISBN: 978-1-4613-0091-5, 2001
2000
Experience from Using MSC, UML and SDL in the Development of the FAME Communication Manager.
Proceedings of the SAM 2000, 2000
1999
Specification of Dynamic Reconfiguration in the Context of Input/Output Relations.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 1999
1998
Proceedings of the Prospects for Hardware Foundations, ESPRIT Working Group 8533, NADA, 1998
1996
Refinement Principles Supporting the Transition from Asynchronous to Synchronous Communication.
Sci. Comput. Program., 1996
Specification and Refinement of Networks of Asynchronously Communicating Agents Using the Assumption/Commitment Paradigm.
Formal Aspects Comput., 1996
Assumption/Commitment Rules for Dataflow Networks - With an Emphasis on Completeness.
Proceedings of the Programming Languages and Systems, 1996
Proceedings of the Algebraic Methodology and Software Technology, 1996
1995
A Refinement Relation Supporting the Transition from Unbounded to Bounded Communication Buffers.
Proceedings of the Mathematics of Program Construction, 1995
1994
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, Third International Symposium Organized Jointly with the Working Group Provably Correct Systems, 1994
An attempt to embed a restricted version of SDL as a target language in Focus.
Proceedings of the Formal Description Techniques VII, 1994
Proceedings of the Formal Systems Specification, 1994
1993
Forschungsberichte, TU Munich, 1993
1992
Proceedings of the 5th Refinement Workshop, 1992
Shared-state design modulo weak and strong process fairness.
Proceedings of the Formal Description Techniques, 1992
1991
Proceedings of the VDM '91, 1991
Proceedings of the CONCUR '91, 1991