Stephan Faßbender

Affiliations:
  • Universität Duisburg-Essen


According to our database1, Stephan Faßbender authored at least 36 papers between 2011 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
Domain- and Quality-aware Requirements Engineering for Law-compliant Systems.
PhD thesis, 2017

2016
Variability for Qualities in Software Architecture.
ACM SIGSOFT Softw. Eng. Notes, 2016

2015
A Pattern-Based and Tool-Supported Risk Analysis Method Compliant to ISO 27001 for Cloud Systems.
Int. J. Secur. Softw. Eng., 2015

Towards systematic selection of architectural patterns with respect to quality requirements.
Proceedings of the 20th European Conference on Pattern Languages of Programs, 2015

Towards a reliable mapping between performance and security tactics, and architectural patterns.
Proceedings of the 20th European Conference on Pattern Languages of Programs, 2015

1st Workshop on VAriability for QUalIties in SofTware Architecture (VAQUITA): Workshop Introduction.
Proceedings of the 2015 European Conference on Software Architecture Workshops, 2015

Transforming Process Models to Problem Frames.
Proceedings of the Business Process Management Workshops - BPM 2015, 13th International Workshops, Innsbruck, Austria, August 31, 2015

2014
Privacy-Aware Cloud Deployment Scenario Selection.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

A Threat Analysis Methodology for Smart Home Scenarios.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Problem-Based Requirements Interaction Analysis.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2014

Problem-Based Security Requirements Elicitation and Refinement with PresSuRE.
Proceedings of the Software Technologies - 9th International Joint Conference, 2014

A Problem-, Quality-, and Aspect-Oriented Requirements Engineering Method.
Proceedings of the Software Technologies - 9th International Joint Conference, 2014

Aspect-oriented Requirements Engineering with Problem Frames.
Proceedings of the ICSOFT-PT 2014, 2014

Functional Requirements Under Security PresSuRE.
Proceedings of the ICSOFT-PT 2014, 2014

A meta-pattern and pattern form for context-patterns.
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014

Deriving a pattern language syntax for context-patterns.
Proceedings of the 19th European Conference on Pattern Languages of Programs, 2014

Towards a Computer-Aided Problem-Oriented Variability Requirements Engineering Method.
Proceedings of the Advanced Information Systems Engineering Workshops, 2014

Optimizing Functional and Quality Requirements According to Stakeholders' Goals.
Proceedings of the Relating System Quality and Software Architecture, 2014

2013
Erratum to: A pattern-based method for establishing a cloud-specific information security management system.
Requir. Eng., 2013

A pattern-based method for establishing a cloud-specific information security management system - Establishing information security management systems for clouds considering security, privacy, and legal compliance.
Requir. Eng., 2013

Common criteria compliant software development (CC-CASD).
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

A Computer-Aided Process from Problems to Laws in Requirements Engineering.
Proceedings of the Software Technologies - 8th International Joint Conference, 2013

From Problems to Laws in Requirements Engineering - Using Model-Transformation.
Proceedings of the ICSOFT 2013, 2013

A meta-model for context-patterns.
Proceedings of the 18th European Conference on Pattern Languages of Program, 2013

Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013

2012
Supporting the context establishment according to ISO 27005 using patterns.
Proceedings of the Software Engineering 2012 - Workshopband, Fachtagung des GI-Fachbereichs Softwaretechnik, 27. Februar, 2012

A Pattern-Based Method for Identifying and Analyzing Laws.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2012

Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

Pattern-Based Context Establishment for Service-Oriented Architectures.
Proceedings of the Software Service and Application Engineering, 2012

A Problem-Based Approach for Computer-Aided Privacy Threat Identification.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

A Common Body of Knowledge for Engineering Secure Software and Services.
Proceedings of the Seventh International Conference on Availability, 2012

An Integrated Method for Pattern-Based Elicitation of Legal Requirements Applied to a Cloud Computing Example.
Proceedings of the Seventh International Conference on Availability, 2012

Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation.
Proceedings of the Seventh International Conference on Availability, 2012

Peer-to-Peer Driven Software Engineering Considering Security, Reliability, and Performance.
Proceedings of the Seventh International Conference on Availability, 2012

Ontology-Based Identification of Research Gaps and Immature Research Areas.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing.
Proceedings of the Sixth International Conference on Availability, 2011


  Loading...