Takip et
Bjørnar Solhaug
Bjørnar Solhaug
SINTEF ICT
forskningsradet.no üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Model-driven risk analysis: the CORAS approach
MS Lund, B Solhaug, K Stølen
Springer Science & Business Media, 2010
6152010
Cyber-risk management
A Refsdal, B Solhaug, K Stølen, A Refsdal, B Solhaug, K Stølen
Cyber-risk management, 33-47, 2015
1842015
Why trust is not proportional to risk
B Solhaug, D Elgesem, K Stolen
The Second International Conference on Availability, Reliability and …, 2007
852007
Evolution in relation to risk and trust management
MS Lund, B Solhaug, K Stølen
Computer 43 (05), 49-55, 2010
672010
Mitigating risk with cyberinsurance
PH Meland, IA Tondel, B Solhaug
IEEE Security & Privacy 13 (6), 38-43, 2015
632015
Risk analysis of changing and evolving systems using CORAS
MS Lund, B Solhaug, K Stølen
Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures 11 …, 2011
562011
ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system
K Beckers, M Heisel, B Solhaug, K Stølen
Engineering Secure Future Internet Services and Systems: Current Research …, 2014
502014
A guided tour of the CORAS method
MS Lund, B Solhaug, K Stølen, MS Lund, B Solhaug, K Stølen
Model-driven risk analysis: The CORAS approach, 23-43, 2011
402011
The CORAS model-based method for security risk analysis
F Den Braber, G Brændeland, HEI Dahl, I Engan, I Hogganvik, MS Lund, ...
SINTEF, Oslo 12, 15-32, 2006
352006
The CORAS Language–Why it is Designed the Way it is
B Solhaug, K Stølen
Safety, Reliability, Risk and Life-Cycle Performance of Structures and …, 2013
312013
Evolution of security engineering artifacts: a state of the art survey
M Felderer, B Katt, P Kalb, J Jürjens, M Ochoa, F Paci, TT Tun, K Yskout, ...
Transportation Systems and Engineering: Concepts, Methodologies, Tools, and …, 2015
262015
Model-driven risk analysis of evolving critical infrastructures
B Solhaug, F Seehusen
Journal of Ambient Intelligence and Humanized Computing 5, 187-204, 2014
252014
Using cyber-insurance as a risk management strategy: Knowledge gaps and recommendations for further research
IA Tøndel, PH Meland, A Omerovic, EA Gjære, B Solhaug
202015
Semantics for multi-agent only knowing
A Waaler, B Solhaug
Proceedings of the 10th conference on Theoretical aspects of rationality and …, 2005
192005
A UML-based method for the development of policies to support trust management
A Refsdal, B Solhaug, K Stølen
IFIP International Conference on Trust Management, 33-49, 2008
182008
Specifying Policies Using UML Sequence Diagrams--An Evaluation Based on a Case Study
B Solhaug, D Elgesem, K Stolen
Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007
182007
Uncertainty, subjectivity, trust and risk: How it all fits together
B Solhaug, K Stølen
Security and Trust Management: 7th International Workshop, STM 2011 …, 2012
152012
Adherence preserving refinement of trace-set properties in STAIRS: exemplified for information flow properties and policies
F Seehusen, B Solhaug, K Stølen
Software & Systems Modeling 8, 45-65, 2009
152009
Security risk analysis of system changes exemplified within the oil and gas domain
A Refsdal, B Solhaug, K Stølen
International Journal on Software Tools for Technology Transfer 17, 251-266, 2015
132015
An approach to select cost-effective risk countermeasures
LMS Tran, B Solhaug, K Stølen
Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013
122013
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20