![](/assets/person_male-b881d87fb61a931e9d3bb642f1c485add6672bc4ab7ebf117cf57f0ee0d38ad0.png)
Knauss, Eric; Hilde Houmb, Siv; Schneider, Kurt et al.
Supporting Requirements Engineers in Recognising Security IssuesDaniel Berry;Xavier Franch (Hrsg). Requirements Engineering: Foundation for Software Quality; 17th International Working Conference, REFSQ 2011, Essen, Germany, March 28-30, 2011. Proceedings. Berlin: Springer 2011 S. 4 - 18 (Lecture Notes in Computer Science)
Knauss, Eric; Hilde Houmb, Siv; Schneider, Kurt et al.
Supporting Requirements Engineers in Recognising Security Issues.REFSQ. 2011 S. 4 - 18
Hatebur, Denis; Heisel, Maritta; Jürjens, Jan et al.
Systematic Development of UMLsec Design Models Based on Security RequirementsDimitra Giannakopoulou;Fernando Orejas (Hrsg). Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26–April 3, 2011. Proceedings. Berlin: Springer 2011 S. 232 - 246 (Lecture Notes in Computer Science)
Hatebur, Denis; Heisel, Maritta; Jürjens, Jan et al.
Systematic Development of UMLsec Design Models Based on Security Requirements.FASE. 2011 S. 232 - 246
Fernandez, Eduardo B.; Yoshioka, Nobukazu; Washizaki, Hironori et al.
Using Security Patterns to Develop Secure SystemsHaralambos Mouratidis (Hrsg). Software Engineering for Secure Systems: Industrial and Research Perspectives. Hershey, PA: Information Science Reference 2011 S. 16 - 31
Aizatulin, Mihhail; Dupressoir, François; Gordon, Andrew D. et al.
Verifying Cryptographic Code in C: Some Experience and the Csec ChallengeGilles Barthe;Anupam Datta;Sandro Etalle (Hrsg). Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Berlin: Springer 2011 S. 1 - 20
Aizatulin, Mihhail; Dupressoir, François; D. Gordon, Andrew et al.
Verifying Cryptographic Code in C: Some Experience and the Csec Challenge.Formal Aspects in Security and Trust. 2011 S. 1 - 20
Peschke, Marc; Hirsch, Martin; Jürjens, Jan et al.
Werkzeuggestützte Identifikation von IT-SicherheitsrisikenPeter Schartner;Jürgen Taeger (Hrsg). D-A-CH security 2011: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven. Klagenfurt: Syssec 2011 S. 267 - 278
Beckers, Kristian; Hirsch, Martin; Jürjens, Jan
Compliance in Clouds: A cloud computing security perspectiveGI SECMGT-Workshop. Frankfurt (Germany). 2010 S. 1 - 26