BibTeX records: Ketil Stølen

download as .bib file

@book{DBLP:books/sp/Stolen23,
  author       = {Ketil St{\o}len},
  title        = {Technology Research Explained - Design of Software, Architectures,
                  Methods, and Technology in General},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-25817-6},
  doi          = {10.1007/978-3-031-25817-6},
  isbn         = {978-3-031-25816-9},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/Stolen23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/TokasES23,
  author       = {Shukun Tokas and
                  Gencer Erdogan and
                  Ketil St{\o}len},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Privacy-Aware IoT: State-of-the-Art and Challenges},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {450--461},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011656400003405},
  doi          = {10.5220/0011656400003405},
  timestamp    = {Thu, 11 May 2023 10:52:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/TokasES23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/enase/WirtzHMOS18,
  author       = {Roman Wirtz and
                  Maritta Heisel and
                  Rene Meis and
                  Aida Omerovic and
                  Ketil St{\o}len},
  editor       = {Ernesto Damiani and
                  George Spanoudakis and
                  Leszek A. Maciaszek},
  title        = {Problem-based Elicitation of Security Requirements - The ProCOR Method},
  booktitle    = {Proceedings of the 13th International Conference on Evaluation of
                  Novel Approaches to Software Engineering, {ENASE} 2018, Funchal, Madeira,
                  Portugal, March 23-24, 2018},
  pages        = {26--38},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006669400260038},
  doi          = {10.5220/0006669400260038},
  timestamp    = {Mon, 30 Apr 2018 14:58:10 +0200},
  biburl       = {https://dblp.org/rec/conf/enase/WirtzHMOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/enase/WirtzHBMOS18,
  author       = {Roman Wirtz and
                  Maritta Heisel and
                  Angela Borchert and
                  Rene Meis and
                  Aida Omerovic and
                  Ketil St{\o}len},
  editor       = {Ernesto Damiani and
                  George Spanoudakis and
                  Leszek A. Maciaszek},
  title        = {Risk-Based Elicitation of Security Requirements According to the {ISO}
                  27005 Standard},
  booktitle    = {Evaluation of Novel Approaches to Software Engineering - 13th International
                  Conference, {ENASE} 2018, Funchal, Madeira, Portugal, March 23-24,
                  2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1023},
  pages        = {71--97},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-22559-9\_4},
  doi          = {10.1007/978-3-030-22559-9\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/enase/WirtzHBMOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2017gramsec,
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-74860-3},
  doi          = {10.1007/978-3-319-74860-3},
  isbn         = {978-3-319-74859-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2017gramsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eics/NilssonS16,
  author       = {Erik G. Nilsson and
                  Ketil St{\o}len},
  editor       = {Kris Luyten and
                  Philippe A. Palanque},
  title        = {A case-based assessment of the {FLUIDE} framework for specifying emergency
                  response user interfaces},
  booktitle    = {Proceedings of the 8th {ACM} {SIGCHI} Symposium on Engineering Interactive
                  Computing Systems, {EICS} 2016, Brussels, Belgium, June 21-24, 2016},
  pages        = {97--107},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2933242.2933253},
  doi          = {10.1145/2933242.2933253},
  timestamp    = {Sat, 09 Apr 2022 12:33:56 +0200},
  biburl       = {https://dblp.org/rec/conf/eics/NilssonS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ErdoganSA16,
  author       = {Gencer Erdogan and
                  Ketil St{\o}len and
                  Jan {\O}yvind Aagedal},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Evaluation of the {CORAL} Approach for Risk-driven Security Testing
                  based on an Industrial Case Study},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {219--226},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005650902190226},
  doi          = {10.5220/0005650902190226},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ErdoganSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscram/NilssonS16,
  author       = {Erik G. Nilsson and
                  Ketil St{\o}len},
  editor       = {Andrea H. Tapia and
                  Pedro Antunes and
                  Victor A. Ba{\~{n}}uls and
                  Kathleen A. Moore and
                  Jo{\~{a}}o Porto de Albuquerque},
  title        = {The {FLUIDE} Framework for Specifying Emergency Response User Interfaces
                  Employed to a Search and Rescue Case},
  booktitle    = {13th Proceedings of the International Conference on Information Systems
                  for Crisis Response and Management, Rio de Janeiro, Brasil, May 22-25,
                  2016},
  publisher    = {{ISCRAM} Association},
  year         = {2016},
  url          = {http://idl.iscram.org/files/erikgnilsson/2016/1434\_ErikG.Nilsson+KetilStolen2016.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscram/NilssonS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/risk/ErdoganS16,
  author       = {Gencer Erdogan and
                  Ketil St{\o}len},
  editor       = {J{\"{u}}rgen Gro{\ss}mann and
                  Michael Felderer and
                  Fredrik Seehusen},
  title        = {Design Decisions in the Development of a Graphical Language for Risk-Driven
                  Security Testing},
  booktitle    = {Risk Assessment and Risk-Driven Quality Assurance - 4th International
                  Workshop, {RISK} 2016, Held in Conjunction with {ICTSS} 2016, Graz,
                  Austria, October 18, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10224},
  pages        = {99--114},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-57858-3\_8},
  doi          = {10.1007/978-3-319-57858-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/risk/ErdoganS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/p/RefsdalRS16,
  author       = {Atle Refsdal and
                  Ragnhild Kobro Runde and
                  Ketil St{\o}len},
  editor       = {Luigia Petre and
                  Emil Sekerinski},
  title        = {Mandatory and Potential Choice: Comparing Event-B and {STAIRS}},
  booktitle    = {From Action Systems to Distributed Systems - The Refinement Approach},
  pages        = {15--27},
  publisher    = {Chapman and Hall/CRC},
  year         = {2016},
  url          = {https://doi.org/10.1201/b20053-4},
  doi          = {10.1201/B20053-4},
  timestamp    = {Tue, 16 May 2017 14:01:47 +0200},
  biburl       = {https://dblp.org/rec/books/crc/p/RefsdalRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/RefsdalSS15,
  author       = {Atle Refsdal and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  title        = {Cyber-Risk Management},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23570-7},
  doi          = {10.1007/978-3-319-23570-7},
  isbn         = {978-3-319-23569-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/RefsdalSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ErdoganSSHA15,
  author       = {Gencer Erdogan and
                  Fredrik Seehusen and
                  Ketil St{\o}len and
                  Jon Hofstad and
                  Jan {\O}yvind Aagedal},
  title        = {Assessing the Usefulness of Testing for Validating and Correcting
                  Security Risk Models Based on Two Industrial Case Studies},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {6},
  number       = {2},
  pages        = {90--112},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJSSE.2015040105},
  doi          = {10.4018/IJSSE.2015040105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/ErdoganSSHA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/RefsdalRS15,
  author       = {Atle Refsdal and
                  Ragnhild Kobro Runde and
                  Ketil St{\o}len},
  title        = {Stepwise refinement of sequence diagrams with soft real-time constraints},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {81},
  number       = {7},
  pages        = {1221--1251},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jcss.2015.03.003},
  doi          = {10.1016/J.JCSS.2015.03.003},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/RefsdalRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/RefsdalSS15,
  author       = {Atle Refsdal and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  title        = {Security risk analysis of system changes exemplified within the oil
                  and gas domain},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {17},
  number       = {3},
  pages        = {251--266},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10009-014-0351-0},
  doi          = {10.1007/S10009-014-0351-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/RefsdalSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/ErdoganLRSS14,
  author       = {Gencer Erdogan and
                  Yan Li and
                  Ragnhild Kobro Runde and
                  Fredrik Seehusen and
                  Ketil St{\o}len},
  title        = {Approaches for the combined use of risk analysis and testing: a systematic
                  literature review},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {16},
  number       = {5},
  pages        = {627--642},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10009-014-0330-5},
  doi          = {10.1007/S10009-014-0330-5},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/ErdoganLRSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/ErdoganRS14,
  author       = {Gencer Erdogan and
                  Atle Refsdal and
                  Ketil St{\o}len},
  title        = {Schematic Generation of English-Prose Semantics for a Risk Analysis
                  Language Based on {UML} Interactions},
  booktitle    = {25th {IEEE} International Symposium on Software Reliability Engineering
                  Workshops, {ISSRE} Workshops, Naples, Italy, November 3-6, 2014},
  pages        = {305--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSREW.2014.73},
  doi          = {10.1109/ISSREW.2014.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/ErdoganRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/BeckersHSS14,
  author       = {Kristian Beckers and
                  Maritta Heisel and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  editor       = {Maritta Heisel and
                  Wouter Joosen and
                  Javier L{\'{o}}pez and
                  Fabio Martinelli},
  title        = {{ISMS-CORAS:} {A} Structured Method for Establishing an {ISO} 27001
                  Compliant Information Security Management System},
  booktitle    = {Engineering Secure Future Internet Services and Systems - Current
                  Research},
  series       = {Lecture Notes in Computer Science},
  volume       = {8431},
  pages        = {315--344},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07452-8\_13},
  doi          = {10.1007/978-3-319-07452-8\_13},
  timestamp    = {Thu, 29 Aug 2019 08:09:56 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/BeckersHSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/RefsdalRSS14,
  author       = {Atle Refsdal and
                  {\O}yvind Rideng and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  editor       = {Maritta Heisel and
                  Wouter Joosen and
                  Javier L{\'{o}}pez and
                  Fabio Martinelli},
  title        = {Divide and Conquer - Towards a Notion of Risk Model Encapsulation},
  booktitle    = {Engineering Secure Future Internet Services and Systems - Current
                  Research},
  series       = {Lecture Notes in Computer Science},
  volume       = {8431},
  pages        = {345--365},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07452-8\_14},
  doi          = {10.1007/978-3-319-07452-8\_14},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/RefsdalRSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pts/2013risk,
  editor       = {Thomas Bauer and
                  J{\"{u}}rgen Gro{\ss}mann and
                  Fredrik Seehusen and
                  Ketil St{\o}len and
                  Marc{-}Florian Wendland},
  title        = {Risk Assessment and Risk-Driven Testing - First International Workshop,
                  {RISK} 2013, Held in Conjunction with {ICTSS} 2013, Istanbul, Turkey,
                  November 12, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8418},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07076-6},
  doi          = {10.1007/978-3-319-07076-6},
  isbn         = {978-3-319-07075-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pts/2013risk.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/RundeRS13,
  author       = {Ragnhild Kobro Runde and
                  Atle Refsdal and
                  Ketil St{\o}len},
  title        = {Relating computer systems to sequence diagrams: the impact of underspecification
                  and inherent nondeterminism},
  journal      = {Formal Aspects Comput.},
  volume       = {25},
  number       = {2},
  pages        = {159--187},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00165-011-0192-5},
  doi          = {10.1007/S00165-011-0192-5},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/RundeRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/TranSS13,
  author       = {Le Minh Sang Tran and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {An Approach to Select Cost-Effective Risk Countermeasures},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {266--273},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_18},
  doi          = {10.1007/978-3-642-39256-6\_18},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/TranSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pts/ErdoganRS13,
  author       = {Gencer Erdogan and
                  Atle Refsdal and
                  Ketil St{\o}len},
  editor       = {Thomas Bauer and
                  J{\"{u}}rgen Gro{\ss}mann and
                  Fredrik Seehusen and
                  Ketil St{\o}len and
                  Marc{-}Florian Wendland},
  title        = {A Systematic Method for Risk-Driven Test Case Design Using Annotated
                  Sequence Diagrams},
  booktitle    = {Risk Assessment and Risk-Driven Testing - First International Workshop,
                  {RISK} 2013, Held in Conjunction with {ICTSS} 2013, Istanbul, Turkey,
                  November 12, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8418},
  pages        = {93--108},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-07076-6\_7},
  doi          = {10.1007/978-3-319-07076-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/pts/ErdoganRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-4689,
  author       = {Le Minh Sang Tran and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  title        = {An Approach to Select Cost-Effective Risk Countermeasures Exemplified
                  in {CORAS}},
  journal      = {CoRR},
  volume       = {abs/1302.4689},
  year         = {2013},
  url          = {http://arxiv.org/abs/1302.4689},
  eprinttype    = {arXiv},
  eprint       = {1302.4689},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1302-4689.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/OmerovicSS12,
  author       = {Aida Omerovic and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  title        = {Assessing practical usefulness and performance of the {PREDIQT} method:
                  An industrial case study},
  journal      = {Inf. Softw. Technol.},
  volume       = {54},
  number       = {12},
  pages        = {1377--1395},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.infsof.2012.07.006},
  doi          = {10.1016/J.INFSOF.2012.07.006},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/OmerovicSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hsi/EideS12,
  author       = {Aslak Wegner Eide and
                  Ketil St{\o}len},
  title        = {Geographic Visualization of Risk as Decision Support in Emergency
                  Situations},
  booktitle    = {2012 5th International Conference on Human System Interactions, Perth,
                  Australia, June 6-8, 2012},
  pages        = {81--88},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/HSI.2012.39},
  doi          = {10.1109/HSI.2012.39},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/hsi/EideS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/HaugeS12,
  author       = {Andr{\'{e}} Alexandersen Hauge and
                  Ketil St{\o}len},
  editor       = {Frank Ortmeier and
                  Peter Daniel},
  title        = {A Pattern-Based Method for Safe Control Systems Exemplified within
                  Nuclear Power Production},
  booktitle    = {Computer Safety, Reliability, and Security - 31st International Conference,
                  {SAFECOMP} 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7612},
  pages        = {13--24},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33678-2\_2},
  doi          = {10.1007/978-3-642-33678-2\_2},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/HaugeS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0025737,
  author       = {Mass Soldal Lund and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  title        = {Model-Driven Risk Analysis - The {CORAS} Approach},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-12323-8},
  doi          = {10.1007/978-3-642-12323-8},
  isbn         = {978-3-642-12322-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0025737.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsi/SolhaugS11,
  author       = {Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  title        = {Preservation of Policy Adherence under Refinement},
  journal      = {Int. J. Softw. Informatics},
  volume       = {5},
  number       = {1-2},
  pages        = {139--157},
  year         = {2011},
  url          = {http://www.ijsi.org/ch/reader/view\_abstract.aspx?file\_no=i79},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsi/SolhaugS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esem/LigaardenRS11,
  author       = {Olav S. Ligaarden and
                  Atle Refsdal and
                  Ketil St{\o}len},
  editor       = {James Walden and
                  Laurie A. Williams},
  title        = {Experiences from Using Indicators to Validate Expert Judgments in
                  Security Risk Analysis},
  booktitle    = {Third International Workshop on Security Measurements and Metrics,
                  Metrisec@ESEM 2011, Banff, Alberta, Canada, September 21, 2011},
  pages        = {88--95},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/Metrisec.2011.13},
  doi          = {10.1109/METRISEC.2011.13},
  timestamp    = {Mon, 07 Sep 2020 10:46:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esem/LigaardenRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/facs2/BraendelandRS11,
  author       = {Gyrd Br{\ae}ndeland and
                  Atle Refsdal and
                  Ketil St{\o}len},
  editor       = {Farhad Arbab and
                  Peter Csaba {\"{O}}lveczky},
  title        = {A Denotational Model for Component-Based Risk Analysis},
  booktitle    = {Formal Aspects of Component Software - 8th International Symposium,
                  {FACS} 2011, Oslo, Norway, September 14-16, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7253},
  pages        = {12--41},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35743-5\_3},
  doi          = {10.1007/978-3-642-35743-5\_3},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/facs2/BraendelandRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/LundSS10,
  author       = {Mass Soldal Lund and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  editor       = {Alessandro Aldini and
                  Roberto Gorrieri},
  title        = {Risk Analysis of Changing and Evolving Systems Using {CORAS}},
  booktitle    = {Foundations of Security Analysis and Design {VI} - {FOSAD} Tutorial
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {6858},
  pages        = {231--274},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23082-0\_9},
  doi          = {10.1007/978-3-642-23082-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/LundSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icinco/HaugeS11,
  author       = {Andr{\'{e}} Alexandersen Hauge and
                  Ketil St{\o}len},
  editor       = {Jean{-}Louis Ferrier and
                  Alain Bernard and
                  Oleg Yu. Gusikhin and
                  Kurosh Madani},
  title        = {Towards Patterns for Handling Safety Critical Adaptive Control Software},
  booktitle    = {{ICINCO} 2011 - Proceedings of the 8th International Conference on
                  Informatics in Control, Automation and Robotics, Volume 1, Noordwijkerhout,
                  The Netherlands, 28 - 31 July, 2011},
  pages        = {211--214},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Fri, 07 Sep 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icinco/HaugeS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmt/SeehusenS11,
  author       = {Fredrik Seehusen and
                  Ketil St{\o}len},
  editor       = {Jordi Cabot and
                  Eelco Visser},
  title        = {An Evaluation of the Graphical Modeling Framework {(GMF)} Based on
                  the Development of the {CORAS} Tool},
  booktitle    = {Theory and Practice of Model Transformations - 4th International Conference,
                  ICMT@TOOLS 2011, Zurich, Switzerland, June 27-28, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6707},
  pages        = {152--166},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21732-6\_11},
  doi          = {10.1007/978-3-642-21732-6\_11},
  timestamp    = {Wed, 24 Jun 2020 13:02:21 +0200},
  biburl       = {https://dblp.org/rec/conf/icmt/SeehusenS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mesoca/LigaardenLRSS11,
  author       = {Olav S. Ligaarden and
                  Mass Soldal Lund and
                  Atle Refsdal and
                  Fredrik Seehusen and
                  Ketil St{\o}len},
  editor       = {Grace A. Lewis},
  title        = {An architectural pattern for enterprise level monitoring tools},
  booktitle    = {5th {IEEE} International Workshop on the Maintenance and Evolution
                  of Service-Oriented and Cloud-Based Systems, {MESOCA} 2011, Williamsburg,
                  VA, USA, September 26, 2011},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MESOCA.2011.6049035},
  doi          = {10.1109/MESOCA.2011.6049035},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mesoca/LigaardenLRSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ozchi/NilssonS11,
  author       = {Erik G. Nilsson and
                  Ketil St{\o}len},
  editor       = {Duncan Stevenson},
  title        = {Generic functionality in user interfaces for emergency response},
  booktitle    = {The Annual Meeting of the Australian Special Interest Group for Computer
                  Human Interaction, OzCHI '11, Canberra, Australia, November 28 - December
                  02, 2011},
  pages        = {233--242},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2071536.2071574},
  doi          = {10.1145/2071536.2071574},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ozchi/NilssonS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/plop/HaugeS11,
  author       = {Andr{\'{e}} Alexandersen Hauge and
                  Ketil St{\o}len},
  editor       = {Lise B. Hvatum},
  title        = {{SACS:} a pattern language for safe adaptive control software},
  booktitle    = {Proceedings of the 18th Conference on Pattern Languages of Programs,
                  PLoP 2011, Portland, Oregon, USA, October 21-23, 2011},
  pages        = {7:1--7:22},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2578903.2579145},
  doi          = {10.1145/2578903.2579145},
  timestamp    = {Tue, 06 Nov 2018 16:59:05 +0100},
  biburl       = {https://dblp.org/rec/conf/plop/HaugeS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/OmerovicSS11,
  author       = {Aida Omerovic and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  title        = {Evaluation of Experiences from Applying the {PREDIQT} Method in an
                  Industrial Case Study},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {137--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.20},
  doi          = {10.1109/SSIRI.2011.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/OmerovicSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SolhaugS11,
  author       = {Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Uncertainty, Subjectivity, Trust and Risk: How It All Fits together},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_1},
  doi          = {10.1007/978-3-642-29963-6\_1},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SolhaugS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/LundSS10,
  author       = {Mass Soldal Lund and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  title        = {Evolution in Relation to Risk and Trust Management},
  journal      = {Computer},
  volume       = {43},
  number       = {5},
  pages        = {49--55},
  year         = {2010},
  url          = {https://doi.org/10.1109/MC.2010.134},
  doi          = {10.1109/MC.2010.134},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/LundSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecr/HavaldsrudLMRSO10,
  author       = {Tormod V. H{\aa}valdsrud and
                  Olav S. Ligaarden and
                  Per Myrseth and
                  Atle Refsdal and
                  Ketil St{\o}len and
                  Jon {\O}lnes},
  title        = {Experiences from using a UML-based method for trust analysis in an
                  industrial project on electronic procurement},
  journal      = {Electron. Commer. Res.},
  volume       = {10},
  number       = {3-4},
  pages        = {441--467},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10660-010-9063-z},
  doi          = {10.1007/S10660-010-9063-Z},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecr/HavaldsrudLMRSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/BraendelandRS10,
  author       = {Gyrd Br{\ae}ndeland and
                  Atle Refsdal and
                  Ketil St{\o}len},
  title        = {Modular analysis and modelling of risk scenarios with dependencies},
  journal      = {J. Syst. Softw.},
  volume       = {83},
  number       = {10},
  pages        = {1995--2013},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.jss.2010.05.069},
  doi          = {10.1016/J.JSS.2010.05.069},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/BraendelandRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhocnets/NilssonS10,
  author       = {Erik G. Nilsson and
                  Ketil St{\o}len},
  editor       = {Jun Zheng and
                  David Simplot{-}Ryl and
                  Victor C. M. Leung},
  title        = {Ad Hoc Networks and Mobile Devices in Emergency Response - {A} Perfect
                  Match? - (Invited Paper)},
  booktitle    = {Ad Hoc Networks - Second International Conference, {ADHOCNETS} 2010,
                  Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {49},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17994-5\_2},
  doi          = {10.1007/978-3-642-17994-5\_2},
  timestamp    = {Mon, 01 Mar 2021 16:18:23 +0100},
  biburl       = {https://dblp.org/rec/conf/adhocnets/NilssonS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/OmerovicAGMRSO10,
  author       = {Aida Omerovic and
                  Anette Andresen and
                  H{\aa}vard Grindheim and
                  Per Myrseth and
                  Atle Refsdal and
                  Ketil St{\o}len and
                  Jon {\O}lnes},
  editor       = {Fabio Massacci and
                  Dan S. Wallach and
                  Nicola Zannone},
  title        = {Idea: {A} Feasibility Study in Model Based Prediction of Impact of
                  Changes on System Quality},
  booktitle    = {Engineering Secure Software and Systems, Second International Symposium,
                  ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5965},
  pages        = {231--240},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11747-3\_18},
  doi          = {10.1007/978-3-642-11747-3\_18},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/OmerovicAGMRSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/SeehusenS09,
  author       = {Fredrik Seehusen and
                  Ketil St{\o}len},
  title        = {Information flow security, abstraction and composition},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {9--33},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs:20080069},
  doi          = {10.1049/IET-IFS:20080069},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/SeehusenS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/SeehusenSS09,
  author       = {Fredrik Seehusen and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  title        = {Adherence preserving refinement of trace-set properties in {STAIRS:}
                  exemplified for information flow properties and policies},
  journal      = {Softw. Syst. Model.},
  volume       = {8},
  number       = {1},
  pages        = {45--65},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10270-008-0102-3},
  doi          = {10.1007/S10270-008-0102-3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sosym/SeehusenSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/RefsdalS09,
  author       = {Atle Refsdal and
                  Ketil St{\o}len},
  editor       = {Elena Ferrari and
                  Ninghui Li and
                  Elisa Bertino and
                  Y{\"{u}}cel Karabulut},
  title        = {Employing Key Indicators to Provide a Dynamic Risk Picture with a
                  Notion of Confidence},
  booktitle    = {Trust Management III, Third {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {300},
  pages        = {215--233},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02056-8\_14},
  doi          = {10.1007/978-3-642-02056-8\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/RefsdalS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/OmerovicS09,
  author       = {Aida Omerovic and
                  Ketil St{\o}len},
  title        = {Simplifying Parametrization of Bayesian Networks in Prediction of
                  System Quality},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {447--448},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.36},
  doi          = {10.1109/SSIRI.2009.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/OmerovicS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/RefsdalS08,
  author       = {Atle Refsdal and
                  Ketil St{\o}len},
  title        = {Extending {UML} sequence diagrams to model trust-dependent behavior
                  with the aim to support risk analysis},
  journal      = {Sci. Comput. Program.},
  volume       = {74},
  number       = {1-2},
  pages        = {34--42},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.scico.2008.09.003},
  doi          = {10.1016/J.SCICO.2008.09.003},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/RefsdalS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SolhaugS08,
  author       = {Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {Compositional Refinement of Policies in {UML} - Exemplified for Access
                  Control},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {300--316},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_20},
  doi          = {10.1007/978-3-540-88313-5\_20},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SolhaugS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/RefsdalSS08,
  author       = {Atle Refsdal and
                  Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  editor       = {Y{\"{u}}cel Karabulut and
                  John Mitchell and
                  Peter Herrmann and
                  Christian Damsgaard Jensen},
  title        = {A UML-based Method for the Development of Policies to Support Trust
                  Management},
  booktitle    = {Trust Management {II} - Proceedings of {IFIPTM} 2008: Joint iTrust
                  and {PST} Conferences on Privacy, Trust Management and Security, June
                  18-20, 2008, Trondheim, Norway},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {263},
  pages        = {33--49},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09428-1\_3},
  doi          = {10.1007/978-0-387-09428-1\_3},
  timestamp    = {Fri, 09 Apr 2021 18:43:37 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/RefsdalSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/SeehusenS08,
  author       = {Fredrik Seehusen and
                  Ketil St{\o}len},
  title        = {A Transformational Approach to Facilitate Monitoring of High-Level
                  Policies},
  booktitle    = {9th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York,
                  {USA}},
  pages        = {70--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/POLICY.2008.21},
  doi          = {10.1109/POLICY.2008.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/SeehusenS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008qop,
  editor       = {Andy Ozment and
                  Ketil St{\o}len},
  title        = {Proceedings of the 4th {ACM} Workshop on Quality of Protection, QoP
                  2008, Alexandria, VA, USA, October 27, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  isbn         = {978-1-60558-321-1},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2008qop.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/BraendelandDES07,
  author       = {Gyrd Br{\ae}ndeland and
                  Heidi E. I. Dahl and
                  Iselin Engan and
                  Ketil St{\o}len},
  editor       = {Javier L{\'{o}}pez and
                  Bernhard M. H{\"{a}}mmerli},
  title        = {Using Dependent {CORAS} Diagrams to Analyse Mutual Dependency},
  booktitle    = {Critical Information Infrastructures Security, Second International
                  Workshop, {CRITIS} 2007, M{\'{a}}laga, Spain, October 3-5, 2007.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5141},
  pages        = {135--148},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-89173-4\_12},
  doi          = {10.1007/978-3-540-89173-4\_12},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/BraendelandDES07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/LundRS07,
  author       = {Mass Soldal Lund and
                  Atle Refsdal and
                  Ketil St{\o}len},
  editor       = {Holger Giese and
                  Gabor Karsai and
                  Edward Lee and
                  Bernhard Rumpe and
                  Bernhard Sch{\"{a}}tz},
  title        = {Semantics of {UML} Models for Dynamic Behavior - {A} Survey of Different
                  Approaches},
  booktitle    = {Model-Based Engineering of Embedded Real-Time Systems - International
                  Dagstuhl Workshop, Dagstuhl Castle, Germany, November 4-9, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6100},
  pages        = {77--103},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-16277-0\_4},
  doi          = {10.1007/978-3-642-16277-0\_4},
  timestamp    = {Sat, 30 Sep 2023 09:38:34 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/LundRS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/SolhaugES07,
  author       = {Bj{\o}rnar Solhaug and
                  Dag Elgesem and
                  Ketil St{\o}len},
  title        = {Specifying Policies Using {UML} Sequence Diagrams - An Evaluation
                  Based on a Case Study},
  booktitle    = {8th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy},
  pages        = {19--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/POLICY.2007.42},
  doi          = {10.1109/POLICY.2007.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/SolhaugES07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/RefsdalS08,
  author       = {Atle Refsdal and
                  Ketil St{\o}len},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Extending {UML} Sequence Diagrams to Model Trust-dependent Behavior
                  With the Aim to Support Risk Analysis},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {15--29},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.014},
  doi          = {10.1016/J.ENTCS.2007.12.014},
  timestamp    = {Mon, 13 Feb 2023 09:13:20 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/RefsdalS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007qop,
  editor       = {G{\"{u}}nter Karjoth and
                  Ketil St{\o}len},
  title        = {Proceedings of the 3th {ACM} Workshop on Quality of Protection, QoP
                  2007, Alexandria, VA, USA, October 29, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-885-5},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2007qop.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BraendelandS06,
  author       = {Gyrd Br{\ae}ndeland and
                  Ketil St{\o}len},
  editor       = {G{\"{u}}nter Karjoth and
                  Fabio Massacci},
  title        = {Using model-based security analysis in component-oriented system development},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Quality of Protection, QoP
                  2006, Alexandria, VA, USA, October 30, 2006},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179494.1179498},
  doi          = {10.1145/1179494.1179498},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BraendelandS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/LundS06,
  author       = {Mass Soldal Lund and
                  Ketil St{\o}len},
  editor       = {Jayadev Misra and
                  Tobias Nipkow and
                  Emil Sekerinski},
  title        = {A Fully General Operational Semantics for {UML} 2.0 Sequence Diagrams
                  with Potential and Mandatory Choice},
  booktitle    = {{FM} 2006: Formal Methods, 14th International Symposium on Formal
                  Methods, Hamilton, Canada, August 21-27, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4085},
  pages        = {380--395},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11813040\_26},
  doi          = {10.1007/11813040\_26},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/LundS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmoods/RefsdalRS06,
  author       = {Atle Refsdal and
                  Ragnhild Kobro Runde and
                  Ketil St{\o}len},
  editor       = {Roberto Gorrieri and
                  Heike Wehrheim},
  title        = {Underspecification, Inherent Nondeterminism and Probability in Sequence
                  Diagrams},
  booktitle    = {Formal Methods for Open Object-Based Distributed Systems, 8th {IFIP}
                  {WG} 6.1 International Conference, {FMOODS} 2006, Bologna, Italy,
                  June 14-16, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4037},
  pages        = {138--155},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11768869\_12},
  doi          = {10.1007/11768869\_12},
  timestamp    = {Thu, 14 Oct 2021 10:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/fmoods/RefsdalRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/LundS06,
  author       = {Mass Soldal Lund and
                  Ketil St{\o}len},
  editor       = {Hong Zhu and
                  Joseph R. Horgan and
                  Shing{-}Chi Cheung and
                  J. Jenny Li},
  title        = {Deriving Tests from {UML} 2.0 Sequence Diagrams with neg and assert},
  booktitle    = {Proceedings of the 2006 International Workshop on Automation of Software
                  Test, {AST} 2006, Shanghai, China, May 23, 2006},
  pages        = {22--28},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1138929.1138934},
  doi          = {10.1145/1138929.1138934},
  timestamp    = {Thu, 30 Apr 2020 12:10:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/LundS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iesa/WilsonACDDGGGHSMMPRSST06,
  author       = {Michael D. Wilson and
                  Alvaro Arenas and
                  David W. Chadwick and
                  Theo Dimitrakos and
                  J{\"{u}}rgen Doser and
                  Pablo Giambiagi and
                  David Golby and
                  Christian Geuer{-}Pollmann and
                  Jochen Haller and
                  Ketil St{\o}len and
                  Tobias Mahler and
                  Lorenzo Martino and
                  Xavier Parent and
                  Santi Ristol and
                  J. Sairamesh and
                  Lutz Schubert and
                  Nilufer Tuptuk},
  editor       = {Guy Doumeingts and
                  J{\"{o}}rg P. M{\"{u}}ller and
                  G{\'{e}}rard Morel and
                  Bruno Vallespir},
  title        = {The TrustCoM Approach to Enforcing Agreements between Interoperating
                  Enterprises},
  booktitle    = {Enterprise Interoperability, New Challenges and Approaches, Proceedings
                  of the 2nd International Conference on Interoperability for Enterprise
                  Software and Applications, {I-ESA} 2006, March 22-24, 2006, Bordeaux,
                  France},
  pages        = {365--375},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-1-84628-714-5\_34},
  doi          = {10.1007/978-1-84628-714-5\_34},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iesa/WilsonACDDGGGHSMMPRSST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/BraendelandS06,
  author       = {Gyrd Br{\ae}ndeland and
                  Ketil St{\o}len},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {A Semantic Paradigm for Component-Based Specification Integrating
                  a Notion of Security Risk},
  booktitle    = {Formal Aspects in Security and Trust, Fourth International Workshop,
                  {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4691},
  pages        = {31--46},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-75227-1\_3},
  doi          = {10.1007/978-3-540-75227-1\_3},
  timestamp    = {Sun, 02 Oct 2022 16:07:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/BraendelandS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/SeehusenS06,
  author       = {Fredrik Seehusen and
                  Ketil St{\o}len},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Maintaining Information Flow Security Under Refinement and Transformation},
  booktitle    = {Formal Aspects in Security and Trust, Fourth International Workshop,
                  {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4691},
  pages        = {143--157},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-75227-1\_10},
  doi          = {10.1007/978-3-540-75227-1\_10},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/SeehusenS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/HogganvikS06,
  author       = {Ida Hogganvik and
                  Ketil St{\o}len},
  editor       = {Oscar Nierstrasz and
                  Jon Whittle and
                  David Harel and
                  Gianna Reggio},
  title        = {A Graphical Approach to Risk Identification, Motivated by Empirical
                  Investigations},
  booktitle    = {Model Driven Engineering Languages and Systems, 9th International
                  Conference, MoDELS 2006, Genova, Italy, October 1-6, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4199},
  pages        = {574--588},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11880240\_40},
  doi          = {10.1007/11880240\_40},
  timestamp    = {Tue, 24 May 2022 15:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/models/HogganvikS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/SeehusenS06,
  author       = {Fredrik Seehusen and
                  Ketil St{\o}len},
  editor       = {David F. Ferraiolo and
                  Indrakshi Ray},
  title        = {Information flow property preserving transformation of {UML} interaction
                  diagrams},
  booktitle    = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings},
  pages        = {150--159},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1133058.1133080},
  doi          = {10.1145/1133058.1133080},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/SeehusenS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/itrust/2006,
  editor       = {Ketil St{\o}len and
                  William H. Winsborough and
                  Fabio Martinelli and
                  Fabio Massacci},
  title        = {Trust Management, 4th International Conference, iTrust 2006, Pisa,
                  Italy, May 16-19, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3986},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11755593},
  doi          = {10.1007/11755593},
  isbn         = {3-540-34295-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itrust/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcit-igi/BraberMNSV05,
  author       = {Folker den Braber and
                  Arne Bj{\o}rn Mildal and
                  Jone Nes and
                  Ketil St{\o}len and
                  Fredrik Vraalsen},
  title        = {Experiences from Using the {CORAS} Methodology to Analyze a Web Application},
  journal      = {J. Cases Inf. Technol.},
  volume       = {7},
  number       = {3},
  pages        = {110--130},
  year         = {2005},
  url          = {https://doi.org/10.4018/jcit.2005070107},
  doi          = {10.4018/JCIT.2005070107},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcit-igi/BraberMNSV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/njc/RundeHS05,
  author       = {Ragnhild Kobro Runde and
                  {\O}ystein Haugen and
                  Ketil St{\o}len},
  title        = {Refining {UML} Interactions with Underspecification and Nondeterminism},
  journal      = {Nord. J. Comput.},
  volume       = {12},
  number       = {2},
  pages        = {157--188},
  year         = {2005},
  timestamp    = {Wed, 03 May 2006 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/njc/RundeHS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/HaugenHRS05,
  author       = {{\O}ystein Haugen and
                  Knut Eilif Husa and
                  Ragnhild Kobro Runde and
                  Ketil St{\o}len},
  title        = {{STAIRS} towards formal design with sequence diagrams},
  journal      = {Softw. Syst. Model.},
  volume       = {4},
  number       = {4},
  pages        = {355--367},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10270-005-0087-0},
  doi          = {10.1007/S10270-005-0087-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sosym/HaugenHRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmco/RundeHS05,
  author       = {Ragnhild Kobro Runde and
                  {\O}ystein Haugen and
                  Ketil St{\o}len},
  editor       = {Frank S. de Boer and
                  Marcello M. Bonsangue and
                  Susanne Graf and
                  Willem P. de Roever},
  title        = {The Pragmatics of {STAIRS}},
  booktitle    = {Formal Methods for Components and Objects, 4th International Symposium,
                  {FMCO} 2005, Amsterdam, The Netherlands, November 1-4, 2005, Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {4111},
  pages        = {88--114},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11804192\_5},
  doi          = {10.1007/11804192\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fmco/RundeHS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/formats/RefsdalHS05,
  author       = {Atle Refsdal and
                  Knut Eilif Husa and
                  Ketil St{\o}len},
  editor       = {Paul Pettersson and
                  Wang Yi},
  title        = {Specification and Refinement of Soft Real-Time Requirements Using
                  Sequence Diagrams},
  booktitle    = {Formal Modeling and Analysis of Timed Systems, Third International
                  Conference, {FORMATS} 2005, Uppsala, Sweden, September 26-28, 2005,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3829},
  pages        = {32--48},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11603009\_4},
  doi          = {10.1007/11603009\_4},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/formats/RefsdalHS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/SeehusenS05,
  author       = {Fredrik Seehusen and
                  Ketil St{\o}len},
  editor       = {Chin{-}Sheng Chen and
                  Joaquim Filipe and
                  Isabel Seruca and
                  Jos{\'{e}} Cordeiro},
  title        = {Graphical Specification of Dynamic Network Structure},
  booktitle    = {{ICEIS} 2005, Proceedings of the Seventh International Conference
                  on Enterprise Information Systems, Miami, USA, May 25-28, 2005},
  pages        = {203--210},
  year         = {2005},
  timestamp    = {Thu, 02 Feb 2017 12:53:54 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/SeehusenS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isese/HogganvikS05,
  author       = {Ida Hogganvik and
                  Ketil St{\o}len},
  title        = {Risk analysis terminology for IT-systems: does it match intuition?},
  booktitle    = {2005 International Symposium on Empirical Software Engineering {(ISESE}
                  2005), 17-18 November 2005, Noosa Heads, Australia},
  pages        = {13--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISESE.2005.1541810},
  doi          = {10.1109/ISESE.2005.1541810},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isese/HogganvikS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itrust/VraalsenLMPS05,
  author       = {Fredrik Vraalsen and
                  Mass Soldal Lund and
                  Tobias Mahler and
                  Xavier Parent and
                  Ketil St{\o}len},
  editor       = {Peter Herrmann and
                  Val{\'{e}}rie Issarny and
                  Simon Shiu},
  title        = {Specifying Legal Risk Scenarios Using the {CORAS} Threat Modelling
                  Language},
  booktitle    = {Trust Management, Third International Conference, iTrust 2005, Paris,
                  France, May 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3477},
  pages        = {45--60},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11429760\_4},
  doi          = {10.1007/11429760\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/itrust/VraalsenLMPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itrust/VraalsenBLS05,
  author       = {Fredrik Vraalsen and
                  Folker den Braber and
                  Mass Soldal Lund and
                  Ketil St{\o}len},
  editor       = {Peter Herrmann and
                  Val{\'{e}}rie Issarny and
                  Simon Shiu},
  title        = {The {CORAS} Tool for Security Risk Analysis},
  booktitle    = {Trust Management, Third International Conference, iTrust 2005, Paris,
                  France, May 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3477},
  pages        = {402--405},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11429760\_30},
  doi          = {10.1007/11429760\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itrust/VraalsenBLS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/HogganvikS05,
  author       = {Ida Hogganvik and
                  Ketil St{\o}len},
  title        = {On the Comprehension of Security Risk Scenarios},
  booktitle    = {13th International Workshop on Program Comprehension {(IWPC} 2005),
                  15-16 May 2005, St. Louis, MO, {USA}},
  pages        = {115--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/WPC.2005.27},
  doi          = {10.1109/WPC.2005.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwpc/HogganvikS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/idea/encyclopedia2005/BraberLSV05,
  author       = {Folker den Braber and
                  Mass Soldal Lund and
                  Ketil St{\o}len and
                  Fredrik Vraalsen},
  editor       = {Mehdi Khosrow{-}Pour},
  title        = {Integrating Security in the Development Process with {UML}},
  booktitle    = {Encyclopedia of Information Science and Technology {(5} Volumes)},
  pages        = {1560--1566},
  publisher    = {Idea Group},
  year         = {2005},
  url          = {http://www.igi-global.com/Bookstore/Chapter.aspx?TitleId=14474},
  timestamp    = {Sun, 09 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/idea/encyclopedia2005/BraberLSV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itrust/BraendelandS04,
  author       = {Gyrd Br{\ae}ndeland and
                  Ketil St{\o}len},
  editor       = {Christian Damsgaard Jensen and
                  Stefan Poslad and
                  Theodosis Dimitrakos},
  title        = {Using Risk Analysis to Assess User Trust: {A} Net-Bank Scenario},
  booktitle    = {Trust Management, Second International Conference, iTrust 2004, Oxford,
                  UK, March 29 - April 1, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2995},
  pages        = {146--160},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24747-0\_12},
  doi          = {10.1007/978-3-540-24747-0\_12},
  timestamp    = {Sun, 02 Oct 2022 16:10:26 +0200},
  biburl       = {https://dblp.org/rec/conf/itrust/BraendelandS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csmr/LundBS03,
  author       = {Mass Soldal Lund and
                  Folker den Braber and
                  Ketil St{\o}len},
  title        = {Maintaining Results from Security Assessment},
  booktitle    = {7th European Conference on Software Maintenance and Reengineering
                  {(CSMR} 2003), 26-28 March 2003, Benevento, Italy, Proceedings},
  pages        = {341--350},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSMR.2003.1192442},
  doi          = {10.1109/CSMR.2003.1192442},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csmr/LundBS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/HaugenHRS03,
  author       = {{\O}ystein Haugen and
                  Knut Eilif Husa and
                  Ragnhild Kobro Runde and
                  Ketil St{\o}len},
  editor       = {Stefan Leue and
                  Tarja Syst{\"{a}}},
  title        = {Why Timed Sequence Diagrams Require Three-Event Semantics},
  booktitle    = {Scenarios: Models, Transformations and Tools, International Workshop,
                  Dagstuhl Castle, Germany, September 7-12, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3466},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11495628\_1},
  doi          = {10.1007/11495628\_1},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/HaugenHRS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mie/StamatiouSHSSCA03,
  author       = {Yannis C. Stamatiou and
                  Eva Skipenes and
                  Eva Henriksen and
                  Nikos Stathiakis and
                  Adamantios Sikianakis and
                  Eliana Charalambous and
                  Nikos Antonakis and
                  Ketil St{\o}len and
                  Folker den Braber and
                  Mass Soldal Lund and
                  Katerina Papadaki and
                  George Valvis},
  editor       = {Robert H. Baud and
                  Marius Fieschi and
                  Pierre Le Beux and
                  Patrick Ruch},
  title        = {The {CORAS} approach for model-based risk management applied to a
                  telemedicine service},
  booktitle    = {The New Navigators: from Professionals to Patients - Proceedings of
                  MIE2003, Saint Malo, France},
  series       = {Studies in Health Technology and Informatics},
  volume       = {95},
  pages        = {206--211},
  publisher    = {{IOS} Press},
  year         = {2003},
  url          = {https://doi.org/10.3233/978-1-60750-939-4-206},
  doi          = {10.3233/978-1-60750-939-4-206},
  timestamp    = {Sat, 30 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mie/StamatiouSHSSCA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uml/HaugenS03,
  author       = {{\O}ystein Haugen and
                  Ketil St{\o}len},
  editor       = {Perdita Stevens and
                  Jon Whittle and
                  Grady Booch},
  title        = {{STAIRS} - Steps to Analyze Interactions with Refinement Semantics},
  booktitle    = {{\guillemotleft}UML{\guillemotright} 2003 - The Unified Modeling Language,
                  Modeling Languages and Applications, 6th International Conference,
                  San Francisco, CA, USA, October 20-24, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2863},
  pages        = {388--402},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45221-8\_33},
  doi          = {10.1007/978-3-540-45221-8\_33},
  timestamp    = {Tue, 24 May 2022 15:28:50 +0200},
  biburl       = {https://dblp.org/rec/conf/uml/HaugenS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/RaptisDGS02,
  author       = {Dimitris Raptis and
                  Theodosis Dimitrakos and
                  Bj{\o}rn Axel Gran and
                  Ketil St{\o}len},
  editor       = {Borka Jerman{-}Blazic and
                  Tomaz Klobucar},
  title        = {The coras approach for model-based risk management applied to e-commerce
                  domain},
  booktitle    = {Advanced Communications and Multimedia Security, {IFIP} {TC6/TC11}
                  Sixth Joint Working Conference on Communications and Multimedia Security,
                  September 26-27, 2002, Portoroz, Slovenia},
  series       = {{IFIP} Conference Proceedings},
  volume       = {228},
  pages        = {169--181},
  publisher    = {Kluwer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-0-387-35612-9\_13},
  doi          = {10.1007/978-0-387-35612-9\_13},
  timestamp    = {Thu, 25 Jul 2019 12:26:02 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/RaptisDGS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/AagedalBDGRS02,
  author       = {Jan {\O}yvind Aagedal and
                  Folker den Braber and
                  Theodosis Dimitrakos and
                  Bj{\o}rn Axel Gran and
                  Dimitris Raptis and
                  Ketil St{\o}len},
  title        = {Model-Based Risk Assessment to Improve Enterprise Security},
  booktitle    = {6th International Enterprise Distributed Object Computing Conference
                  {(EDOC} 2002), 17-20 September 2002, Lausanne, Switzerland, Proceedings},
  pages        = {51},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/EDOC.2002.1137696},
  doi          = {10.1109/EDOC.2002.1137696},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/AagedalBDGRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euroweb/DimitrakosRRS02,
  author       = {Theodosis Dimitrakos and
                  Dimitris Raptis and
                  Brian Ritchie and
                  Ketil St{\o}len},
  editor       = {Brian Matthews and
                  F. Robert A. Hopgood and
                  Michael D. Wilson},
  title        = {Model Based Security Risk Analysis for Web Applications},
  booktitle    = {The Web and the Grid: from e-science to e-business. EuroWeb 2002 Conference,
                  St Anne's College, Oxford, {UK.} 17-18 December 2002},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2002},
  url          = {http://ewic.bcs.org/content/ConWebDoc/4078},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/euroweb/DimitrakosRRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i3e/DimitrakosRRABSH02,
  author       = {Theodosis Dimitrakos and
                  Brian Ritchie and
                  Dimitris Raptis and
                  Jan {\O}yvind Aagedal and
                  Folker den Braber and
                  Ketil St{\o}len and
                  Siv Hilde Houmb},
  editor       = {Jo{\~{a}}o L. Monteiro and
                  Paula M. C. Swatman and
                  Lu{\'{\i}}s Valadares Tavares},
  title        = {Integrating Model-based Security Risk Management into eBusiness Systems
                  Development: The {CORAS} Approach},
  booktitle    = {Towards The Knowledge Society: eCommerce, eBusiness, and eGovernment,
                  The Second {IFIP} Conference on E-Commerce, E-Business, E-Government
                  {(I3E} 2002), October 7-9, 2002, Lisbon, Portugal},
  series       = {{IFIP} Conference Proceedings},
  volume       = {233},
  pages        = {159--175},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 09 Oct 2002 13:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/i3e/DimitrakosRRABSH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/FredriksenKGSOD02,
  author       = {Rune Fredriksen and
                  Monica Kristiansen and
                  Bj{\o}rn Axel Gran and
                  Ketil St{\o}len and
                  Tom Arthur Opperud and
                  Theodosis Dimitrakos},
  editor       = {Stuart Anderson and
                  Sandro Bologna and
                  Massimo Felici},
  title        = {The {CORAS} Framework for a Model-Based Risk Management Process},
  booktitle    = {Computer Safety, Reliability and Security, 21st International Conference,
                  {SAFECOMP} 2002, Catania, Italy, September 10-13, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2434},
  pages        = {94--105},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45732-1\_11},
  doi          = {10.1007/3-540-45732-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/FredriksenKGSOD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/mcs/BroyS01,
  author       = {Manfred Broy and
                  Ketil St{\o}len},
  title        = {Specification and Development of Interactive Systems - Focus on Streams,
                  Interfaces, and Refinement},
  series       = {Monographs in Computer Science},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4613-0091-5},
  doi          = {10.1007/978-1-4613-0091-5},
  isbn         = {978-1-4612-6518-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/mcs/BroyS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/GrosuS01,
  author       = {Radu Grosu and
                  Ketil St{\o}len},
  title        = {Stream-Based Specification of Mobile Systems},
  journal      = {Formal Aspects Comput.},
  volume       = {13},
  number       = {1},
  pages        = {1--31},
  year         = {2001},
  url          = {https://doi.org/10.1007/PL00003937},
  doi          = {10.1007/PL00003937},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/GrosuS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sam/StolenM00,
  author       = {Ketil St{\o}len and
                  P. Mohn},
  editor       = {Edel Sherratt},
  title        = {Experience from Using MSC, {UML} and {SDL} in the Development of the
                  {FAME} Communication Manager},
  booktitle    = {{SAM} 2000, 2nd Workshop on {SDL} and MSC, Col de Porte, Grenoble,
                  France, June 26-28, 2000},
  pages        = {276},
  publisher    = {VERIMAG, IRISA, {SDL} Forum},
  year         = {2000},
  timestamp    = {Thu, 16 Oct 2003 15:31:41 +0200},
  biburl       = {https://dblp.org/rec/conf/sam/StolenM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmoods/Stoelen99,
  author       = {Ketil St{\o}len},
  editor       = {Paolo Ciancarini and
                  Alessandro Fantechi and
                  Roberto Gorrieri},
  title        = {Specification of Dynamic Reconfiguration in the Context of Input/Output
                  Relations},
  booktitle    = {Formal Methods for Open Object-Based Distributed Systems, {IFIF} {TC6/WG6.1}
                  Third International Conference on Formal Methods for Open Object-Based
                  Distributed Systems (FMOODS), February 15-18, 1999, Florence, Italy},
  series       = {{IFIP} Conference Proceedings},
  volume       = {139},
  publisher    = {Kluwer},
  year         = {1999},
  timestamp    = {Wed, 14 Jan 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fmoods/Stoelen99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nada/StolenF98,
  author       = {Ketil St{\o}len and
                  Max Fuchs},
  editor       = {Bernhard M{\"{o}}ller and
                  John V. Tucker},
  title        = {An Exercise in Conditional Refinement},
  booktitle    = {Prospects for Hardware Foundations, {ESPRIT} Working Group 8533, {NADA}
                  - New Hardware Design Methods, Survey Chapters},
  series       = {Lecture Notes in Computer Science},
  volume       = {1546},
  pages        = {390--420},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49254-2\_12},
  doi          = {10.1007/3-540-49254-2\_12},
  timestamp    = {Fri, 12 Jul 2019 14:39:18 +0200},
  biburl       = {https://dblp.org/rec/conf/nada/StolenF98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/StolenDW96,
  author       = {Ketil St{\o}len and
                  Frank Dederichs and
                  Rainer Weber},
  title        = {Specification and Refinement of Networks of Asynchronously Communicating
                  Agents Using the Assumption/Commitment Paradigm},
  journal      = {Formal Aspects Comput.},
  volume       = {8},
  number       = {2},
  pages        = {127--161},
  year         = {1996},
  url          = {https://doi.org/10.1007/BF01214554},
  doi          = {10.1007/BF01214554},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/StolenDW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/Stolen96,
  author       = {Ketil St{\o}len},
  title        = {Refinement Principles Supporting the Transition from Asynchronous
                  to Synchronous Communication},
  journal      = {Sci. Comput. Program.},
  volume       = {26},
  number       = {1-3},
  pages        = {255--272},
  year         = {1996},
  url          = {https://doi.org/10.1016/0167-6423(95)00031-3},
  doi          = {10.1016/0167-6423(95)00031-3},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/Stolen96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amast/GrosuS96,
  author       = {Radu Grosu and
                  Ketil St{\o}len},
  editor       = {Martin Wirsing and
                  Maurice Nivat},
  title        = {A Model for Mobile Point-to-Point Data-flow Networks without Channel
                  Sharing},
  booktitle    = {Algebraic Methodology and Software Technology, 5th International Conference,
                  {AMAST} '96, Munich, Germany, July 1-5, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1101},
  pages        = {504--519},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0014336},
  doi          = {10.1007/BFB0014336},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/amast/GrosuS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/Stolen96,
  author       = {Ketil St{\o}len},
  editor       = {Hanne Riis Nielson},
  title        = {Assumption/Commitment Rules for Dataflow Networks - With an Emphasis
                  on Completeness},
  booktitle    = {Programming Languages and Systems - ESOP'96, 6th European Symposium
                  on Programming, Link{\"{o}}ping, Sweden, April 22-24, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1058},
  pages        = {356--372},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61055-3\_48},
  doi          = {10.1007/3-540-61055-3\_48},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/Stolen96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mpc/Stolen95,
  author       = {Ketil St{\o}len},
  editor       = {Bernhard M{\"{o}}ller},
  title        = {A Refinement Relation Supporting the Transition from Unbounded to
                  Bounded Communication Buffers},
  booktitle    = {Mathematics of Program Construction, MPC'95, Kloster Irsee, Germany,
                  July 17-21, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {947},
  pages        = {423--451},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60117-1\_23},
  doi          = {10.1007/3-540-60117-1\_23},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/mpc/Stolen95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/Stolen94,
  author       = {Ketil St{\o}len},
  editor       = {Manfred Broy and
                  Stephan Merz and
                  Katharina Spies},
  title        = {Using Relations to Solve the RPC-Memory Specification Problem},
  booktitle    = {Formal Systems Specification, The RPC-Memory Specification Case Study
                  (the book grow out of a Dagstuhl Seminar, September 1994)},
  series       = {Lecture Notes in Computer Science},
  volume       = {1169},
  pages        = {477--520},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0024439},
  doi          = {10.1007/BFB0024439},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/Stolen94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/HolzS94,
  author       = {Eckhardt Holz and
                  Ketil St{\o}len},
  editor       = {Dieter Hogrefe and
                  Stefan Leue},
  title        = {An attempt to embed a restricted version of {SDL} as a target language
                  in Focus},
  booktitle    = {Formal Description Techniques VII, Proceedings of the 7th {IFIP} {WG6.1}
                  International Conference on Formal Description Techniques, Berne,
                  Switzerland, 1994},
  series       = {{IFIP} Conference Proceedings},
  volume       = {6},
  pages        = {324--339},
  publisher    = {Chapman {\&} Hall},
  year         = {1994},
  timestamp    = {Thu, 03 Jan 2002 11:58:39 +0100},
  biburl       = {https://dblp.org/rec/conf/forte/HolzS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ftrtft/BroyS94,
  author       = {Manfred Broy and
                  Ketil St{\o}len},
  editor       = {Hans Langmaack and
                  Willem P. de Roever and
                  Jan Vytopil},
  title        = {Specification and Refinement of Finite Dataflow Networks - a Relational
                  Approach},
  booktitle    = {Formal Techniques in Real-Time and Fault-Tolerant Systems, Third International
                  Symposium Organized Jointly with the Working Group Provably Correct
                  Systems - ProCoS, L{\"{u}}beck, Germany, September 19-23, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {863},
  pages        = {247--267},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58468-4\_169},
  doi          = {10.1007/3-540-58468-4\_169},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ftrtft/BroyS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:tr/tum/TUM-I-9303,
  author       = {Ketil St{\o}len and
                  Frank Dederichs and
                  Rainer Weber},
  title        = {Assumption, commitment rules for networks of asynchronously communicating
                  agents},
  journal      = {Forschungsberichte, {TU} Munich},
  volume       = {{TUM} {I} 9303},
  pages        = {1--47},
  year         = {1993},
  url          = {https://d-nb.info/943359414},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/tr/tum/TUM-I-9303.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:tr/tum/TUM-I-9338,
  author       = {Max Fuchs and
                  Ketil St{\o}len},
  title        = {Development of a distributed min max component},
  journal      = {Forschungsberichte, {TU} Munich},
  volume       = {{TUM} {I} 9338},
  pages        = {1--26},
  year         = {1993},
  url          = {https://d-nb.info/941682358},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/tr/tum/TUM-I-9338.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/Stolen92,
  author       = {Ketil St{\o}len},
  editor       = {Michel Diaz and
                  Roland Groz},
  title        = {Shared-state design modulo weak and strong process fairness},
  booktitle    = {Formal Description Techniques, V, Proceedings of the {IFIP} {TC6/WG6.1}
                  Fifth International Conference on Formal Description Techniques for
                  Distributed Systems and Communication Protocols, {FORTE} '92, Perros-Guirec,
                  France, 13-16 October 1992},
  series       = {{IFIP} Transactions},
  volume       = {{C-10}},
  pages        = {479--498},
  publisher    = {North-Holland},
  year         = {1992},
  timestamp    = {Thu, 04 Nov 2004 11:08:03 +0100},
  biburl       = {https://dblp.org/rec/conf/forte/Stolen92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/refine/Stolen92,
  author       = {Ketil St{\o}len},
  editor       = {Cliff B. Jones and
                  Roger C. Shaw and
                  B. Tim Denvir},
  title        = {Proving Total Correctness with Respect to a Fair (Shared-State) Parallel
                  Language},
  booktitle    = {5th Refinement Workshop, Proceedings of the 5th Refinement Workshop,
                  organised by BCS-FACS, London, 8-10 January 1992},
  series       = {Workshops in Computing},
  pages        = {320--341},
  publisher    = {Springer London},
  year         = {1992},
  url          = {https://doi.org/10.1007/978-1-4471-3550-0\_17},
  doi          = {10.1007/978-1-4471-3550-0\_17},
  timestamp    = {Tue, 20 Aug 2019 12:53:32 +0200},
  biburl       = {https://dblp.org/rec/conf/refine/Stolen92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/Stolen91,
  author       = {Ketil St{\o}len},
  editor       = {Jos C. M. Baeten and
                  Jan Friso Groote},
  title        = {A Method for the Development of Totally Correct Shared-State Parallel
                  Programs},
  booktitle    = {{CONCUR} '91, 2nd International Conference on Concurrency Theory,
                  Amsterdam, The Netherlands, August 26-29, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {527},
  pages        = {510--525},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54430-5\_110},
  doi          = {10.1007/3-540-54430-5\_110},
  timestamp    = {Fri, 27 Mar 2020 08:51:56 +0100},
  biburl       = {https://dblp.org/rec/conf/concur/Stolen91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/Stolen91,
  author       = {Ketil St{\o}len},
  editor       = {S{\o}ren Prehn and
                  W. J. Toetenel},
  title        = {An Attempt to Reason about Shared-State Concurrency in the Style of
                  {VDM}},
  booktitle    = {{VDM} '91 - Formal Software Development, 4th International Symposium
                  of {VDM} Europe, Noordwijkerhout, The Netherlands, October 21-25,
                  1991, Proceedings, Volume 1: Conference Contributions},
  series       = {Lecture Notes in Computer Science},
  volume       = {551},
  pages        = {324--342},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54834-3\_20},
  doi          = {10.1007/3-540-54834-3\_20},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/Stolen91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics