Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ketil Stølen
@book{DBLP:books/sp/Stolen23, author = {Ketil St{\o}len}, title = {Technology Research Explained - Design of Software, Architectures, Methods, and Technology in General}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-25817-6}, doi = {10.1007/978-3-031-25817-6}, isbn = {978-3-031-25816-9}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/Stolen23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/TokasES23, author = {Shukun Tokas and Gencer Erdogan and Ketil St{\o}len}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Privacy-Aware IoT: State-of-the-Art and Challenges}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {450--461}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011656400003405}, doi = {10.5220/0011656400003405}, timestamp = {Thu, 11 May 2023 10:52:54 +0200}, biburl = {https://dblp.org/rec/conf/icissp/TokasES23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/enase/WirtzHMOS18, author = {Roman Wirtz and Maritta Heisel and Rene Meis and Aida Omerovic and Ketil St{\o}len}, editor = {Ernesto Damiani and George Spanoudakis and Leszek A. Maciaszek}, title = {Problem-based Elicitation of Security Requirements - The ProCOR Method}, booktitle = {Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, {ENASE} 2018, Funchal, Madeira, Portugal, March 23-24, 2018}, pages = {26--38}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006669400260038}, doi = {10.5220/0006669400260038}, timestamp = {Mon, 30 Apr 2018 14:58:10 +0200}, biburl = {https://dblp.org/rec/conf/enase/WirtzHMOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/enase/WirtzHBMOS18, author = {Roman Wirtz and Maritta Heisel and Angela Borchert and Rene Meis and Aida Omerovic and Ketil St{\o}len}, editor = {Ernesto Damiani and George Spanoudakis and Leszek A. Maciaszek}, title = {Risk-Based Elicitation of Security Requirements According to the {ISO} 27005 Standard}, booktitle = {Evaluation of Novel Approaches to Software Engineering - 13th International Conference, {ENASE} 2018, Funchal, Madeira, Portugal, March 23-24, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1023}, pages = {71--97}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-22559-9\_4}, doi = {10.1007/978-3-030-22559-9\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/enase/WirtzHBMOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2017gramsec, editor = {Peng Liu and Sjouke Mauw and Ketil St{\o}len}, title = {Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10744}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-74860-3}, doi = {10.1007/978-3-319-74860-3}, isbn = {978-3-319-74859-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2017gramsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eics/NilssonS16, author = {Erik G. Nilsson and Ketil St{\o}len}, editor = {Kris Luyten and Philippe A. Palanque}, title = {A case-based assessment of the {FLUIDE} framework for specifying emergency response user interfaces}, booktitle = {Proceedings of the 8th {ACM} {SIGCHI} Symposium on Engineering Interactive Computing Systems, {EICS} 2016, Brussels, Belgium, June 21-24, 2016}, pages = {97--107}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2933242.2933253}, doi = {10.1145/2933242.2933253}, timestamp = {Sat, 09 Apr 2022 12:33:56 +0200}, biburl = {https://dblp.org/rec/conf/eics/NilssonS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ErdoganSA16, author = {Gencer Erdogan and Ketil St{\o}len and Jan {\O}yvind Aagedal}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Evaluation of the {CORAL} Approach for Risk-driven Security Testing based on an Industrial Case Study}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {219--226}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005650902190226}, doi = {10.5220/0005650902190226}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ErdoganSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscram/NilssonS16, author = {Erik G. Nilsson and Ketil St{\o}len}, editor = {Andrea H. Tapia and Pedro Antunes and Victor A. Ba{\~{n}}uls and Kathleen A. Moore and Jo{\~{a}}o Porto de Albuquerque}, title = {The {FLUIDE} Framework for Specifying Emergency Response User Interfaces Employed to a Search and Rescue Case}, booktitle = {13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, Rio de Janeiro, Brasil, May 22-25, 2016}, publisher = {{ISCRAM} Association}, year = {2016}, url = {http://idl.iscram.org/files/erikgnilsson/2016/1434\_ErikG.Nilsson+KetilStolen2016.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscram/NilssonS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/risk/ErdoganS16, author = {Gencer Erdogan and Ketil St{\o}len}, editor = {J{\"{u}}rgen Gro{\ss}mann and Michael Felderer and Fredrik Seehusen}, title = {Design Decisions in the Development of a Graphical Language for Risk-Driven Security Testing}, booktitle = {Risk Assessment and Risk-Driven Quality Assurance - 4th International Workshop, {RISK} 2016, Held in Conjunction with {ICTSS} 2016, Graz, Austria, October 18, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10224}, pages = {99--114}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-57858-3\_8}, doi = {10.1007/978-3-319-57858-3\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/risk/ErdoganS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/p/RefsdalRS16, author = {Atle Refsdal and Ragnhild Kobro Runde and Ketil St{\o}len}, editor = {Luigia Petre and Emil Sekerinski}, title = {Mandatory and Potential Choice: Comparing Event-B and {STAIRS}}, booktitle = {From Action Systems to Distributed Systems - The Refinement Approach}, pages = {15--27}, publisher = {Chapman and Hall/CRC}, year = {2016}, url = {https://doi.org/10.1201/b20053-4}, doi = {10.1201/B20053-4}, timestamp = {Tue, 16 May 2017 14:01:47 +0200}, biburl = {https://dblp.org/rec/books/crc/p/RefsdalRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/RefsdalSS15, author = {Atle Refsdal and Bj{\o}rnar Solhaug and Ketil St{\o}len}, title = {Cyber-Risk Management}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23570-7}, doi = {10.1007/978-3-319-23570-7}, isbn = {978-3-319-23569-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/RefsdalSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ErdoganSSHA15, author = {Gencer Erdogan and Fredrik Seehusen and Ketil St{\o}len and Jon Hofstad and Jan {\O}yvind Aagedal}, title = {Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {2}, pages = {90--112}, year = {2015}, url = {https://doi.org/10.4018/IJSSE.2015040105}, doi = {10.4018/IJSSE.2015040105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ErdoganSSHA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/RefsdalRS15, author = {Atle Refsdal and Ragnhild Kobro Runde and Ketil St{\o}len}, title = {Stepwise refinement of sequence diagrams with soft real-time constraints}, journal = {J. Comput. Syst. Sci.}, volume = {81}, number = {7}, pages = {1221--1251}, year = {2015}, url = {https://doi.org/10.1016/j.jcss.2015.03.003}, doi = {10.1016/J.JCSS.2015.03.003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/RefsdalRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/RefsdalSS15, author = {Atle Refsdal and Bj{\o}rnar Solhaug and Ketil St{\o}len}, title = {Security risk analysis of system changes exemplified within the oil and gas domain}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {17}, number = {3}, pages = {251--266}, year = {2015}, url = {https://doi.org/10.1007/s10009-014-0351-0}, doi = {10.1007/S10009-014-0351-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/RefsdalSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/ErdoganLRSS14, author = {Gencer Erdogan and Yan Li and Ragnhild Kobro Runde and Fredrik Seehusen and Ketil St{\o}len}, title = {Approaches for the combined use of risk analysis and testing: a systematic literature review}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {16}, number = {5}, pages = {627--642}, year = {2014}, url = {https://doi.org/10.1007/s10009-014-0330-5}, doi = {10.1007/S10009-014-0330-5}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/ErdoganLRSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/ErdoganRS14, author = {Gencer Erdogan and Atle Refsdal and Ketil St{\o}len}, title = {Schematic Generation of English-Prose Semantics for a Risk Analysis Language Based on {UML} Interactions}, booktitle = {25th {IEEE} International Symposium on Software Reliability Engineering Workshops, {ISSRE} Workshops, Naples, Italy, November 3-6, 2014}, pages = {305--310}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ISSREW.2014.73}, doi = {10.1109/ISSREW.2014.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/ErdoganRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/BeckersHSS14, author = {Kristian Beckers and Maritta Heisel and Bj{\o}rnar Solhaug and Ketil St{\o}len}, editor = {Maritta Heisel and Wouter Joosen and Javier L{\'{o}}pez and Fabio Martinelli}, title = {{ISMS-CORAS:} {A} Structured Method for Establishing an {ISO} 27001 Compliant Information Security Management System}, booktitle = {Engineering Secure Future Internet Services and Systems - Current Research}, series = {Lecture Notes in Computer Science}, volume = {8431}, pages = {315--344}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07452-8\_13}, doi = {10.1007/978-3-319-07452-8\_13}, timestamp = {Thu, 29 Aug 2019 08:09:56 +0200}, biburl = {https://dblp.org/rec/series/lncs/BeckersHSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/RefsdalRSS14, author = {Atle Refsdal and {\O}yvind Rideng and Bj{\o}rnar Solhaug and Ketil St{\o}len}, editor = {Maritta Heisel and Wouter Joosen and Javier L{\'{o}}pez and Fabio Martinelli}, title = {Divide and Conquer - Towards a Notion of Risk Model Encapsulation}, booktitle = {Engineering Secure Future Internet Services and Systems - Current Research}, series = {Lecture Notes in Computer Science}, volume = {8431}, pages = {345--365}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07452-8\_14}, doi = {10.1007/978-3-319-07452-8\_14}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/RefsdalRSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pts/2013risk, editor = {Thomas Bauer and J{\"{u}}rgen Gro{\ss}mann and Fredrik Seehusen and Ketil St{\o}len and Marc{-}Florian Wendland}, title = {Risk Assessment and Risk-Driven Testing - First International Workshop, {RISK} 2013, Held in Conjunction with {ICTSS} 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8418}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07076-6}, doi = {10.1007/978-3-319-07076-6}, isbn = {978-3-319-07075-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pts/2013risk.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/RundeRS13, author = {Ragnhild Kobro Runde and Atle Refsdal and Ketil St{\o}len}, title = {Relating computer systems to sequence diagrams: the impact of underspecification and inherent nondeterminism}, journal = {Formal Aspects Comput.}, volume = {25}, number = {2}, pages = {159--187}, year = {2013}, url = {https://doi.org/10.1007/s00165-011-0192-5}, doi = {10.1007/S00165-011-0192-5}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/RundeRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/TranSS13, author = {Le Minh Sang Tran and Bj{\o}rnar Solhaug and Ketil St{\o}len}, editor = {Lingyu Wang and Basit Shafiq}, title = {An Approach to Select Cost-Effective Risk Countermeasures}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {266--273}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_18}, doi = {10.1007/978-3-642-39256-6\_18}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/TranSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pts/ErdoganRS13, author = {Gencer Erdogan and Atle Refsdal and Ketil St{\o}len}, editor = {Thomas Bauer and J{\"{u}}rgen Gro{\ss}mann and Fredrik Seehusen and Ketil St{\o}len and Marc{-}Florian Wendland}, title = {A Systematic Method for Risk-Driven Test Case Design Using Annotated Sequence Diagrams}, booktitle = {Risk Assessment and Risk-Driven Testing - First International Workshop, {RISK} 2013, Held in Conjunction with {ICTSS} 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8418}, pages = {93--108}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-07076-6\_7}, doi = {10.1007/978-3-319-07076-6\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/pts/ErdoganRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-4689, author = {Le Minh Sang Tran and Bj{\o}rnar Solhaug and Ketil St{\o}len}, title = {An Approach to Select Cost-Effective Risk Countermeasures Exemplified in {CORAS}}, journal = {CoRR}, volume = {abs/1302.4689}, year = {2013}, url = {http://arxiv.org/abs/1302.4689}, eprinttype = {arXiv}, eprint = {1302.4689}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-4689.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/OmerovicSS12, author = {Aida Omerovic and Bj{\o}rnar Solhaug and Ketil St{\o}len}, title = {Assessing practical usefulness and performance of the {PREDIQT} method: An industrial case study}, journal = {Inf. Softw. Technol.}, volume = {54}, number = {12}, pages = {1377--1395}, year = {2012}, url = {https://doi.org/10.1016/j.infsof.2012.07.006}, doi = {10.1016/J.INFSOF.2012.07.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/OmerovicSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hsi/EideS12, author = {Aslak Wegner Eide and Ketil St{\o}len}, title = {Geographic Visualization of Risk as Decision Support in Emergency Situations}, booktitle = {2012 5th International Conference on Human System Interactions, Perth, Australia, June 6-8, 2012}, pages = {81--88}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/HSI.2012.39}, doi = {10.1109/HSI.2012.39}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/hsi/EideS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/HaugeS12, author = {Andr{\'{e}} Alexandersen Hauge and Ketil St{\o}len}, editor = {Frank Ortmeier and Peter Daniel}, title = {A Pattern-Based Method for Safe Control Systems Exemplified within Nuclear Power Production}, booktitle = {Computer Safety, Reliability, and Security - 31st International Conference, {SAFECOMP} 2012, Magdeburg, Germany, September 25-28, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7612}, pages = {13--24}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33678-2\_2}, doi = {10.1007/978-3-642-33678-2\_2}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/HaugeS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0025737, author = {Mass Soldal Lund and Bj{\o}rnar Solhaug and Ketil St{\o}len}, title = {Model-Driven Risk Analysis - The {CORAS} Approach}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-12323-8}, doi = {10.1007/978-3-642-12323-8}, isbn = {978-3-642-12322-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0025737.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsi/SolhaugS11, author = {Bj{\o}rnar Solhaug and Ketil St{\o}len}, title = {Preservation of Policy Adherence under Refinement}, journal = {Int. J. Softw. Informatics}, volume = {5}, number = {1-2}, pages = {139--157}, year = {2011}, url = {http://www.ijsi.org/ch/reader/view\_abstract.aspx?file\_no=i79}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsi/SolhaugS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esem/LigaardenRS11, author = {Olav S. Ligaarden and Atle Refsdal and Ketil St{\o}len}, editor = {James Walden and Laurie A. Williams}, title = {Experiences from Using Indicators to Validate Expert Judgments in Security Risk Analysis}, booktitle = {Third International Workshop on Security Measurements and Metrics, Metrisec@ESEM 2011, Banff, Alberta, Canada, September 21, 2011}, pages = {88--95}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/Metrisec.2011.13}, doi = {10.1109/METRISEC.2011.13}, timestamp = {Mon, 07 Sep 2020 10:46:59 +0200}, biburl = {https://dblp.org/rec/conf/esem/LigaardenRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/facs2/BraendelandRS11, author = {Gyrd Br{\ae}ndeland and Atle Refsdal and Ketil St{\o}len}, editor = {Farhad Arbab and Peter Csaba {\"{O}}lveczky}, title = {A Denotational Model for Component-Based Risk Analysis}, booktitle = {Formal Aspects of Component Software - 8th International Symposium, {FACS} 2011, Oslo, Norway, September 14-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7253}, pages = {12--41}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35743-5\_3}, doi = {10.1007/978-3-642-35743-5\_3}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/facs2/BraendelandRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/LundSS10, author = {Mass Soldal Lund and Bj{\o}rnar Solhaug and Ketil St{\o}len}, editor = {Alessandro Aldini and Roberto Gorrieri}, title = {Risk Analysis of Changing and Evolving Systems Using {CORAS}}, booktitle = {Foundations of Security Analysis and Design {VI} - {FOSAD} Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {6858}, pages = {231--274}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23082-0\_9}, doi = {10.1007/978-3-642-23082-0\_9}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/fosad/LundSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icinco/HaugeS11, author = {Andr{\'{e}} Alexandersen Hauge and Ketil St{\o}len}, editor = {Jean{-}Louis Ferrier and Alain Bernard and Oleg Yu. Gusikhin and Kurosh Madani}, title = {Towards Patterns for Handling Safety Critical Adaptive Control Software}, booktitle = {{ICINCO} 2011 - Proceedings of the 8th International Conference on Informatics in Control, Automation and Robotics, Volume 1, Noordwijkerhout, The Netherlands, 28 - 31 July, 2011}, pages = {211--214}, publisher = {SciTePress}, year = {2011}, timestamp = {Fri, 07 Sep 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icinco/HaugeS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmt/SeehusenS11, author = {Fredrik Seehusen and Ketil St{\o}len}, editor = {Jordi Cabot and Eelco Visser}, title = {An Evaluation of the Graphical Modeling Framework {(GMF)} Based on the Development of the {CORAS} Tool}, booktitle = {Theory and Practice of Model Transformations - 4th International Conference, ICMT@TOOLS 2011, Zurich, Switzerland, June 27-28, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6707}, pages = {152--166}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21732-6\_11}, doi = {10.1007/978-3-642-21732-6\_11}, timestamp = {Wed, 24 Jun 2020 13:02:21 +0200}, biburl = {https://dblp.org/rec/conf/icmt/SeehusenS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mesoca/LigaardenLRSS11, author = {Olav S. Ligaarden and Mass Soldal Lund and Atle Refsdal and Fredrik Seehusen and Ketil St{\o}len}, editor = {Grace A. Lewis}, title = {An architectural pattern for enterprise level monitoring tools}, booktitle = {5th {IEEE} International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems, {MESOCA} 2011, Williamsburg, VA, USA, September 26, 2011}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MESOCA.2011.6049035}, doi = {10.1109/MESOCA.2011.6049035}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mesoca/LigaardenLRSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ozchi/NilssonS11, author = {Erik G. Nilsson and Ketil St{\o}len}, editor = {Duncan Stevenson}, title = {Generic functionality in user interfaces for emergency response}, booktitle = {The Annual Meeting of the Australian Special Interest Group for Computer Human Interaction, OzCHI '11, Canberra, Australia, November 28 - December 02, 2011}, pages = {233--242}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2071536.2071574}, doi = {10.1145/2071536.2071574}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ozchi/NilssonS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/plop/HaugeS11, author = {Andr{\'{e}} Alexandersen Hauge and Ketil St{\o}len}, editor = {Lise B. Hvatum}, title = {{SACS:} a pattern language for safe adaptive control software}, booktitle = {Proceedings of the 18th Conference on Pattern Languages of Programs, PLoP 2011, Portland, Oregon, USA, October 21-23, 2011}, pages = {7:1--7:22}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2578903.2579145}, doi = {10.1145/2578903.2579145}, timestamp = {Tue, 06 Nov 2018 16:59:05 +0100}, biburl = {https://dblp.org/rec/conf/plop/HaugeS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/OmerovicSS11, author = {Aida Omerovic and Bj{\o}rnar Solhaug and Ketil St{\o}len}, title = {Evaluation of Experiences from Applying the {PREDIQT} Method in an Industrial Case Study}, booktitle = {Fifth International Conference on Secure Software Integration and Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island, Korea}, pages = {137--146}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SSIRI.2011.20}, doi = {10.1109/SSIRI.2011.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/OmerovicSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SolhaugS11, author = {Bj{\o}rnar Solhaug and Ketil St{\o}len}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Uncertainty, Subjectivity, Trust and Risk: How It All Fits together}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {1--5}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_1}, doi = {10.1007/978-3-642-29963-6\_1}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/stm/SolhaugS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LundSS10, author = {Mass Soldal Lund and Bj{\o}rnar Solhaug and Ketil St{\o}len}, title = {Evolution in Relation to Risk and Trust Management}, journal = {Computer}, volume = {43}, number = {5}, pages = {49--55}, year = {2010}, url = {https://doi.org/10.1109/MC.2010.134}, doi = {10.1109/MC.2010.134}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LundSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecr/HavaldsrudLMRSO10, author = {Tormod V. H{\aa}valdsrud and Olav S. Ligaarden and Per Myrseth and Atle Refsdal and Ketil St{\o}len and Jon {\O}lnes}, title = {Experiences from using a UML-based method for trust analysis in an industrial project on electronic procurement}, journal = {Electron. Commer. Res.}, volume = {10}, number = {3-4}, pages = {441--467}, year = {2010}, url = {https://doi.org/10.1007/s10660-010-9063-z}, doi = {10.1007/S10660-010-9063-Z}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecr/HavaldsrudLMRSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/BraendelandRS10, author = {Gyrd Br{\ae}ndeland and Atle Refsdal and Ketil St{\o}len}, title = {Modular analysis and modelling of risk scenarios with dependencies}, journal = {J. Syst. Softw.}, volume = {83}, number = {10}, pages = {1995--2013}, year = {2010}, url = {https://doi.org/10.1016/j.jss.2010.05.069}, doi = {10.1016/J.JSS.2010.05.069}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/BraendelandRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhocnets/NilssonS10, author = {Erik G. Nilsson and Ketil St{\o}len}, editor = {Jun Zheng and David Simplot{-}Ryl and Victor C. M. Leung}, title = {Ad Hoc Networks and Mobile Devices in Emergency Response - {A} Perfect Match? - (Invited Paper)}, booktitle = {Ad Hoc Networks - Second International Conference, {ADHOCNETS} 2010, Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {49}, pages = {17--33}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17994-5\_2}, doi = {10.1007/978-3-642-17994-5\_2}, timestamp = {Mon, 01 Mar 2021 16:18:23 +0100}, biburl = {https://dblp.org/rec/conf/adhocnets/NilssonS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/OmerovicAGMRSO10, author = {Aida Omerovic and Anette Andresen and H{\aa}vard Grindheim and Per Myrseth and Atle Refsdal and Ketil St{\o}len and Jon {\O}lnes}, editor = {Fabio Massacci and Dan S. Wallach and Nicola Zannone}, title = {Idea: {A} Feasibility Study in Model Based Prediction of Impact of Changes on System Quality}, booktitle = {Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5965}, pages = {231--240}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11747-3\_18}, doi = {10.1007/978-3-642-11747-3\_18}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/OmerovicAGMRSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/SeehusenS09, author = {Fredrik Seehusen and Ketil St{\o}len}, title = {Information flow security, abstraction and composition}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {1}, pages = {9--33}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs:20080069}, doi = {10.1049/IET-IFS:20080069}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/SeehusenS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/SeehusenSS09, author = {Fredrik Seehusen and Bj{\o}rnar Solhaug and Ketil St{\o}len}, title = {Adherence preserving refinement of trace-set properties in {STAIRS:} exemplified for information flow properties and policies}, journal = {Softw. Syst. Model.}, volume = {8}, number = {1}, pages = {45--65}, year = {2009}, url = {https://doi.org/10.1007/s10270-008-0102-3}, doi = {10.1007/S10270-008-0102-3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/SeehusenSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/RefsdalS09, author = {Atle Refsdal and Ketil St{\o}len}, editor = {Elena Ferrari and Ninghui Li and Elisa Bertino and Y{\"{u}}cel Karabulut}, title = {Employing Key Indicators to Provide a Dynamic Risk Picture with a Notion of Confidence}, booktitle = {Trust Management III, Third {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {300}, pages = {215--233}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02056-8\_14}, doi = {10.1007/978-3-642-02056-8\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/RefsdalS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/OmerovicS09, author = {Aida Omerovic and Ketil St{\o}len}, title = {Simplifying Parametrization of Bayesian Networks in Prediction of System Quality}, booktitle = {Third {IEEE} International Conference on Secure Software Integration and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10, 2009}, pages = {447--448}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SSIRI.2009.36}, doi = {10.1109/SSIRI.2009.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/OmerovicS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/RefsdalS08, author = {Atle Refsdal and Ketil St{\o}len}, title = {Extending {UML} sequence diagrams to model trust-dependent behavior with the aim to support risk analysis}, journal = {Sci. Comput. Program.}, volume = {74}, number = {1-2}, pages = {34--42}, year = {2008}, url = {https://doi.org/10.1016/j.scico.2008.09.003}, doi = {10.1016/J.SCICO.2008.09.003}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/RefsdalS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SolhaugS08, author = {Bj{\o}rnar Solhaug and Ketil St{\o}len}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {Compositional Refinement of Policies in {UML} - Exemplified for Access Control}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {300--316}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_20}, doi = {10.1007/978-3-540-88313-5\_20}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SolhaugS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/RefsdalSS08, author = {Atle Refsdal and Bj{\o}rnar Solhaug and Ketil St{\o}len}, editor = {Y{\"{u}}cel Karabulut and John Mitchell and Peter Herrmann and Christian Damsgaard Jensen}, title = {A UML-based Method for the Development of Policies to Support Trust Management}, booktitle = {Trust Management {II} - Proceedings of {IFIPTM} 2008: Joint iTrust and {PST} Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {263}, pages = {33--49}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09428-1\_3}, doi = {10.1007/978-0-387-09428-1\_3}, timestamp = {Fri, 09 Apr 2021 18:43:37 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/RefsdalSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/SeehusenS08, author = {Fredrik Seehusen and Ketil St{\o}len}, title = {A Transformational Approach to Facilitate Monitoring of High-Level Policies}, booktitle = {9th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York, {USA}}, pages = {70--73}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/POLICY.2008.21}, doi = {10.1109/POLICY.2008.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/SeehusenS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2008qop, editor = {Andy Ozment and Ketil St{\o}len}, title = {Proceedings of the 4th {ACM} Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-60558-321-1}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2008qop.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/BraendelandDES07, author = {Gyrd Br{\ae}ndeland and Heidi E. I. Dahl and Iselin Engan and Ketil St{\o}len}, editor = {Javier L{\'{o}}pez and Bernhard M. H{\"{a}}mmerli}, title = {Using Dependent {CORAS} Diagrams to Analyse Mutual Dependency}, booktitle = {Critical Information Infrastructures Security, Second International Workshop, {CRITIS} 2007, M{\'{a}}laga, Spain, October 3-5, 2007. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5141}, pages = {135--148}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-89173-4\_12}, doi = {10.1007/978-3-540-89173-4\_12}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/BraendelandDES07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/LundRS07, author = {Mass Soldal Lund and Atle Refsdal and Ketil St{\o}len}, editor = {Holger Giese and Gabor Karsai and Edward Lee and Bernhard Rumpe and Bernhard Sch{\"{a}}tz}, title = {Semantics of {UML} Models for Dynamic Behavior - {A} Survey of Different Approaches}, booktitle = {Model-Based Engineering of Embedded Real-Time Systems - International Dagstuhl Workshop, Dagstuhl Castle, Germany, November 4-9, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6100}, pages = {77--103}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-16277-0\_4}, doi = {10.1007/978-3-642-16277-0\_4}, timestamp = {Sat, 30 Sep 2023 09:38:34 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/LundRS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/SolhaugES07, author = {Bj{\o}rnar Solhaug and Dag Elgesem and Ketil St{\o}len}, title = {Specifying Policies Using {UML} Sequence Diagrams - An Evaluation Based on a Case Study}, booktitle = {8th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy}, pages = {19--28}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/POLICY.2007.42}, doi = {10.1109/POLICY.2007.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/SolhaugES07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/RefsdalS08, author = {Atle Refsdal and Ketil St{\o}len}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Extending {UML} Sequence Diagrams to Model Trust-dependent Behavior With the Aim to Support Risk Analysis}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {15--29}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.014}, doi = {10.1016/J.ENTCS.2007.12.014}, timestamp = {Mon, 13 Feb 2023 09:13:20 +0100}, biburl = {https://dblp.org/rec/journals/entcs/RefsdalS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2007qop, editor = {G{\"{u}}nter Karjoth and Ketil St{\o}len}, title = {Proceedings of the 3th {ACM} Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-885-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2007qop.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BraendelandS06, author = {Gyrd Br{\ae}ndeland and Ketil St{\o}len}, editor = {G{\"{u}}nter Karjoth and Fabio Massacci}, title = {Using model-based security analysis in component-oriented system development}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006}, pages = {11--18}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179494.1179498}, doi = {10.1145/1179494.1179498}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BraendelandS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/LundS06, author = {Mass Soldal Lund and Ketil St{\o}len}, editor = {Jayadev Misra and Tobias Nipkow and Emil Sekerinski}, title = {A Fully General Operational Semantics for {UML} 2.0 Sequence Diagrams with Potential and Mandatory Choice}, booktitle = {{FM} 2006: Formal Methods, 14th International Symposium on Formal Methods, Hamilton, Canada, August 21-27, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4085}, pages = {380--395}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11813040\_26}, doi = {10.1007/11813040\_26}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/LundS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmoods/RefsdalRS06, author = {Atle Refsdal and Ragnhild Kobro Runde and Ketil St{\o}len}, editor = {Roberto Gorrieri and Heike Wehrheim}, title = {Underspecification, Inherent Nondeterminism and Probability in Sequence Diagrams}, booktitle = {Formal Methods for Open Object-Based Distributed Systems, 8th {IFIP} {WG} 6.1 International Conference, {FMOODS} 2006, Bologna, Italy, June 14-16, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4037}, pages = {138--155}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11768869\_12}, doi = {10.1007/11768869\_12}, timestamp = {Thu, 14 Oct 2021 10:14:37 +0200}, biburl = {https://dblp.org/rec/conf/fmoods/RefsdalRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/LundS06, author = {Mass Soldal Lund and Ketil St{\o}len}, editor = {Hong Zhu and Joseph R. Horgan and Shing{-}Chi Cheung and J. Jenny Li}, title = {Deriving Tests from {UML} 2.0 Sequence Diagrams with neg and assert}, booktitle = {Proceedings of the 2006 International Workshop on Automation of Software Test, {AST} 2006, Shanghai, China, May 23, 2006}, pages = {22--28}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1138929.1138934}, doi = {10.1145/1138929.1138934}, timestamp = {Thu, 30 Apr 2020 12:10:35 +0200}, biburl = {https://dblp.org/rec/conf/icse/LundS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iesa/WilsonACDDGGGHSMMPRSST06, author = {Michael D. Wilson and Alvaro Arenas and David W. Chadwick and Theo Dimitrakos and J{\"{u}}rgen Doser and Pablo Giambiagi and David Golby and Christian Geuer{-}Pollmann and Jochen Haller and Ketil St{\o}len and Tobias Mahler and Lorenzo Martino and Xavier Parent and Santi Ristol and J. Sairamesh and Lutz Schubert and Nilufer Tuptuk}, editor = {Guy Doumeingts and J{\"{o}}rg P. M{\"{u}}ller and G{\'{e}}rard Morel and Bruno Vallespir}, title = {The TrustCoM Approach to Enforcing Agreements between Interoperating Enterprises}, booktitle = {Enterprise Interoperability, New Challenges and Approaches, Proceedings of the 2nd International Conference on Interoperability for Enterprise Software and Applications, {I-ESA} 2006, March 22-24, 2006, Bordeaux, France}, pages = {365--375}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-1-84628-714-5\_34}, doi = {10.1007/978-1-84628-714-5\_34}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iesa/WilsonACDDGGGHSMMPRSST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/BraendelandS06, author = {Gyrd Br{\ae}ndeland and Ketil St{\o}len}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk}, booktitle = {Formal Aspects in Security and Trust, Fourth International Workshop, {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4691}, pages = {31--46}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-75227-1\_3}, doi = {10.1007/978-3-540-75227-1\_3}, timestamp = {Sun, 02 Oct 2022 16:07:30 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/BraendelandS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/SeehusenS06, author = {Fredrik Seehusen and Ketil St{\o}len}, editor = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Maintaining Information Flow Security Under Refinement and Transformation}, booktitle = {Formal Aspects in Security and Trust, Fourth International Workshop, {FAST} 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4691}, pages = {143--157}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-75227-1\_10}, doi = {10.1007/978-3-540-75227-1\_10}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/SeehusenS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/HogganvikS06, author = {Ida Hogganvik and Ketil St{\o}len}, editor = {Oscar Nierstrasz and Jon Whittle and David Harel and Gianna Reggio}, title = {A Graphical Approach to Risk Identification, Motivated by Empirical Investigations}, booktitle = {Model Driven Engineering Languages and Systems, 9th International Conference, MoDELS 2006, Genova, Italy, October 1-6, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4199}, pages = {574--588}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11880240\_40}, doi = {10.1007/11880240\_40}, timestamp = {Tue, 24 May 2022 15:28:49 +0200}, biburl = {https://dblp.org/rec/conf/models/HogganvikS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SeehusenS06, author = {Fredrik Seehusen and Ketil St{\o}len}, editor = {David F. Ferraiolo and Indrakshi Ray}, title = {Information flow property preserving transformation of {UML} interaction diagrams}, booktitle = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings}, pages = {150--159}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1133058.1133080}, doi = {10.1145/1133058.1133080}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/SeehusenS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itrust/2006, editor = {Ketil St{\o}len and William H. Winsborough and Fabio Martinelli and Fabio Massacci}, title = {Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3986}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11755593}, doi = {10.1007/11755593}, isbn = {3-540-34295-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itrust/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcit-igi/BraberMNSV05, author = {Folker den Braber and Arne Bj{\o}rn Mildal and Jone Nes and Ketil St{\o}len and Fredrik Vraalsen}, title = {Experiences from Using the {CORAS} Methodology to Analyze a Web Application}, journal = {J. Cases Inf. Technol.}, volume = {7}, number = {3}, pages = {110--130}, year = {2005}, url = {https://doi.org/10.4018/jcit.2005070107}, doi = {10.4018/JCIT.2005070107}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcit-igi/BraberMNSV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/njc/RundeHS05, author = {Ragnhild Kobro Runde and {\O}ystein Haugen and Ketil St{\o}len}, title = {Refining {UML} Interactions with Underspecification and Nondeterminism}, journal = {Nord. J. Comput.}, volume = {12}, number = {2}, pages = {157--188}, year = {2005}, timestamp = {Wed, 03 May 2006 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/njc/RundeHS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/HaugenHRS05, author = {{\O}ystein Haugen and Knut Eilif Husa and Ragnhild Kobro Runde and Ketil St{\o}len}, title = {{STAIRS} towards formal design with sequence diagrams}, journal = {Softw. Syst. Model.}, volume = {4}, number = {4}, pages = {355--367}, year = {2005}, url = {https://doi.org/10.1007/s10270-005-0087-0}, doi = {10.1007/S10270-005-0087-0}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/HaugenHRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmco/RundeHS05, author = {Ragnhild Kobro Runde and {\O}ystein Haugen and Ketil St{\o}len}, editor = {Frank S. de Boer and Marcello M. Bonsangue and Susanne Graf and Willem P. de Roever}, title = {The Pragmatics of {STAIRS}}, booktitle = {Formal Methods for Components and Objects, 4th International Symposium, {FMCO} 2005, Amsterdam, The Netherlands, November 1-4, 2005, Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {4111}, pages = {88--114}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11804192\_5}, doi = {10.1007/11804192\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/fmco/RundeHS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/formats/RefsdalHS05, author = {Atle Refsdal and Knut Eilif Husa and Ketil St{\o}len}, editor = {Paul Pettersson and Wang Yi}, title = {Specification and Refinement of Soft Real-Time Requirements Using Sequence Diagrams}, booktitle = {Formal Modeling and Analysis of Timed Systems, Third International Conference, {FORMATS} 2005, Uppsala, Sweden, September 26-28, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3829}, pages = {32--48}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11603009\_4}, doi = {10.1007/11603009\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/formats/RefsdalHS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/SeehusenS05, author = {Fredrik Seehusen and Ketil St{\o}len}, editor = {Chin{-}Sheng Chen and Joaquim Filipe and Isabel Seruca and Jos{\'{e}} Cordeiro}, title = {Graphical Specification of Dynamic Network Structure}, booktitle = {{ICEIS} 2005, Proceedings of the Seventh International Conference on Enterprise Information Systems, Miami, USA, May 25-28, 2005}, pages = {203--210}, year = {2005}, timestamp = {Thu, 02 Feb 2017 12:53:54 +0100}, biburl = {https://dblp.org/rec/conf/iceis/SeehusenS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isese/HogganvikS05, author = {Ida Hogganvik and Ketil St{\o}len}, title = {Risk analysis terminology for IT-systems: does it match intuition?}, booktitle = {2005 International Symposium on Empirical Software Engineering {(ISESE} 2005), 17-18 November 2005, Noosa Heads, Australia}, pages = {13--22}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ISESE.2005.1541810}, doi = {10.1109/ISESE.2005.1541810}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isese/HogganvikS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itrust/VraalsenLMPS05, author = {Fredrik Vraalsen and Mass Soldal Lund and Tobias Mahler and Xavier Parent and Ketil St{\o}len}, editor = {Peter Herrmann and Val{\'{e}}rie Issarny and Simon Shiu}, title = {Specifying Legal Risk Scenarios Using the {CORAS} Threat Modelling Language}, booktitle = {Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3477}, pages = {45--60}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11429760\_4}, doi = {10.1007/11429760\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/itrust/VraalsenLMPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itrust/VraalsenBLS05, author = {Fredrik Vraalsen and Folker den Braber and Mass Soldal Lund and Ketil St{\o}len}, editor = {Peter Herrmann and Val{\'{e}}rie Issarny and Simon Shiu}, title = {The {CORAS} Tool for Security Risk Analysis}, booktitle = {Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3477}, pages = {402--405}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11429760\_30}, doi = {10.1007/11429760\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itrust/VraalsenBLS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/HogganvikS05, author = {Ida Hogganvik and Ketil St{\o}len}, title = {On the Comprehension of Security Risk Scenarios}, booktitle = {13th International Workshop on Program Comprehension {(IWPC} 2005), 15-16 May 2005, St. Louis, MO, {USA}}, pages = {115--124}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/WPC.2005.27}, doi = {10.1109/WPC.2005.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwpc/HogganvikS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/idea/encyclopedia2005/BraberLSV05, author = {Folker den Braber and Mass Soldal Lund and Ketil St{\o}len and Fredrik Vraalsen}, editor = {Mehdi Khosrow{-}Pour}, title = {Integrating Security in the Development Process with {UML}}, booktitle = {Encyclopedia of Information Science and Technology {(5} Volumes)}, pages = {1560--1566}, publisher = {Idea Group}, year = {2005}, url = {http://www.igi-global.com/Bookstore/Chapter.aspx?TitleId=14474}, timestamp = {Sun, 09 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/idea/encyclopedia2005/BraberLSV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itrust/BraendelandS04, author = {Gyrd Br{\ae}ndeland and Ketil St{\o}len}, editor = {Christian Damsgaard Jensen and Stefan Poslad and Theodosis Dimitrakos}, title = {Using Risk Analysis to Assess User Trust: {A} Net-Bank Scenario}, booktitle = {Trust Management, Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2995}, pages = {146--160}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24747-0\_12}, doi = {10.1007/978-3-540-24747-0\_12}, timestamp = {Sun, 02 Oct 2022 16:10:26 +0200}, biburl = {https://dblp.org/rec/conf/itrust/BraendelandS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csmr/LundBS03, author = {Mass Soldal Lund and Folker den Braber and Ketil St{\o}len}, title = {Maintaining Results from Security Assessment}, booktitle = {7th European Conference on Software Maintenance and Reengineering {(CSMR} 2003), 26-28 March 2003, Benevento, Italy, Proceedings}, pages = {341--350}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSMR.2003.1192442}, doi = {10.1109/CSMR.2003.1192442}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csmr/LundBS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/HaugenHRS03, author = {{\O}ystein Haugen and Knut Eilif Husa and Ragnhild Kobro Runde and Ketil St{\o}len}, editor = {Stefan Leue and Tarja Syst{\"{a}}}, title = {Why Timed Sequence Diagrams Require Three-Event Semantics}, booktitle = {Scenarios: Models, Transformations and Tools, International Workshop, Dagstuhl Castle, Germany, September 7-12, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3466}, pages = {1--25}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11495628\_1}, doi = {10.1007/11495628\_1}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/HaugenHRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mie/StamatiouSHSSCA03, author = {Yannis C. Stamatiou and Eva Skipenes and Eva Henriksen and Nikos Stathiakis and Adamantios Sikianakis and Eliana Charalambous and Nikos Antonakis and Ketil St{\o}len and Folker den Braber and Mass Soldal Lund and Katerina Papadaki and George Valvis}, editor = {Robert H. Baud and Marius Fieschi and Pierre Le Beux and Patrick Ruch}, title = {The {CORAS} approach for model-based risk management applied to a telemedicine service}, booktitle = {The New Navigators: from Professionals to Patients - Proceedings of MIE2003, Saint Malo, France}, series = {Studies in Health Technology and Informatics}, volume = {95}, pages = {206--211}, publisher = {{IOS} Press}, year = {2003}, url = {https://doi.org/10.3233/978-1-60750-939-4-206}, doi = {10.3233/978-1-60750-939-4-206}, timestamp = {Sat, 30 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mie/StamatiouSHSSCA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uml/HaugenS03, author = {{\O}ystein Haugen and Ketil St{\o}len}, editor = {Perdita Stevens and Jon Whittle and Grady Booch}, title = {{STAIRS} - Steps to Analyze Interactions with Refinement Semantics}, booktitle = {{\guillemotleft}UML{\guillemotright} 2003 - The Unified Modeling Language, Modeling Languages and Applications, 6th International Conference, San Francisco, CA, USA, October 20-24, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2863}, pages = {388--402}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45221-8\_33}, doi = {10.1007/978-3-540-45221-8\_33}, timestamp = {Tue, 24 May 2022 15:28:50 +0200}, biburl = {https://dblp.org/rec/conf/uml/HaugenS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/RaptisDGS02, author = {Dimitris Raptis and Theodosis Dimitrakos and Bj{\o}rn Axel Gran and Ketil St{\o}len}, editor = {Borka Jerman{-}Blazic and Tomaz Klobucar}, title = {The coras approach for model-based risk management applied to e-commerce domain}, booktitle = {Advanced Communications and Multimedia Security, {IFIP} {TC6/TC11} Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia}, series = {{IFIP} Conference Proceedings}, volume = {228}, pages = {169--181}, publisher = {Kluwer}, year = {2002}, url = {https://doi.org/10.1007/978-0-387-35612-9\_13}, doi = {10.1007/978-0-387-35612-9\_13}, timestamp = {Thu, 25 Jul 2019 12:26:02 +0200}, biburl = {https://dblp.org/rec/conf/cms/RaptisDGS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/AagedalBDGRS02, author = {Jan {\O}yvind Aagedal and Folker den Braber and Theodosis Dimitrakos and Bj{\o}rn Axel Gran and Dimitris Raptis and Ketil St{\o}len}, title = {Model-Based Risk Assessment to Improve Enterprise Security}, booktitle = {6th International Enterprise Distributed Object Computing Conference {(EDOC} 2002), 17-20 September 2002, Lausanne, Switzerland, Proceedings}, pages = {51}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/EDOC.2002.1137696}, doi = {10.1109/EDOC.2002.1137696}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/AagedalBDGRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euroweb/DimitrakosRRS02, author = {Theodosis Dimitrakos and Dimitris Raptis and Brian Ritchie and Ketil St{\o}len}, editor = {Brian Matthews and F. Robert A. Hopgood and Michael D. Wilson}, title = {Model Based Security Risk Analysis for Web Applications}, booktitle = {The Web and the Grid: from e-science to e-business. EuroWeb 2002 Conference, St Anne's College, Oxford, {UK.} 17-18 December 2002}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2002}, url = {http://ewic.bcs.org/content/ConWebDoc/4078}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/euroweb/DimitrakosRRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i3e/DimitrakosRRABSH02, author = {Theodosis Dimitrakos and Brian Ritchie and Dimitris Raptis and Jan {\O}yvind Aagedal and Folker den Braber and Ketil St{\o}len and Siv Hilde Houmb}, editor = {Jo{\~{a}}o L. Monteiro and Paula M. C. Swatman and Lu{\'{\i}}s Valadares Tavares}, title = {Integrating Model-based Security Risk Management into eBusiness Systems Development: The {CORAS} Approach}, booktitle = {Towards The Knowledge Society: eCommerce, eBusiness, and eGovernment, The Second {IFIP} Conference on E-Commerce, E-Business, E-Government {(I3E} 2002), October 7-9, 2002, Lisbon, Portugal}, series = {{IFIP} Conference Proceedings}, volume = {233}, pages = {159--175}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 09 Oct 2002 13:14:37 +0200}, biburl = {https://dblp.org/rec/conf/i3e/DimitrakosRRABSH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/FredriksenKGSOD02, author = {Rune Fredriksen and Monica Kristiansen and Bj{\o}rn Axel Gran and Ketil St{\o}len and Tom Arthur Opperud and Theodosis Dimitrakos}, editor = {Stuart Anderson and Sandro Bologna and Massimo Felici}, title = {The {CORAS} Framework for a Model-Based Risk Management Process}, booktitle = {Computer Safety, Reliability and Security, 21st International Conference, {SAFECOMP} 2002, Catania, Italy, September 10-13, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2434}, pages = {94--105}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45732-1\_11}, doi = {10.1007/3-540-45732-1\_11}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/FredriksenKGSOD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/mcs/BroyS01, author = {Manfred Broy and Ketil St{\o}len}, title = {Specification and Development of Interactive Systems - Focus on Streams, Interfaces, and Refinement}, series = {Monographs in Computer Science}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4613-0091-5}, doi = {10.1007/978-1-4613-0091-5}, isbn = {978-1-4612-6518-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/mcs/BroyS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/GrosuS01, author = {Radu Grosu and Ketil St{\o}len}, title = {Stream-Based Specification of Mobile Systems}, journal = {Formal Aspects Comput.}, volume = {13}, number = {1}, pages = {1--31}, year = {2001}, url = {https://doi.org/10.1007/PL00003937}, doi = {10.1007/PL00003937}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/GrosuS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sam/StolenM00, author = {Ketil St{\o}len and P. Mohn}, editor = {Edel Sherratt}, title = {Experience from Using MSC, {UML} and {SDL} in the Development of the {FAME} Communication Manager}, booktitle = {{SAM} 2000, 2nd Workshop on {SDL} and MSC, Col de Porte, Grenoble, France, June 26-28, 2000}, pages = {276}, publisher = {VERIMAG, IRISA, {SDL} Forum}, year = {2000}, timestamp = {Thu, 16 Oct 2003 15:31:41 +0200}, biburl = {https://dblp.org/rec/conf/sam/StolenM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmoods/Stoelen99, author = {Ketil St{\o}len}, editor = {Paolo Ciancarini and Alessandro Fantechi and Roberto Gorrieri}, title = {Specification of Dynamic Reconfiguration in the Context of Input/Output Relations}, booktitle = {Formal Methods for Open Object-Based Distributed Systems, {IFIF} {TC6/WG6.1} Third International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS), February 15-18, 1999, Florence, Italy}, series = {{IFIP} Conference Proceedings}, volume = {139}, publisher = {Kluwer}, year = {1999}, timestamp = {Wed, 14 Jan 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fmoods/Stoelen99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nada/StolenF98, author = {Ketil St{\o}len and Max Fuchs}, editor = {Bernhard M{\"{o}}ller and John V. Tucker}, title = {An Exercise in Conditional Refinement}, booktitle = {Prospects for Hardware Foundations, {ESPRIT} Working Group 8533, {NADA} - New Hardware Design Methods, Survey Chapters}, series = {Lecture Notes in Computer Science}, volume = {1546}, pages = {390--420}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49254-2\_12}, doi = {10.1007/3-540-49254-2\_12}, timestamp = {Fri, 12 Jul 2019 14:39:18 +0200}, biburl = {https://dblp.org/rec/conf/nada/StolenF98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/StolenDW96, author = {Ketil St{\o}len and Frank Dederichs and Rainer Weber}, title = {Specification and Refinement of Networks of Asynchronously Communicating Agents Using the Assumption/Commitment Paradigm}, journal = {Formal Aspects Comput.}, volume = {8}, number = {2}, pages = {127--161}, year = {1996}, url = {https://doi.org/10.1007/BF01214554}, doi = {10.1007/BF01214554}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/StolenDW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/Stolen96, author = {Ketil St{\o}len}, title = {Refinement Principles Supporting the Transition from Asynchronous to Synchronous Communication}, journal = {Sci. Comput. Program.}, volume = {26}, number = {1-3}, pages = {255--272}, year = {1996}, url = {https://doi.org/10.1016/0167-6423(95)00031-3}, doi = {10.1016/0167-6423(95)00031-3}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/Stolen96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amast/GrosuS96, author = {Radu Grosu and Ketil St{\o}len}, editor = {Martin Wirsing and Maurice Nivat}, title = {A Model for Mobile Point-to-Point Data-flow Networks without Channel Sharing}, booktitle = {Algebraic Methodology and Software Technology, 5th International Conference, {AMAST} '96, Munich, Germany, July 1-5, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1101}, pages = {504--519}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0014336}, doi = {10.1007/BFB0014336}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/amast/GrosuS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/Stolen96, author = {Ketil St{\o}len}, editor = {Hanne Riis Nielson}, title = {Assumption/Commitment Rules for Dataflow Networks - With an Emphasis on Completeness}, booktitle = {Programming Languages and Systems - ESOP'96, 6th European Symposium on Programming, Link{\"{o}}ping, Sweden, April 22-24, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1058}, pages = {356--372}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61055-3\_48}, doi = {10.1007/3-540-61055-3\_48}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/esop/Stolen96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mpc/Stolen95, author = {Ketil St{\o}len}, editor = {Bernhard M{\"{o}}ller}, title = {A Refinement Relation Supporting the Transition from Unbounded to Bounded Communication Buffers}, booktitle = {Mathematics of Program Construction, MPC'95, Kloster Irsee, Germany, July 17-21, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {947}, pages = {423--451}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60117-1\_23}, doi = {10.1007/3-540-60117-1\_23}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/mpc/Stolen95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/Stolen94, author = {Ketil St{\o}len}, editor = {Manfred Broy and Stephan Merz and Katharina Spies}, title = {Using Relations to Solve the RPC-Memory Specification Problem}, booktitle = {Formal Systems Specification, The RPC-Memory Specification Case Study (the book grow out of a Dagstuhl Seminar, September 1994)}, series = {Lecture Notes in Computer Science}, volume = {1169}, pages = {477--520}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0024439}, doi = {10.1007/BFB0024439}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/Stolen94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/HolzS94, author = {Eckhardt Holz and Ketil St{\o}len}, editor = {Dieter Hogrefe and Stefan Leue}, title = {An attempt to embed a restricted version of {SDL} as a target language in Focus}, booktitle = {Formal Description Techniques VII, Proceedings of the 7th {IFIP} {WG6.1} International Conference on Formal Description Techniques, Berne, Switzerland, 1994}, series = {{IFIP} Conference Proceedings}, volume = {6}, pages = {324--339}, publisher = {Chapman {\&} Hall}, year = {1994}, timestamp = {Thu, 03 Jan 2002 11:58:39 +0100}, biburl = {https://dblp.org/rec/conf/forte/HolzS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ftrtft/BroyS94, author = {Manfred Broy and Ketil St{\o}len}, editor = {Hans Langmaack and Willem P. de Roever and Jan Vytopil}, title = {Specification and Refinement of Finite Dataflow Networks - a Relational Approach}, booktitle = {Formal Techniques in Real-Time and Fault-Tolerant Systems, Third International Symposium Organized Jointly with the Working Group Provably Correct Systems - ProCoS, L{\"{u}}beck, Germany, September 19-23, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {863}, pages = {247--267}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58468-4\_169}, doi = {10.1007/3-540-58468-4\_169}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ftrtft/BroyS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:tr/tum/TUM-I-9303, author = {Ketil St{\o}len and Frank Dederichs and Rainer Weber}, title = {Assumption, commitment rules for networks of asynchronously communicating agents}, journal = {Forschungsberichte, {TU} Munich}, volume = {{TUM} {I} 9303}, pages = {1--47}, year = {1993}, url = {https://d-nb.info/943359414}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/tr/tum/TUM-I-9303.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:tr/tum/TUM-I-9338, author = {Max Fuchs and Ketil St{\o}len}, title = {Development of a distributed min max component}, journal = {Forschungsberichte, {TU} Munich}, volume = {{TUM} {I} 9338}, pages = {1--26}, year = {1993}, url = {https://d-nb.info/941682358}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/tr/tum/TUM-I-9338.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/Stolen92, author = {Ketil St{\o}len}, editor = {Michel Diaz and Roland Groz}, title = {Shared-state design modulo weak and strong process fairness}, booktitle = {Formal Description Techniques, V, Proceedings of the {IFIP} {TC6/WG6.1} Fifth International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols, {FORTE} '92, Perros-Guirec, France, 13-16 October 1992}, series = {{IFIP} Transactions}, volume = {{C-10}}, pages = {479--498}, publisher = {North-Holland}, year = {1992}, timestamp = {Thu, 04 Nov 2004 11:08:03 +0100}, biburl = {https://dblp.org/rec/conf/forte/Stolen92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/refine/Stolen92, author = {Ketil St{\o}len}, editor = {Cliff B. Jones and Roger C. Shaw and B. Tim Denvir}, title = {Proving Total Correctness with Respect to a Fair (Shared-State) Parallel Language}, booktitle = {5th Refinement Workshop, Proceedings of the 5th Refinement Workshop, organised by BCS-FACS, London, 8-10 January 1992}, series = {Workshops in Computing}, pages = {320--341}, publisher = {Springer London}, year = {1992}, url = {https://doi.org/10.1007/978-1-4471-3550-0\_17}, doi = {10.1007/978-1-4471-3550-0\_17}, timestamp = {Tue, 20 Aug 2019 12:53:32 +0200}, biburl = {https://dblp.org/rec/conf/refine/Stolen92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/Stolen91, author = {Ketil St{\o}len}, editor = {Jos C. M. Baeten and Jan Friso Groote}, title = {A Method for the Development of Totally Correct Shared-State Parallel Programs}, booktitle = {{CONCUR} '91, 2nd International Conference on Concurrency Theory, Amsterdam, The Netherlands, August 26-29, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {527}, pages = {510--525}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54430-5\_110}, doi = {10.1007/3-540-54430-5\_110}, timestamp = {Fri, 27 Mar 2020 08:51:56 +0100}, biburl = {https://dblp.org/rec/conf/concur/Stolen91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/Stolen91, author = {Ketil St{\o}len}, editor = {S{\o}ren Prehn and W. J. Toetenel}, title = {An Attempt to Reason about Shared-State Concurrency in the Style of {VDM}}, booktitle = {{VDM} '91 - Formal Software Development, 4th International Symposium of {VDM} Europe, Noordwijkerhout, The Netherlands, October 21-25, 1991, Proceedings, Volume 1: Conference Contributions}, series = {Lecture Notes in Computer Science}, volume = {551}, pages = {324--342}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54834-3\_20}, doi = {10.1007/3-540-54834-3\_20}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/Stolen91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.