• Publications
  • Influence
Eliciting security requirements with misuse cases
TLDR
We present a systematic approach to eliciting security requirements based on use cases, with emphasis on description and method guidelines. Expand
  • 934
  • 67
  • PDF
Eliciting security requirements by misuse cases
TLDR
Use case diagrams (L. Jacobson et al., 1992) have proven quite helpful in requirements engineering, both for eliciting requirements and getting a better overview of requirements already stated. Expand
  • 165
  • 16
  • PDF
Experimental comparison of attack trees and misuse cases for security threat identification
TLDR
A number of methods have been proposed or adapted to include security in the requirements analysis stage, but the industrial take-up has been limited and there are few empirical and comparative evaluations. Expand
  • 130
  • 15
Templates for Misuse Case Description
TLDR
Use cases have proven helpful for eliciting, communicating and documenting requirements. Expand
  • 184
  • 15
Ontological Evaluation of the UML Using the Bunge–Wand–Weber Model
TLDR
An ontological model of information systems, the Bunge–Wand–Weber (BWW) model, is used to analyse and evaluate the Unified Modeling Language (UML) as a language for representing concrete problem domains. Expand
  • 222
  • 14
Conceptual Modelling in Information Systems Engineering
1) From Information Algebra to Enterprise Modelling and Ontologies - a Historical Perspective on Modelling for Information Systems (Janis A. Bubenko jr.) - 2) Fact Oriented Modeling: Past, PresentExpand
  • 89
  • 6
  • PDF
Capturing Security Requirements through Misuse Cases
TLDR
This paper discusses a conceptual extension of use cases, namely ‘misuse cases’, describing actions that should not be possible in a system. Expand
  • 77
  • 6
  • PDF
Research areas and challenges for mobile information systems
TLDR
This paper explores new challenges and possible approaches for developing mobile information systems, with an emphasis on model-based approaches on the conceptual and logical levels. Expand
  • 81
  • 5
  • PDF
Grounding the OML metamodel in ontology
TLDR
This paper analyses and evaluates the OPEN Modelling Language (OML) in terms of the Bunge–Wand–Weber model of information systems in order to: (1) Define the semantics of each relevant OML construct in terms the kind of problem-domain phenomena they are intended to represent. Expand
  • 62
  • 5
The Unified Enterprise Modelling Language – Overview and Further Work
TLDR
The Unified Enterprise Modelling Language (UEML) aims to support integrated use of enterprise and IS models expressed in a variety of languages. Expand
  • 32
  • 5