Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Eliciting security requirements with misuse cases
TLDR
Eliciting security requirements by misuse cases
TLDR
Experimental comparison of attack trees and misuse cases for security threat identification
TLDR
Templates for Misuse Case Description
TLDR
- 184
- 15
Ontological Evaluation of the UML Using the Bunge–Wand–Weber Model
- A. Opdahl, B. Henderson-Sellers
- Computer Science
- Software and Systems Modeling
- 12 September 2002
TLDR
Conceptual Modelling in Information Systems Engineering
- J. Krogstie, A. Opdahl, S. Brinkkemper
- Computer Science
- 1 July 2007
1) From Information Algebra to Enterprise Modelling and Ontologies - a Historical Perspective on Modelling for Information Systems (Janis A. Bubenko jr.) - 2) Fact Oriented Modeling: Past, Present… Expand
Capturing Security Requirements through Misuse Cases
TLDR
- 77
- 6
- PDF
Research areas and challenges for mobile information systems
- J. Krogstie, K. Lyytinen, A. Opdahl, B. Pernici, K. Siau, K. Smolander
- Computer Science
- Int. J. Mob. Commun.
- 1 September 2004
TLDR
Grounding the OML metamodel in ontology
- A. Opdahl, B. Henderson-Sellers
- Computer Science
- J. Syst. Softw.
- 22 June 2001
TLDR
The Unified Enterprise Modelling Language – Overview and Further Work
- V. Anaya, G. Berio, +5 authors Maria Jose Verdecho
- Computer Science
- 2008
TLDR