Gerhard Popp

Learn More
In this paper we outline a new process model for security engineering. This process model extends object oriented, use case oriented software development by systematic security requirements elicitation and realization. In particular, we integrate the modeling of security requirements, threat and risk analysis on the one hand with the modeling of business(More)
Due to increasing interconnection, IT systems are confronted with more and more attacks. To address this problem, we have to consider security requirements from the beginning of the system development. In early phases of system development, it is common to use a hybrid system view which is based on an object oriented modeling of the application core and the(More)
Today’s software development projects are confronted with a frequently changing environment like rapidly altering business domains and processes, a fast technology evolution and a great variety of evolving methods and development processes. Therefore highly flexible and adaptable software development processes are required, which allow projects to react on(More)
In thyrocytes, the beta-amyloid precursor protein (beta-APP) is expressed, proteolytically cleaved and released into the extracellular space in a TSH-dependent fashion. Immunocytochemically, beta-APP was detectable mainly in the stacked Golgi cisternae indicating the accumulation in this organelle. Because this unusual immunoreactivity might be related to(More)
Change and evolution of business and technology imply change and evolution of development processes. Besides that for a certain enterprise and/or project we will usually integrate elements from a variety of existing process models, comprising generic standards as well as specific development methods. In this paper we propose a Process Framework which is(More)
In this paper we outline a new process model for security engineering. This process model extends object oriented, use case driven software development by the systematic treatment of security related issues. We introduce the notion of security aspects describing security relevant requirements and measures at a certain level of abstraction. We define a(More)
A Software Development Process for a certain enterprise and/or a certain project will usually integrate elements from a variety of existing process models, comprising generic standards as well as specific development methods. Besides that, change and evolution of business and technology imply change and evolution of development processes. In this paper we(More)
1 This work originates form the research project ZEN – Center for Technology, Methodology and Management of Software & Systems Development – a part of Bayerischer Forschungsverbund Software-Engineering (FORSOFT), supported by the Bayerische Forschungsstiftung. 2 Copyright 2002 IEEE. Published in the Proceedings of the Hawai'i International Conference on(More)
The TSH-dependent expression of amyloid precursor-like proteins and the secretion of their ectodomain (sAPP) in rat thyroids coincide with increased rates of thyrocyte proliferation. To analyze whether the secretion of sAPP and the proliferation of thyrocytes are regulatorily linked, we employed [3H]thymidine or 5-bromo-2'-deoxyuridine assays and found that(More)
In this paper we present a novel approach for the specification of user rights in the context of an object oriented use case driven development process. Basically, we extend the specification of methods by a permission section describing the right of some actor to call the method of an object. Our approach is both role based and context based while allowing(More)