• Publications
  • Influence
Security Requirements Engineering: A Framework for Representation and Analysis
TLDR
This paper presents a framework for security requirements elicitation and analysis. Expand
  • 423
  • 24
  • PDF
Deriving security requirements from crosscutting threat descriptions
TLDR
This paper illustrates how representing threats as crosscutting concerns aids in determining the effect of security requirements on the functional requirements of the system. Expand
  • 105
  • 7
  • PDF
A Comparative Evaluation of Algorithms for Discovering Translational Patterns in Baroque Keyboard Works
TLDR
This paper discusses and evaluates algorithms that are intended for the following task: given a piece of music in a semi-symbolic representation, discover so-called translational patterns. Expand
  • 39
  • 7
  • PDF
UniPad: orchestrating collaborative activities through shared tablets and an integrated wall display
TLDR
UniPad is a face-to-face, digital simulation for use in classroom settings that runs on shared tablets and a wall display. Expand
  • 37
  • 6
A framework for security requirements engineering
TLDR
This paper presents a framework for security requirements elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. Expand
  • 170
  • 5
  • PDF
Relating software requirements and architectures using problem frames
TLDR
We extend problem frames to include domains with existing architectural support. Expand
  • 178
  • 4
  • PDF
Security patterns: comparing modeling approaches
Addressing the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurringExpand
  • 31
  • 4
  • PDF
Composing requirements using problem frames
TLDR
We introduce composition frames, a requirements construct that models relevant aspects of composition and thus deals with unwanted effects, such as interference of overlapping reactions. Expand
  • 75
  • 3
  • PDF
The effect of trust assumptions on the elaboration of security requirements
TLDR
We show how the engineer’s derivation, elaboration and analysis of security requirements can be aided through the use of trust assumptions, problem frames, and threat descriptions. Expand
  • 67
  • 3
  • PDF
Let's jam the reactable
TLDR
We describe a long-term lab study of groups of expert musicians improvising with the Reactable, a commercial tabletop TUI for music performance. Expand
  • 34
  • 3
  • PDF