Search

Your search keyword '"Heisel A"' showing total 543 results

Search Constraints

Start Over You searched for: Author "Heisel A" Remove constraint Author: "Heisel A" Publication Type eBooks Remove constraint Publication Type: eBooks
543 results on '"Heisel A"'

Search Results

1. Creating Privacy Policies from Data-Flow Diagrams

2. Enabling Design for Circularity with Computational Tools

3. Pattern-Based Risk Identification for Model-Based Risk Management

4. Eyelid and Periocular Cutaneous Carcinomas

6. Meeting Strangers Online: Feature Models for Trustworthiness Assessment

7. The Relevance of Privacy Concerns, Trust, and Risk for Hybrid Social Media

9. Risk Identification Based on Architectural Patterns

11. Risk Treatment: An Iterative Method for Identifying Controls

13. Model-Based Risk Analysis and Evaluation Using CORAS and CVSS

14. PDP-ReqLite: A Lightweight Approach for the Elicitation of Privacy and Data Protection Requirements

15. Systematic Asset Identification and Modeling During Requirements Engineering

17. Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem Diagrams

18. Risk-Based Elicitation of Security Requirements According to the ISO 27005 Standard

19. Privacy Policy Specification Framework for Addressing End-Users’ Privacy Requirements

20. Combining Safety and Security in Autonomous Cars Using Blockchain Technologies

21. A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements

24. Towards an ILP Approach for Learning Privacy Heuristics from Users’ Regrets

25. Secure Data Processing in the Cloud

27. Trustworthiness Cases – Toward Preparation for the Trustworthiness Certification

28. Access-Control Prediction in Social Network Sites: Examining the Role of Homophily

32. Facilitating Reuse of Control Software Through Context Modelling Based on the Six-Variable Model

33. Towards Systematic Privacy and Operability (PRIOP) Studies

35. Online Self-disclosure: From Users’ Regrets to Instructional Awareness

36. Pattern-Based Representation of Privacy Enhancing Technologies as Early Aspects

38. Prothesenspezifische Aspekte

43. ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System

44. A Structured Comparison of Security Standards

45. Supporting Privacy Impact Assessments Using Problem-Based Privacy Analysis

46. Enhancing Business Process Models with Trustworthiness Requirements

48. Understanding the Privacy Goal Intervenability

49. A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN

Catalog

Books, media, physical & digital resources