The SCEAS System
Navigation Menu

Search the dblp DataBase


Ketil Stølen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Radu Grosu, Ketil Stølen
    A Model for Mobile Point-to-Point Data-flow Networks without Channel Sharing. [Citation Graph (0, 0)][DBLP]
    AMAST, 1996, pp:504-519 [Conf]
  2. Dimitris Raptis, Theodosis Dimitrakos, Bjørn Axel Gran, Ketil Stølen
    The coras approach for model-based risk management applied to e-commerce domain. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:169-181 [Conf]
  3. Ketil Stølen
    A Method for the Development of Totally Correct Shared-State Parallel Programs. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1991, pp:510-525 [Conf]
  4. Mass Soldal Lund, Folker den Braber, Ketil Stølen
    Maintaining Results from Security Assessment. [Citation Graph (0, 0)][DBLP]
    CSMR, 2003, pp:341-350 [Conf]
  5. Øystein Haugen, Knut Eilif Husa, Ragnhild Kobro Runde, Ketil Stølen
    Why Timed Sequence Diagrams Require Three-Event Semantics. [Citation Graph (0, 0)][DBLP]
    Scenarios: Models, Transformations and Tools, 2003, pp:1-25 [Conf]
  6. Ketil Stølen
    Using Relations to Solve the RPC-Memory Specification Problem. [Citation Graph (0, 0)][DBLP]
    Formal Systems Specification, 1994, pp:477-520 [Conf]
  7. Jan Øyvind Aagedal, Folker den Braber, Theodosis Dimitrakos, Bjørn Axel Gran, Dimitris Raptis, Ketil Stølen
    Model-Based Risk Assessment to Improve Enterprise Security. [Citation Graph (0, 0)][DBLP]
    EDOC, 2002, pp:51-0 [Conf]
  8. Ketil Stølen
    Assumption/Commitment Rules for Dataflow Networks - With an Emphasis on Completeness. [Citation Graph (0, 0)][DBLP]
    ESOP, 1996, pp:356-372 [Conf]
  9. Theodosis Dimitrakos, Dimitris Raptis, Brian Ritchie, Ketil Stølen
    Model Based Security Risk Analysis for Web Applications. [Citation Graph (0, 0)][DBLP]
    EuroWeb, 2002, pp:- [Conf]
  10. Mass Soldal Lund, Ketil Stølen
    A Fully General Operational Semantics for UML 2.0 Sequence Diagrams with Potential and Mandatory Choice. [Citation Graph (0, 0)][DBLP]
    FM, 2006, pp:380-395 [Conf]
  11. Ketil Stølen
    An Attempt to Reason about Shared-State Concurrency in the Style of VDM. [Citation Graph (0, 0)][DBLP]
    VDM Europe (1), 1991, pp:324-342 [Conf]
  12. Ragnhild Kobro Runde, Øystein Haugen, Ketil Stølen
    The Pragmatics of STAIRS. [Citation Graph (0, 0)][DBLP]
    FMCO, 2005, pp:88-114 [Conf]
  13. Atle Refsdal, Ragnhild Kobro Runde, Ketil Stølen
    Underspecification, Inherent Nondeterminism and Probability in Sequence Diagrams. [Citation Graph (0, 0)][DBLP]
    FMOODS, 2006, pp:138-155 [Conf]
  14. K. Stoelen
    Specification of Dynamic Reconfiguration in the Context of Input/Output Relations. [Citation Graph (0, 0)][DBLP]
    FMOODS, 1999, pp:- [Conf]
  15. Atle Refsdal, Knut Eilif Husa, Ketil Stølen
    Specification and Refinement of Soft Real-Time Requirements Using Sequence Diagrams. [Citation Graph (0, 0)][DBLP]
    FORMATS, 2005, pp:32-48 [Conf]
  16. Eckhardt Holz, Ketil Stølen
    An attempt to embed a restricted version of SDL as a target language in Focus. [Citation Graph (0, 0)][DBLP]
    FORTE, 1994, pp:324-339 [Conf]
  17. Ketil Stølen
    Shared-state design modulo weak and strong process fairness. [Citation Graph (0, 0)][DBLP]
    FORTE, 1992, pp:479-498 [Conf]
  18. Manfred Broy, Ketil Stølen
    Specification and Refinement of Finite Dataflow Networks - a Relational Approach. [Citation Graph (0, 0)][DBLP]
    FTRTFT, 1994, pp:247-267 [Conf]
  19. Theodosis Dimitrakos, Brian Ritchie, Dimitris Raptis, Jan Øyvind Aagedal, Folker den Braber, Ketil Stølen, Siv Hilde Houmb
    Integrating Model-based Security Risk Management into eBusiness Systems Development: The CORAS Approach. [Citation Graph (0, 0)][DBLP]
    I3E, 2002, pp:159-175 [Conf]
  20. Fredrik Seehusen, Ketil Stølen
    Graphical Specification of Dynamic Network Structure. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2005, pp:203-210 [Conf]
  21. Ida Hogganvik, Ketil Stølen
    Risk analysis terminology for IT-systems: does it match intuition? [Citation Graph (0, 0)][DBLP]
    ISESE, 2005, pp:13-22 [Conf]
  22. Gyrd Brændeland, Ketil Stølen
    Using Risk Analysis to Assess User Trust: A Net-Bank Scenario. [Citation Graph (0, 0)][DBLP]
    iTrust, 2004, pp:146-160 [Conf]
  23. Fredrik Vraalsen, Folker den Braber, Mass Soldal Lund, Ketil Stølen
    The CORAS Tool for Security Risk Analysis. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:402-405 [Conf]
  24. Fredrik Vraalsen, Mass Soldal Lund, Tobias Mahler, Xavier Parent, Ketil Stølen
    Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:45-60 [Conf]
  25. Ida Hogganvik, Ketil Stølen
    On the Comprehension of Security Risk Scenarios. [Citation Graph (0, 0)][DBLP]
    IWPC, 2005, pp:115-124 [Conf]
  26. Ida Hogganvik, Ketil Stølen
    A Graphical Approach to Risk Identification, Motivated by Empirical Investigations. [Citation Graph (0, 0)][DBLP]
    MoDELS, 2006, pp:574-588 [Conf]
  27. Ketil Stølen
    A Refinement Relation Supporting the Transition from Unbounded to Bounded Communication Buffers. [Citation Graph (0, 0)][DBLP]
    MPC, 1995, pp:423-451 [Conf]
  28. Ketil Stølen, Max Fuchs
    An Exercise in Conditional Refinement. [Citation Graph (0, 0)][DBLP]
    Prospects for Hardware Foundations, 1998, pp:390-420 [Conf]
  29. Fredrik Seehusen, Ketil Stølen
    Information flow property preserving transformation of UML interaction diagrams. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:150-159 [Conf]
  30. Rune Fredriksen, Monica Kristiansen, Bjørn Axel Gran, Ketil Stølen, Tom Arthur Opperud, Theodosis Dimitrakos
    The CORAS Framework for a Model-Based Risk Management Process. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2002, pp:94-105 [Conf]
  31. Ketil Stølen, P. Mohn
    Experience from Using MSC, UML and SDL in the Development of the FAME Communication Manager. [Citation Graph (0, 0)][DBLP]
    SAM, 2000, pp:276-0 [Conf]
  32. Øystein Haugen, Ketil Stølen
    STAIRS - Steps to Analyze Interactions with Refinement Semantics. [Citation Graph (0, 0)][DBLP]
    UML, 2003, pp:388-402 [Conf]
  33. Radu Grosu, Ketil Stølen
    Stream-Based Specification of Mobile Systems. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2001, v:13, n:1, pp:1-31 [Journal]
  34. Ketil Stølen, Frank Dederichs, Rainer Weber
    Specification and Refinement of Networks of Asynchronously Communicating Agents Using the Assumption/Commitment Paradigm. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 1996, v:8, n:2, pp:127-161 [Journal]
  35. Ragnhild Kobro Runde, Øystein Haugen, Ketil Stølen
    Refining UML Interactions with Underspecification and Nondeterminism. [Citation Graph (0, 0)][DBLP]
    Nord. J. Comput., 2005, v:12, n:2, pp:157-188 [Journal]
  36. Ketil Stølen
    Refinement Principles Supporting the Transition from Asynchronous to Synchronous Communication. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1996, v:26, n:1-3, pp:255-272 [Journal]
  37. Øystein Haugen, Knut Eilif Husa, Ragnhild Kobro Runde, Ketil Stølen
    STAIRS towards formal design with sequence diagrams. [Citation Graph (0, 0)][DBLP]
    Software and System Modeling, 2005, v:4, n:4, pp:355-357 [Journal]
  38. Gyrd Brændeland, Ketil Stølen
    A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:31-46 [Conf]
  39. Fredrik Seehusen, Ketil Stølen
    Maintaining Information Flow Security Under Refinement and Transformation. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:143-157 [Conf]
  40. Bjørnar Solhaug, Dag Elgesem, Ketil Stølen
    Specifying Policies Using UML Sequence Diagrams - An Evaluation Based on a Case Study. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:19-28 [Conf]

  41. Using model-based security analysis in component-oriented system development. [Citation Graph (, )][DBLP]

  42. Compositional Refinement of Policies in UML - Exemplified for Access Control. [Citation Graph (, )][DBLP]

  43. Deriving Tests from UML 2.0 Sequence Diagrams with neg and assert. [Citation Graph (, )][DBLP]

  44. A Transformational Approach to Facilitate Monitoring of High-Level Policies. [Citation Graph (, )][DBLP]

  45. Using Dependent CORAS Diagrams to Analyse Mutual Dependency. [Citation Graph (, )][DBLP]

  46. Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality. [Citation Graph (, )][DBLP]

  47. Simplifying Parametrization of Bayesian Networks in Prediction of System Quality. [Citation Graph (, )][DBLP]

  48. Evolution in Relation to Risk and Trust Management. [Citation Graph (, )][DBLP]

  49. Extending UML Sequence Diagrams to Model Trust-dependent Behavior With the Aim to Support Risk Analysis. [Citation Graph (, )][DBLP]

Search in 0.029secs, Finished in 0.031secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002