Search the dblp DataBase
Ketil Stølen :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Radu Grosu , Ketil Stølen A Model for Mobile Point-to-Point Data-flow Networks without Channel Sharing. [Citation Graph (0, 0)][DBLP ] AMAST, 1996, pp:504-519 [Conf ] Dimitris Raptis , Theodosis Dimitrakos , Bjørn Axel Gran , Ketil Stølen The coras approach for model-based risk management applied to e-commerce domain. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:169-181 [Conf ] Ketil Stølen A Method for the Development of Totally Correct Shared-State Parallel Programs. [Citation Graph (0, 0)][DBLP ] CONCUR, 1991, pp:510-525 [Conf ] Mass Soldal Lund , Folker den Braber , Ketil Stølen Maintaining Results from Security Assessment. [Citation Graph (0, 0)][DBLP ] CSMR, 2003, pp:341-350 [Conf ] Øystein Haugen , Knut Eilif Husa , Ragnhild Kobro Runde , Ketil Stølen Why Timed Sequence Diagrams Require Three-Event Semantics. [Citation Graph (0, 0)][DBLP ] Scenarios: Models, Transformations and Tools, 2003, pp:1-25 [Conf ] Ketil Stølen Using Relations to Solve the RPC-Memory Specification Problem. [Citation Graph (0, 0)][DBLP ] Formal Systems Specification, 1994, pp:477-520 [Conf ] Jan Øyvind Aagedal , Folker den Braber , Theodosis Dimitrakos , Bjørn Axel Gran , Dimitris Raptis , Ketil Stølen Model-Based Risk Assessment to Improve Enterprise Security. [Citation Graph (0, 0)][DBLP ] EDOC, 2002, pp:51-0 [Conf ] Ketil Stølen Assumption/Commitment Rules for Dataflow Networks - With an Emphasis on Completeness. [Citation Graph (0, 0)][DBLP ] ESOP, 1996, pp:356-372 [Conf ] Theodosis Dimitrakos , Dimitris Raptis , Brian Ritchie , Ketil Stølen Model Based Security Risk Analysis for Web Applications. [Citation Graph (0, 0)][DBLP ] EuroWeb, 2002, pp:- [Conf ] Mass Soldal Lund , Ketil Stølen A Fully General Operational Semantics for UML 2.0 Sequence Diagrams with Potential and Mandatory Choice. [Citation Graph (0, 0)][DBLP ] FM, 2006, pp:380-395 [Conf ] Ketil Stølen An Attempt to Reason about Shared-State Concurrency in the Style of VDM. [Citation Graph (0, 0)][DBLP ] VDM Europe (1), 1991, pp:324-342 [Conf ] Ragnhild Kobro Runde , Øystein Haugen , Ketil Stølen The Pragmatics of STAIRS. [Citation Graph (0, 0)][DBLP ] FMCO, 2005, pp:88-114 [Conf ] Atle Refsdal , Ragnhild Kobro Runde , Ketil Stølen Underspecification, Inherent Nondeterminism and Probability in Sequence Diagrams. [Citation Graph (0, 0)][DBLP ] FMOODS, 2006, pp:138-155 [Conf ] K. Stoelen Specification of Dynamic Reconfiguration in the Context of Input/Output Relations. [Citation Graph (0, 0)][DBLP ] FMOODS, 1999, pp:- [Conf ] Atle Refsdal , Knut Eilif Husa , Ketil Stølen Specification and Refinement of Soft Real-Time Requirements Using Sequence Diagrams. [Citation Graph (0, 0)][DBLP ] FORMATS, 2005, pp:32-48 [Conf ] Eckhardt Holz , Ketil Stølen An attempt to embed a restricted version of SDL as a target language in Focus. [Citation Graph (0, 0)][DBLP ] FORTE, 1994, pp:324-339 [Conf ] Ketil Stølen Shared-state design modulo weak and strong process fairness. [Citation Graph (0, 0)][DBLP ] FORTE, 1992, pp:479-498 [Conf ] Manfred Broy , Ketil Stølen Specification and Refinement of Finite Dataflow Networks - a Relational Approach. [Citation Graph (0, 0)][DBLP ] FTRTFT, 1994, pp:247-267 [Conf ] Theodosis Dimitrakos , Brian Ritchie , Dimitris Raptis , Jan Øyvind Aagedal , Folker den Braber , Ketil Stølen , Siv Hilde Houmb Integrating Model-based Security Risk Management into eBusiness Systems Development: The CORAS Approach. [Citation Graph (0, 0)][DBLP ] I3E, 2002, pp:159-175 [Conf ] Fredrik Seehusen , Ketil Stølen Graphical Specification of Dynamic Network Structure. [Citation Graph (0, 0)][DBLP ] ICEIS (3), 2005, pp:203-210 [Conf ] Ida Hogganvik , Ketil Stølen Risk analysis terminology for IT-systems: does it match intuition? [Citation Graph (0, 0)][DBLP ] ISESE, 2005, pp:13-22 [Conf ] Gyrd Brændeland , Ketil Stølen Using Risk Analysis to Assess User Trust: A Net-Bank Scenario. [Citation Graph (0, 0)][DBLP ] iTrust, 2004, pp:146-160 [Conf ] Fredrik Vraalsen , Folker den Braber , Mass Soldal Lund , Ketil Stølen The CORAS Tool for Security Risk Analysis. [Citation Graph (0, 0)][DBLP ] iTrust, 2005, pp:402-405 [Conf ] Fredrik Vraalsen , Mass Soldal Lund , Tobias Mahler , Xavier Parent , Ketil Stølen Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language. [Citation Graph (0, 0)][DBLP ] iTrust, 2005, pp:45-60 [Conf ] Ida Hogganvik , Ketil Stølen On the Comprehension of Security Risk Scenarios. [Citation Graph (0, 0)][DBLP ] IWPC, 2005, pp:115-124 [Conf ] Ida Hogganvik , Ketil Stølen A Graphical Approach to Risk Identification, Motivated by Empirical Investigations. [Citation Graph (0, 0)][DBLP ] MoDELS, 2006, pp:574-588 [Conf ] Ketil Stølen A Refinement Relation Supporting the Transition from Unbounded to Bounded Communication Buffers. [Citation Graph (0, 0)][DBLP ] MPC, 1995, pp:423-451 [Conf ] Ketil Stølen , Max Fuchs An Exercise in Conditional Refinement. [Citation Graph (0, 0)][DBLP ] Prospects for Hardware Foundations, 1998, pp:390-420 [Conf ] Fredrik Seehusen , Ketil Stølen Information flow property preserving transformation of UML interaction diagrams. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:150-159 [Conf ] Rune Fredriksen , Monica Kristiansen , Bjørn Axel Gran , Ketil Stølen , Tom Arthur Opperud , Theodosis Dimitrakos The CORAS Framework for a Model-Based Risk Management Process. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2002, pp:94-105 [Conf ] Ketil Stølen , P. Mohn Experience from Using MSC, UML and SDL in the Development of the FAME Communication Manager. [Citation Graph (0, 0)][DBLP ] SAM, 2000, pp:276-0 [Conf ] Øystein Haugen , Ketil Stølen STAIRS - Steps to Analyze Interactions with Refinement Semantics. [Citation Graph (0, 0)][DBLP ] UML, 2003, pp:388-402 [Conf ] Radu Grosu , Ketil Stølen Stream-Based Specification of Mobile Systems. [Citation Graph (0, 0)][DBLP ] Formal Asp. Comput., 2001, v:13, n:1, pp:1-31 [Journal ] Ketil Stølen , Frank Dederichs , Rainer Weber Specification and Refinement of Networks of Asynchronously Communicating Agents Using the Assumption/Commitment Paradigm. [Citation Graph (0, 0)][DBLP ] Formal Asp. Comput., 1996, v:8, n:2, pp:127-161 [Journal ] Ragnhild Kobro Runde , Øystein Haugen , Ketil Stølen Refining UML Interactions with Underspecification and Nondeterminism. [Citation Graph (0, 0)][DBLP ] Nord. J. Comput., 2005, v:12, n:2, pp:157-188 [Journal ] Ketil Stølen Refinement Principles Supporting the Transition from Asynchronous to Synchronous Communication. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1996, v:26, n:1-3, pp:255-272 [Journal ] Øystein Haugen , Knut Eilif Husa , Ragnhild Kobro Runde , Ketil Stølen STAIRS towards formal design with sequence diagrams. [Citation Graph (0, 0)][DBLP ] Software and System Modeling, 2005, v:4, n:4, pp:355-357 [Journal ] Gyrd Brændeland , Ketil Stølen A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:31-46 [Conf ] Fredrik Seehusen , Ketil Stølen Maintaining Information Flow Security Under Refinement and Transformation. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:143-157 [Conf ] Bjørnar Solhaug , Dag Elgesem , Ketil Stølen Specifying Policies Using UML Sequence Diagrams - An Evaluation Based on a Case Study. [Citation Graph (0, 0)][DBLP ] POLICY, 2007, pp:19-28 [Conf ] Using model-based security analysis in component-oriented system development. [Citation Graph (, )][DBLP ] Compositional Refinement of Policies in UML - Exemplified for Access Control. [Citation Graph (, )][DBLP ] Deriving Tests from UML 2.0 Sequence Diagrams with neg and assert. [Citation Graph (, )][DBLP ] A Transformational Approach to Facilitate Monitoring of High-Level Policies. [Citation Graph (, )][DBLP ] Using Dependent CORAS Diagrams to Analyse Mutual Dependency. [Citation Graph (, )][DBLP ] Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality. [Citation Graph (, )][DBLP ] Simplifying Parametrization of Bayesian Networks in Prediction of System Quality. [Citation Graph (, )][DBLP ] Evolution in Relation to Risk and Trust Management. [Citation Graph (, )][DBLP ] Extending UML Sequence Diagrams to Model Trust-dependent Behavior With the Aim to Support Risk Analysis. [Citation Graph (, )][DBLP ] Search in 0.029secs, Finished in 0.031secs