A Structured Comparison of Security Standards
Empirical Assessment of Security Requirements and Architecture: Lessons Learned
STS-Tool: Security Requirements Engineering for Socio-Technical Systems
Model-Driven Development of a Secure eHealth Application
Modeling Security Features of Web Applications
On the Synthesis of Secure Services Composition
Privacy and Access Control in Federated Social Networks
Engineering Trust-Awareness and Self-adaptability in Services and Systems
Validation of Access Control Systems
Evaluation of Engineering Approaches in the Secure Software Development Life Cycle
A Toolchain for Designing and Testing Access Control Policies
Verification of Authorization Policies Modified by Delegation
ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System
Divide and Conquer – Towards a Notion of Risk Model Encapsulation
Preserving Data Privacy in e-Health.