Per Håkon Meland
Per Håkon Meland
SINTEF and NTNU
Dirección de correo verificada de sintef.no
Título
Citado por
Citado por
Año
Security requirements for the rest of us: A survey
IA Tøndel, MG Jaatun, PH Meland
Software, IEEE 25 (1), 20-27, 2008
1542008
Security SLAs for Federated Cloud Services
K Bernsmed, MG Jaatun, PH Meland, A Undheim
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
1062011
Attribute Decoration of Attack–Defense Trees
A Bagnato, B Kordy, PH Meland, P Schweitzer
International Journal of Secure Software Engineering (IJSSE) 3 (2), 1-35, 2012
662012
Secure software design in practice
PH Meland, J Jensen
Availability, Reliability and Security, 2008. ARES 08. Third International …, 2008
382008
Evacuation support system for improved medical documentation and information flow in the field
S Walderhaug, PH Meland, M Mikalsen, T Sagen, JI Brevik
International journal of medical informatics 77 (2), 137-151, 2008
382008
SeaMonster: Providing tool support for security modeling
PH Meland, DG Spampinato, E Hagen, ET Baadshaug, KM Krister, ...
Norsk informasjonssikkerhetskonferanse, NISK, 2008
342008
Mitigating Risk with Cyberinsurance
PH Meland, IA Tondel, B Solhaug
IEEE Security & Privacy, 38-43, 2015
302015
SINTEF ICT, Oslo, Norway
K Bernsmed, MG Jaatun, PH Meland, A Undheim
Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th …, 2012
26*2012
Thunder in the Clouds: Security challenges and solutions for federated Clouds
A Undheim, PH Meland, K Bernsmed, MG Jaatun
Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing …, 2012
26*2012
Reusable Security Requirements for Healthcare Applications
J Jensen, IA Tondel, MG Jaatun, PH Meland, H Andresen
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
262009
How can the developer benefit from security modeling?
S Ardi, D Byers, PH Meland, IA Tøndel, N Shahmehri
Availability, Reliability and Security, 2007. ARES 2007. The Second …, 2007
252007
Security Requirements Engineering for Secure Business Processes
E Paja, P Giorgini, S Paul, PH Meland
Workshops on Business Informatics Research, 77-89, 2012
242012
Security requirements engineering for secure business processes
E Paja, P Giorgini, S Paul, PH Meland
Workshops on Business Informatics Research, 77-89, 2012
242012
An architectural foundation for security model sharing and reuse
PH Meland, S Ardi, J Jensen, E Rios, T Sanchez, N Shahmehri, IA Tondel
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
242009
Access control and integration of health care systems: An experience report and future challenges
L Rostad, O Nytro, IA Tondel, PH Meland
Availability, Reliability and Security, 2007. ARES 2007. The Second …, 2007
212007
Idea: Reusability of Threat Models–Two Approaches with an Experimental Evaluation
P Meland, I Tøndel, J Jensen
Engineering Secure Software and Systems, 114-122, 2010
182010
Threat Analysis in Goal-Oriented Security Requirements Modelling
PH Meland, E Paja, EA Gjære, S Paul, F Dalpiaz, P Giorgini
International Journal of Secure Software Engineering (IJSSE) 5 (2), 1-19, 2014
17*2014
Expressing Cloud Security Requirements in Deontic Contract Languages.
PH Meland, K Bernsmed, MG Jaatun, A Undheim, HN Castejón
CLOSER, 638-646, 2012
162012
Security testing in agile web application development-a case study using the east methodology
G Erdogan, PH Meland, D Mathieson
Agile Processes in Software Engineering and Extreme Programming, 14-27, 2010
162010
Expressing cloud security requirements for SLAs in deontic contract languages for cloud brokers
PH Meland, K Bernsmed, MG Jaatun, HN Castejón, A Undheim
International Journal of Cloud Computing 2 3 (1), 69-93, 2014
152014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20