Model-driven risk analysis: the CORAS approach MS Lund, B Solhaug, K Stølen Springer Science & Business Media, 2010 | 586 | 2010 |
Cyber-risk management A Refsdal, B Solhaug, K Stølen, A Refsdal, B Solhaug, K Stølen Cyber-risk management, 33-47, 2015 | 165 | 2015 |
Why trust is not proportional to risk B Solhaug, D Elgesem, K Stolen The Second International Conference on Availability, Reliability and …, 2007 | 85 | 2007 |
Evolution in relation to risk and trust management MS Lund, B Solhaug, K Stølen Computer 43 (05), 49-55, 2010 | 63 | 2010 |
Mitigating risk with cyberinsurance PH Meland, IA Tondel, B Solhaug IEEE Security & Privacy 13 (6), 38-43, 2015 | 61 | 2015 |
Risk analysis of changing and evolving systems using CORAS MS Lund, B Solhaug, K Stølen Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures 11 …, 2011 | 56 | 2011 |
ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system K Beckers, M Heisel, B Solhaug, K Stølen Engineering Secure Future Internet Services and Systems: Current Research …, 2014 | 46 | 2014 |
A guided tour of the CORAS method MS Lund, B Solhaug, K Stølen, MS Lund, B Solhaug, K Stølen Model-driven risk analysis: The CORAS approach, 23-43, 2011 | 36 | 2011 |
The CORAS model-based method for security risk analysis F Den Braber, G Brændeland, HEI Dahl, I Engan, I Hogganvik, MS Lund, ... SINTEF, Oslo 12, 15-32, 2006 | 35 | 2006 |
The CORAS Language–Why it is Designed the Way it is B Solhaug, K Stølen Safety, Reliability, Risk and Life-Cycle Performance of Structures and …, 2013 | 30 | 2013 |
Evolution of security engineering artifacts: a state of the art survey M Felderer, B Katt, P Kalb, J Jürjens, M Ochoa, F Paci, TT Tun, K Yskout, ... Transportation Systems and Engineering: Concepts, Methodologies, Tools, and …, 2015 | 25 | 2015 |
Model-driven risk analysis of evolving critical infrastructures B Solhaug, F Seehusen Journal of Ambient Intelligence and Humanized Computing 5, 187-204, 2014 | 22 | 2014 |
Using cyber-insurance as a risk management strategy: Knowledge gaps and recommendations for further research IA Tøndel, PH Meland, A Omerovic, EA Gjære, B Solhaug | 19 | 2015 |
Semantics for multi-agent only knowing A Waaler, B Solhaug Proceedings of the 10th conference on Theoretical aspects of rationality and …, 2005 | 19 | 2005 |
Specifying Policies Using UML Sequence Diagrams--An Evaluation Based on a Case Study B Solhaug, D Elgesem, K Stolen Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007 | 18 | 2007 |
A UML-based method for the development of policies to support trust management A Refsdal, B Solhaug, K Stølen IFIP International Conference on Trust Management, 33-49, 2008 | 17 | 2008 |
Uncertainty, subjectivity, trust and risk: How it all fits together B Solhaug, K Stølen Security and Trust Management: 7th International Workshop, STM 2011 …, 2012 | 15 | 2012 |
Adherence preserving refinement of trace-set properties in STAIRS: exemplified for information flow properties and policies F Seehusen, B Solhaug, K Stølen Software & Systems Modeling 8, 45-65, 2009 | 15 | 2009 |
Security risk analysis of system changes exemplified within the oil and gas domain A Refsdal, B Solhaug, K Stølen International Journal on Software Tools for Technology Transfer 17, 251-266, 2015 | 13 | 2015 |
Compositional refinement of policies in UML–Exemplified for access control B Solhaug, K Stølen Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008 | 11 | 2008 |