A model-checking approach to analysing organisational controls in a loan origination process A Schaad, V Lotz, K Sohr Proceedings of the eleventh ACM symposium on Access control models and …, 2006 | 133 | 2006 |
Analyzing and managing role-based access control policies K Sohr, M Drouineaud, GJ Ahn, M Gogolla IEEE Transactions on Knowledge and Data Engineering 20 (7), 924-939, 2008 | 96 | 2008 |
Automatically extracting threats from extended data flow diagrams BJ Berger, K Sohr, R Koschke Engineering Secure Software and Systems: 8th International Symposium, ESSoS …, 2016 | 71 | 2016 |
Specification and validation of authorisation constraints using UML and OCL K Sohr, GJ Ahn, M Gogolla, L Migge Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005 | 56 | 2005 |
Extracting and analyzing the implemented security architecture of business applications BJ Berger, K Sohr, R Koschke 2013 17th European Conference on Software Maintenance and Reengineering, 285-294, 2013 | 46 | 2013 |
A temporal-logic extension of role-based access control covering dynamic separation of duties T Mossakowski, M Drouineaud, K Sohr 10th International Symposium on Temporal Representation and Reasoning, 2003 …, 2003 | 46 | 2003 |
Organizing security patterns related to security and pattern recognition requirements M Bunke, R Koschke, K Sohr International Journal on Advances in Security 5 (1), 2012 | 45 | 2012 |
A first step towards formal verification of security policy properties for RBAC M Drouineaud, M Bortin, P Torrini, K Sohr Fourth International Conference onQuality Software, 2004. QSIC 2004 …, 2004 | 45 | 2004 |
Enforcing role-based access control policies in web services with UML and OCL K Sohr, T Mustafa, X Bao, GJ Ahn 2008 Annual Computer Security Applications Conference (ACSAC), 257-266, 2008 | 36 | 2008 |
Formal specification of role-based security policies for clinical information systems K Sohr, M Drouineaud, GJ Ahn Proceedings of the 2005 ACM symposium on Applied computing, 332-339, 2005 | 35 | 2005 |
An architecture-centric approach to detecting security patterns in software M Bunke, K Sohr International Symposium on Engineering Secure Software and Systems, 156-166, 2011 | 33 | 2011 |
Idea: Towards architecture-centric security analysis of software K Sohr, B Berger International Symposium on Engineering Secure Software and Systems, 70-78, 2010 | 32 | 2010 |
An android security case study with bauhaus BJ Berger, M Bunke, K Sohr 2011 18th Working Conference on Reverse Engineering, 179-183, 2011 | 30 | 2011 |
IO: An interconnected asset ontology in support of risk management processes H Birkholz, I Sieverdingbeck, K Sohr, C Bormann 2012 Seventh International Conference on Availability, Reliability and …, 2012 | 29 | 2012 |
Comprehensive two-level analysis of static and dynamic rbac constraints with uml and ocl M Kuhlmann, K Sohr, M Gogolla 2011 Fifth International Conference on Secure Software Integration and …, 2011 | 25 | 2011 |
What could go wrong? raising mobile privacy and security awareness through a decision-making game N Zargham, M Bahrini, G Volkmar, D Wenig, K Sohr, R Malaka Extended Abstracts of the Annual Symposium on Computer-Human Interaction in …, 2019 | 20 | 2019 |
Employing UML and OCL for designing and analysing role-based access control M Kuhlmann, K Sohr, M Gogolla Mathematical Structures in Computer Science 23 (4), 796-833, 2013 | 20 | 2013 |
Software security aspects of Java-based mobile phones K Sohr, T Mustafa, A Nowak Proceedings of the 2011 ACM Symposium on Applied Computing, 1494-1501, 2011 | 20 | 2011 |
Articulating and enforcing authorisation policies with UML and OCL K Sohr, GJ Ahn, L Migge ACM SIGSOFT Software Engineering Notes 30 (4), 1-7, 2005 | 20 | 2005 |
Efficient automated generation of attack trees from vulnerability databases H Birkholz, S Edelkamp, F Junge, K Sohr Working Notes for the 2010 AAAI Workshop on Intelligent Security (SecArt), 47-55, 2010 | 19 | 2010 |