Stephan Faßbender
TitleCited byYear
A pattern-based method for establishing a cloud-specific information security management system
K Beckers, I Côté, S Faßbender, M Heisel, S Hofbauer
Requirements Engineering 18 (4), 343-395, 2013
562013
Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing
K Beckers, H Schmidt, JC Kuster, S Faßbender
2011 Sixth International Conference on Availability, Reliability and …, 2011
462011
A problem-based approach for computer-aided privacy threat identification
K Beckers, S Faßbender, M Heisel, R Meis
Annual Privacy Forum, 1-16, 2012
332012
A pattern-based method for identifying and analyzing laws
K Beckers, S Faßbender, JC Küster, H Schmidt
International Working Conference on Requirements Engineering: Foundation for …, 2012
212012
An integrated method for pattern-based elicitation of legal requirements applied to a cloud computing example
K Beckers, S Faßbender, H Schmidt
2012 Seventh International Conference on Availability, Reliability and …, 2012
172012
Supporting the development and documentation of ISO 27001 information security management systems through security requirements engineering approaches
K Beckers, S Faßbender, M Heisel, JC Küster, H Schmidt
International Symposium on Engineering Secure Software and Systems, 14-21, 2012
162012
Functional requirements under security pressure
S Faßbender, M Heisel, R Meis
2014 9th International Conference on Software Paradigm Trends (ICSOFT-PT), 5-16, 2014
152014
Common criteria compliant software development (CC-CASD)
K Beckers, S Faßbender, D Hatebur, M Heisel, I Côté
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1298-1304, 2013
152013
A threat analysis methodology for smart home scenarios
K Beckers, S Faßbender, M Heisel, S Suppan
International Workshop on Smart Grid Security, 94-124, 2014
142014
Optimizing functional and quality requirements according to stakeholders’ goals
A Alebrahim, C Choppy, S Faßbender, M Heisel
Relating System Quality and Software Architecture, 75-120, 2014
142014
Using security requirements engineering approaches to support ISO 27001 information security management systems development and documentation
K Beckers, S Faßbender, M Heisel, H Schmidt
2012 Seventh International Conference on Availability, Reliability and …, 2012
142012
From Problems to Laws in Requirements Engineering-Using Model-Transformation.
S Faßbender, M Heisel
ICSOFT 13, 447-458, 2013
122013
A meta-model approach to the fundamentals for a pattern language for context elicitation
K Beckers, S Faßbender, M Heisel
Proceedings of the 18th European Conference on Pattern Languages of Programs …, 2013
112013
Problem-based requirements interaction analysis
A Alebrahim, S Faßbender, M Heisel, R Meis
International Working Conference on Requirements Engineering: Foundation for …, 2014
92014
Combining goal-oriented and problem-oriented requirements engineering methods
K Beckers, S Faßbender, M Heisel, F Paci
International Conference on Availability, Reliability, and Security, 178-194, 2013
92013
Pattern-based context establishment for service-oriented architectures
K Beckers, S Faßbender, M Heisel, R Meis
Software service and application engineering, 81-101, 2012
92012
Peer-to-peer driven software engineering considering security, reliability, and performance
K Beckers, S Faßbender
2012 Seventh International Conference on Availability, Reliability and …, 2012
72012
Aspect-oriented requirements engineering with problem frames
S Faßbender, M Heisel, R Meis
2014 9th International Conference on Software Paradigm Trends (ICSOFT-PT …, 2014
62014
Towards a computer-aided problem-oriented variability requirements engineering method
A Alebrahim, S Faßbender, M Filipczyk, M Goedicke, M Heisel, ...
International Conference on Advanced Information Systems Engineering, 136-147, 2014
62014
A meta-model for context-patterns
K Beckers, S Fassbender, M Heisel
Proceedings of the 18th European Conference on Pattern Languages of Program, 5, 2015
52015
The system can't perform the operation now. Try again later.
Articles 1–20