Model-based security analysis in seven steps — a guided tour to the CORAS method
den Braber, F., Hogganvik, I., Lund, M. S., Stølen, K., Vraalsen, F.
Published in BT technology journal (01.01.2007)
Published in BT technology journal (01.01.2007)
Get full text
Journal Article
Model-based risk assessment to improve enterprise security
Aagedal, J.O., den Braber, F., Dimitrakos, T., Gran, B.A., Raptis, D., Stolen, K.
Published in Proceedings. Sixth International Enterprise Distributed Object Computing (2002)
Published in Proceedings. Sixth International Enterprise Distributed Object Computing (2002)
Get full text
Conference Proceeding
Maintaining results from security assessments
Lund, M.S., den Braber, F., Stolen, K.
Published in Seventh European Conference onSoftware Maintenance and Reengineering, 2003. Proceedings (2003)
Published in Seventh European Conference onSoftware Maintenance and Reengineering, 2003. Proceedings (2003)
Get full text
Conference Proceeding
The CORAS tool for security risk analysis
VRAALSEN, Fredrik, DEN BRABER, Folker, LUND, Mass Soldal, STØLEN, Ketil
Published in Lecture notes in computer science (2005)
Published in Lecture notes in computer science (2005)
Get full text
Conference Proceeding
Experiences from Using the CORAS Methodology to Analyze a Web Application
den Braber, Folker, Bjørn Mildal, Arne, Nes, Jone, Stølen, Ketil, Vraalsen, Fredrik
Published in Journal of cases on information technology (01.07.2005)
Published in Journal of cases on information technology (01.07.2005)
Get full text
Journal Article