default search action
Bjørnar Solhaug
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [b2]Atle Refsdal, Bjørnar Solhaug, Ketil Stølen:
Cyber-Risk Management. Springer Briefs in Computer Science, Springer 2015, ISBN 978-3-319-23569-1, pp. 1-131 - [j8]Per Håkon Meland, Inger Anne Tøndel, Bjørnar Solhaug:
Mitigating Risk with Cyberinsurance. IEEE Secur. Priv. 13(6): 38-43 (2015) - [j7]Atle Refsdal, Bjørnar Solhaug, Ketil Stølen:
Security risk analysis of system changes exemplified within the oil and gas domain. Int. J. Softw. Tools Technol. Transf. 17(3): 251-266 (2015) - 2014
- [j6]Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
Evolution of Security Engineering Artifacts: A State of the Art Survey. Int. J. Secur. Softw. Eng. 5(4): 48-98 (2014) - [j5]Bjørnar Solhaug, Fredrik Seehusen:
Model-driven risk analysis of evolving critical infrastructures. J. Ambient Intell. Humaniz. Comput. 5(2): 187-204 (2014) - [c15]Fabio Massacci, Federica Paci, Bjørnar Solhaug, Alessandra Tedeschi:
EMFASE - An Empirical Framework for Security Design and Economic Trade-off. ARES 2014: 537-543 - [p2]Kristian Beckers, Maritta Heisel, Bjørnar Solhaug, Ketil Stølen:
ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System. Engineering Secure Future Internet Services and Systems 2014: 315-344 - [p1]Atle Refsdal, Øyvind Rideng, Bjørnar Solhaug, Ketil Stølen:
Divide and Conquer - Towards a Notion of Risk Model Encapsulation. Engineering Secure Future Internet Services and Systems 2014: 345-365 - 2013
- [c14]Franco Bergomi, Stéphane Paul, Bjørnar Solhaug, Raphaël Vignon-Davillier:
Beyond Traceability: Compared Approaches to Consistent Security Risk Assessments. ARES 2013: 814-820 - [c13]Le Minh Sang Tran, Bjørnar Solhaug, Ketil Stølen:
An Approach to Select Cost-Effective Risk Countermeasures. DBSec 2013: 266-273 - [c12]Aida Omerovic, Anders Kofod-Petersen, Bjørnar Solhaug, Ingrid Svagård:
Elicitation of Quality Characteristics for AAL Systems and Services. ISAmI 2013: 95-104 - [i1]Le Minh Sang Tran, Bjørnar Solhaug, Ketil Stølen:
An Approach to Select Cost-Effective Risk Countermeasures Exemplified in CORAS. CoRR abs/1302.4689 (2013) - 2012
- [j4]Aida Omerovic, Bjørnar Solhaug, Ketil Stølen:
Assessing practical usefulness and performance of the PREDIQT method: An industrial case study. Inf. Softw. Technol. 54(12): 1377-1395 (2012) - [c11]Fredrik Seehusen, Bjørnar Solhaug:
Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures. CD-ARES 2012: 562-577 - 2011
- [b1]Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen:
Model-Driven Risk Analysis - The CORAS Approach. Springer 2011, ISBN 978-3-642-12322-1, pp. I-XVI, 1-460 - [j3]Bjørnar Solhaug, Ketil Stølen:
Preservation of Policy Adherence under Refinement. Int. J. Softw. Informatics 5(1-2): 139-157 (2011) - [c10]Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen:
Risk Analysis of Changing and Evolving Systems Using CORAS. FOSAD 2011: 231-274 - [c9]Massimo Felici, Valentino Meduri, Bjørnar Solhaug, Alessandra Tedeschi:
Evolutionary Risk Analysis: Expert Judgement. SAFECOMP 2011: 99-112 - [c8]Fabio Massacci, Fabrice Bouquet, Elizabeta Fourneret, Jan Jürjens, Mass Soldal Lund, Sébastien Madelénat, Jan Tobias Mühlberg, Federica Paci, Stéphane Paul, Frank Piessens, Bjørnar Solhaug, Sven Wenzel:
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper). ServiceWave 2011: 134-143 - [c7]Aida Omerovic, Bjørnar Solhaug, Ketil Stølen:
Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study. SSIRI 2011: 137-146 - [c6]Bjørnar Solhaug, Ketil Stølen:
Uncertainty, Subjectivity, Trust and Risk: How It All Fits together. STM 2011: 1-5 - 2010
- [j2]Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen:
Evolution in Relation to Risk and Trust Management. Computer 43(5): 49-55 (2010)
2000 – 2009
- 2009
- [j1]Fredrik Seehusen, Bjørnar Solhaug, Ketil Stølen:
Adherence preserving refinement of trace-set properties in STAIRS: exemplified for information flow properties and policies. Softw. Syst. Model. 8(1): 45-65 (2009) - 2008
- [c5]Bjørnar Solhaug, Ketil Stølen:
Compositional Refinement of Policies in UML - Exemplified for Access Control. ESORICS 2008: 300-316 - [c4]Atle Refsdal, Bjørnar Solhaug, Ketil Stølen:
A UML-based Method for the Development of Policies to Support Trust Management. IFIPTM 2008: 33-49 - 2007
- [c3]Bjørnar Solhaug, Dag Elgesem, Ketil Stølen:
Specifying Policies Using UML Sequence Diagrams - An Evaluation Based on a Case Study. POLICY 2007: 19-28 - 2005
- [c2]Bjørnar Solhaug, Arild Waaler:
Logical Spaces in Multi-agent Only Knowing Systems. CLIMA 2005: 77-95 - [c1]Arild Waaler, Bjørnar Solhaug:
Semantics for multi-agent only knowing: extended abstract. TARK 2005: 109-125
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint