Andreas L Opdahl
Sitert av
Sitert av
Eliciting security requirements with misuse cases
G Sindre, AL Opdahl
Requirements engineering 10 (1), 34-44, 2005
Ontological evaluation of the UML using the Bunge–Wand–Weber model
AL Opdahl, B Henderson-Sellers
Software and systems modeling 1 (1), 43-67, 2002
Templates for misuse case description
G Sindre, AL Opdahl
Proceedings of the 7th International Workshop on Requirements Engineering …, 2001
Experimental comparison of attack trees and misuse cases for security threat identification
AL Opdahl, G Sindre
Information and Software Technology 51 (5), 916-932, 2009
Capturing security requirements through misuse cases
G Sindre, AL Opdahl
NIK 2001, Norsk Informatikkonferanse 2001, http://www. nik. no/2001, 2001
A reuse-based approach to determining security requirements
G Sindre, DG Firesmith, AL Opdahl
REFSQ 3, 127-136, 2003
Research areas and challenges for mobile information systems
J Krogstie, K Lyytinen, AL Opdahl, B Pernici, K Siau, K Smolander
International Journal of Mobile Communications 2 (3), 220-234, 2004
Ontological analysis of whole–part relationships in OO-models
AL Opdahl, B Henderson-Sellers, F Barbier
Information and Software Technology 43 (6), 387-399, 2001
Comparing risk identification techniques for safety and security requirements
C Raspotnig, A Opdahl
Journal of Systems and Software 86 (4), 1124-1151, 2013
Grounding the OML metamodel in ontology
AL Opdahl, B Henderson-Sellers
Journal of Systems and Software 57 (2), 119-143, 2001
The unified enterprise modelling language—overview and further work
V Anaya, G Berio, M Harzallah, P Heymans, R Matulevičius, AL Opdahl, ...
Computers in Industry 61 (2), 99-111, 2010
From expert discipline to common practice: a vision and research agenda for extending the reach of enterprise modeling
K Sandkuhl, HG Fill, S Hoppenbrouwers, J Krogstie, F Matthes, A Opdahl, ...
Business & Information Systems Engineering 60 (1), 69-80, 2018
A template for defining enterprise modelling constructs
AL Opdahl, B Henderson-Sellers
Journal of Database Management (JDM) 15 (2), 39-73, 2004
Conceptual modelling in information systems engineering
AL Opdahl
Springer, 2007
Understanding the determinants of business process modelling in organisations
TR Eikebrokk, J Iden, DH Olsen, AL Opdahl
Business Process Management Journal, 2011
Generalization/specialization as a structuring mechanism for misuse cases
G Sindre, AL Opdahl, GF Brevik
Proceedings of the 2nd symposium on requirements engineering for information …, 2002
An ontology for enterprise and information systems modelling
AL Opdahl, G Berio, M Harzallah, R Matulevičius
Applied Ontology 7 (1), 49-92, 2012
Mobile information systems–research challenges on the conceptual and logical level
J Krogstie, K Lyytinen, A Opdahl, B Pernici, K Siau, K Smolander
International Conference on Conceptual Modeling, 124-135, 2002
Visualizing cyber attacks with misuse case maps
P Karpati, G Sindre, AL Opdahl
International Working Conference on Requirements Engineering: Foundation for …, 2010
Evaluating and improving OO modelling languages using the BWW-model
A Opdahl, B Henderson-Sellers
Proceedings of the Information Systems Foundations Workshop (Ontology …, 1999
Systemet kan ikke utføre handlingen. Prøv igjen senere.
Artikler 1–20