Follow
Bjørnar Solhaug
Bjørnar Solhaug
SINTEF ICT
Verified email at forskningsradet.no
Title
Cited by
Cited by
Year
Model-driven risk analysis: the CORAS approach
MS Lund, B Solhaug, K Stølen
Springer Science & Business Media, 2010
5832010
Cyber-risk management
A Refsdal, B Solhaug, K Stølen, A Refsdal, B Solhaug, K Stølen
Cyber-risk management, 33-47, 2015
1552015
Why trust is not proportional to risk
B Solhaug, D Elgesem, K Stolen
The Second International Conference on Availability, Reliability and …, 2007
862007
Evolution in relation to risk and trust management
MS Lund, B Solhaug, K Stølen
Computer 43 (05), 49-55, 2010
642010
Mitigating risk with cyberinsurance
PH Meland, IA Tondel, B Solhaug
IEEE Security & Privacy 13 (6), 38-43, 2015
612015
Risk analysis of changing and evolving systems using CORAS
MS Lund, B Solhaug, K Stølen
Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures 11 …, 2011
572011
ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system
K Beckers, M Heisel, B Solhaug, K Stølen
Engineering Secure Future Internet Services and Systems: Current Research …, 2014
432014
A guided tour of the CORAS method
MS Lund, B Solhaug, K Stølen, MS Lund, B Solhaug, K Stølen
Model-driven risk analysis: The CORAS approach, 23-43, 2011
362011
The CORAS model-based method for security risk analysis
F Den Braber, G Brændeland, HEI Dahl, I Engan, I Hogganvik, MS Lund, ...
SINTEF, Oslo 12, 15-32, 2006
352006
The CORAS Language–Why it is Designed the Way it is
B Solhaug, K Stølen
Safety, Reliability, Risk and Life-Cycle Performance of Structures and …, 2013
292013
Evolution of security engineering artifacts: a state of the art survey
M Felderer, B Katt, P Kalb, J Jürjens, M Ochoa, F Paci, TT Tun, K Yskout, ...
International Journal of Secure Software Engineering (IJSSE) 5 (4), 48-98, 2014
242014
Model-driven risk analysis of evolving critical infrastructures
B Solhaug, F Seehusen
Journal of Ambient Intelligence and Humanized Computing 5, 187-204, 2014
232014
Using cyber-insurance as a risk management strategy: Knowledge gaps and recommendations for further research
IA Tøndel, PH Meland, A Omerovic, EA Gjære, B Solhaug
192015
Specifying Policies Using UML Sequence Diagrams--An Evaluation Based on a Case Study
B Solhaug, D Elgesem, K Stolen
Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007
192007
Semantics for multi-agent only knowing
A Waaler, B Solhaug
Proceedings of the 10th conference on Theoretical aspects of rationality and …, 2005
192005
A UML-based method for the development of policies to support trust management
A Refsdal, B Solhaug, K Stølen
IFIP International Conference on Trust Management, 33-49, 2008
172008
Uncertainty, subjectivity, trust and risk: How it all fits together
B Solhaug, K Stølen
Security and Trust Management: 7th International Workshop, STM 2011 …, 2012
152012
Adherence preserving refinement of trace-set properties in STAIRS: exemplified for information flow properties and policies
F Seehusen, B Solhaug, K Stølen
Software & Systems Modeling 8, 45-65, 2009
152009
Security risk analysis of system changes exemplified within the oil and gas domain
A Refsdal, B Solhaug, K Stølen
International Journal on Software Tools for Technology Transfer 17, 251-266, 2015
132015
Compositional refinement of policies in UML–Exemplified for access control
B Solhaug, K Stølen
Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008
112008
The system can't perform the operation now. Try again later.
Articles 1–20