The Internet today provides the environment for novel applications and processes which may evolve way beyond pre-planned scope and purpose. Security analysis is growing in complexity with the increase in functionality, connectivity, and dynamics of current electronic business processes. Technical processes within critical infrastructures also have to cope with these developments. To tackle the complexity of the security analysis, the application of models is becoming standard practice. However, model-based support for security analysis is not only needed in pre-operational phases but also during process execution, in order to provide situational security awareness at runtime. This cumulative thesis provides three major contributions to mode...
International audienceRemotely-communicating software-based systems are tightly present in modern in...
In this paper we take the first steps from security modelling to run-time security monitoring. Provi...
International audienceRemotely-communicating software-based systems are tightly present in modern in...
The Internet today provides the environment for novel applications and processes which may evolve w...
The Internet today provides the environment for novel applications and processes which may evolve w...
Enforcing security in process-aware information systems at runtime requires the monitoring of system...
International audienceThe Internet today provides the environment for novel applications and process...
International audienceThe Internet today provides the environment for novel applications and process...
International audienceFor many years, the introduction of connected systems and digital technology i...
International audienceFor many years, the introduction of connected systems and digital technology i...
International audienceFor many years, the introduction of connected systems and digital technology i...
International audienceFor many years, the introduction of connected systems and digital technology i...
The assessment and management of security depends upon the availability of relevant information. Unf...
International audienceIn the context of security, risk analyzes are widely recognized as essential. ...
International audienceRemotely-communicating software-based systems are tightly present in modern in...
International audienceRemotely-communicating software-based systems are tightly present in modern in...
In this paper we take the first steps from security modelling to run-time security monitoring. Provi...
International audienceRemotely-communicating software-based systems are tightly present in modern in...
The Internet today provides the environment for novel applications and processes which may evolve w...
The Internet today provides the environment for novel applications and processes which may evolve w...
Enforcing security in process-aware information systems at runtime requires the monitoring of system...
International audienceThe Internet today provides the environment for novel applications and process...
International audienceThe Internet today provides the environment for novel applications and process...
International audienceFor many years, the introduction of connected systems and digital technology i...
International audienceFor many years, the introduction of connected systems and digital technology i...
International audienceFor many years, the introduction of connected systems and digital technology i...
International audienceFor many years, the introduction of connected systems and digital technology i...
The assessment and management of security depends upon the availability of relevant information. Unf...
International audienceIn the context of security, risk analyzes are widely recognized as essential. ...
International audienceRemotely-communicating software-based systems are tightly present in modern in...
International audienceRemotely-communicating software-based systems are tightly present in modern in...
In this paper we take the first steps from security modelling to run-time security monitoring. Provi...
International audienceRemotely-communicating software-based systems are tightly present in modern in...