Per Håkon Meland
Per Håkon Meland
SINTEF and NTNU
Verified email at sintef.no
Title
Cited by
Cited by
Year
Security requirements for the rest of us: A survey
IA Tøndel, MG Jaatun, PH Meland
Software, IEEE 25 (1), 20-27, 2008
1602008
Security SLAs for Federated Cloud Services
K Bernsmed, MG Jaatun, PH Meland, A Undheim
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
1112011
Attribute Decoration of Attack–Defense Trees
A Bagnato, B Kordy, PH Meland, P Schweitzer
International Journal of Secure Software Engineering (IJSSE) 3 (2), 1-35, 2012
692012
Secure software design in practice
PH Meland, J Jensen
Availability, Reliability and Security, 2008. ARES 08. Third International …, 2008
392008
Evacuation support system for improved medical documentation and information flow in the field
S Walderhaug, PH Meland, M Mikalsen, T Sagen, JI Brevik
International journal of medical informatics 77 (2), 137-151, 2008
392008
SeaMonster: Providing tool support for security modeling
PH Meland, DG Spampinato, E Hagen, ET Baadshaug, KM Krister, ...
Norsk informasjonssikkerhetskonferanse, NISK, 2008
342008
Mitigating Risk with Cyberinsurance
PH Meland, IA Tondel, B Solhaug
IEEE Security & Privacy, 38-43, 2015
312015
Reusable Security Requirements for Healthcare Applications
J Jensen, IA Tondel, MG Jaatun, PH Meland, H Andresen
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
292009
SINTEF ICT, Oslo, Norway
K Bernsmed, MG Jaatun, PH Meland, A Undheim
Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th …, 2012
26*2012
Thunder in the Clouds: Security challenges and solutions for federated Clouds
A Undheim, PH Meland, K Bernsmed, MG Jaatun
Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing …, 2012
26*2012
How can the developer benefit from security modeling?
S Ardi, D Byers, PH Meland, IA Tøndel, N Shahmehri
Availability, Reliability and Security, 2007. ARES 2007. The Second …, 2007
252007
Security Requirements Engineering for Secure Business Processes
E Paja, P Giorgini, S Paul, PH Meland
Workshops on Business Informatics Research, 77-89, 2012
242012
Security requirements engineering for secure business processes
E Paja, P Giorgini, S Paul, PH Meland
Workshops on Business Informatics Research, 77-89, 2012
242012
An architectural foundation for security model sharing and reuse
PH Meland, S Ardi, J Jensen, E Rios, T Sanchez, N Shahmehri, IA Tondel
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
242009
Access control and integration of health care systems: An experience report and future challenges
L Rostad, O Nytro, IA Tondel, PH Meland
Availability, Reliability and Security, 2007. ARES 2007. The Second …, 2007
222007
Idea: Reusability of Threat Models–Two Approaches with an Experimental Evaluation
P Meland, I Tøndel, J Jensen
Engineering Secure Software and Systems, 114-122, 2010
192010
Threat Analysis in Goal-Oriented Security Requirements Modelling
PH Meland, E Paja, EA Gjære, S Paul, F Dalpiaz, P Giorgini
International Journal of Secure Software Engineering (IJSSE) 5 (2), 1-19, 2014
17*2014
Security testing in agile web application development-a case study using the east methodology
G Erdogan, PH Meland, D Mathieson
Agile Processes in Software Engineering and Extreme Programming, 14-27, 2010
172010
Expressing cloud security requirements for SLAs in deontic contract languages for cloud brokers
PH Meland, K Bernsmed, MG Jaatun, HN Castejón, A Undheim
International Journal of Cloud Computing 2 3 (1), 69-93, 2014
162014
Representing Threats in BPMN 2.0
PH Meland, EA Gjære
Availability, Reliability and Security (ARES), 2012 Seventh International …, 2012
152012
The system can't perform the operation now. Try again later.
Articles 1–20