BibTeX records: Per Håkon Meland

download as .bib file

@inproceedings{DBLP:conf/esem/LiMNST23,
  author       = {Jingyue Li and
                  Per H{\aa}kon Meland and
                  Jakob Svennevik Notland and
                  Andr{\'{e}} Storhaug and
                  Jostein Hjortland Tysse},
  title        = {Evaluating the Impact of ChatGPT on Exercises of a Software Security
                  Course},
  booktitle    = {{ACM/IEEE} International Symposium on Empirical Software Engineering
                  and Measurement, {ESEM} 2023, New Orleans, LA, USA, October 26-27,
                  2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ESEM56168.2023.10304857},
  doi          = {10.1109/ESEM56168.2023.10304857},
  timestamp    = {Fri, 17 Nov 2023 08:57:22 +0100},
  biburl       = {https://dblp.org/rec/conf/esem/LiMNST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-10085,
  author       = {Jingyue Li and
                  Per H{\aa}kon Meland and
                  Jakob Svennevik Notland and
                  Andr{\'{e}} Storhaug and
                  Jostein Hjortland Tysse},
  title        = {Evaluating the Impact of ChatGPT on Exercises of a Software Security
                  Course},
  journal      = {CoRR},
  volume       = {abs/2309.10085},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.10085},
  doi          = {10.48550/ARXIV.2309.10085},
  eprinttype    = {arXiv},
  eprint       = {2309.10085},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-10085.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MelandNBS22,
  author       = {Per H{\aa}kon Meland and
                  Dag Atle Nesheim and
                  Karin Bernsmed and
                  Guttorm Sindre},
  title        = {Assessing cyber threats for storyless systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {64},
  pages        = {103050},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103050},
  doi          = {10.1016/J.JISA.2021.103050},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MelandNBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3/GrigoriadisPKDD21,
  author       = {Christos Grigoriadis and
                  Spyridon Papastergiou and
                  Panayiotis Kotzanikolaou and
                  Christos Douligeris and
                  Antreas Dionysiou and
                  Elias Athanasopoulos and
                  Karin Bernsmed and
                  Per H{\aa}kon Meland and
                  Liina Kamm},
  title        = {Integrating and Validating Maritime Transport Security Services: Initial
                  results from the {CS4EU} demonstrator},
  booktitle    = {{IC3} 2021: Thirteenth International Conference on Contemporary Computing,
                  Noida, India, August 5 - 7, 2021},
  pages        = {371--377},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474124.3474213},
  doi          = {10.1145/3474124.3474213},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic3/GrigoriadisPKDD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MelandBS20,
  author       = {Per H{\aa}kon Meland and
                  Yara Fareed Fahmy Bayoumy and
                  Guttorm Sindre},
  title        = {The Ransomware-as-a-Service economy within the darknet},
  journal      = {Comput. Secur.},
  volume       = {92},
  pages        = {101762},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101762},
  doi          = {10.1016/J.COSE.2020.101762},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MelandBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gramsec/HagaMS20,
  author       = {Kristian Haga and
                  Per H{\aa}kon Meland and
                  Guttorm Sindre},
  editor       = {Harley Eades III and
                  Olga Gadyatskaya},
  title        = {Breaking the Cyber Kill Chain by Modelling Resource Costs},
  booktitle    = {Graphical Models for Security - 7th International Workshop, GraMSec
                  2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12419},
  pages        = {111--126},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62230-5\_6},
  doi          = {10.1007/978-3-030-62230-5\_6},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gramsec/HagaMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/BourBBM20,
  author       = {Guillaume Bour and
                  Karin Bernsmed and
                  Ravishankar Borgaonkar and
                  Per H{\aa}kon Meland},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {On the Certificate Revocation Problem in the Maritime Sector},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {142--157},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_9},
  doi          = {10.1007/978-3-030-70852-8\_9},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/BourBBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MelandBFLS19,
  author       = {Per H{\aa}kon Meland and
                  Karin Bernsmed and
                  Christian Fr{\o}ystad and
                  Jingyue Li and
                  Guttorm Sindre},
  title        = {An experimental evaluation of bow-tie analysis for security},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-11-2018-0132},
  doi          = {10.1108/ICS-11-2018-0132},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MelandBFLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/FrankeM19,
  author       = {Ulrik Franke and
                  Per H{\aa}kon Meland},
  title        = {Demand side expectations of cyber insurance},
  booktitle    = {International Conference on Cyber Situational Awareness, Data Analytics
                  And Assessment, Cyber {SA} 2019, Oxford, United Kingdom, June 3-4,
                  2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CyberSA.2019.8899685},
  doi          = {10.1109/CYBERSA.2019.8899685},
  timestamp    = {Mon, 25 Nov 2019 12:51:24 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/FrankeM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MelandJS19,
  author       = {Per H{\aa}kon Meland and
                  Bent Heier Johansen and
                  Guttorm Sindre},
  editor       = {Aslan Askarov and
                  Ren{\'{e}} Rydhof Hansen and
                  Willard Rafnsson},
  title        = {An Experimental Analysis of Cryptojacking Attacks},
  booktitle    = {Secure {IT} Systems - 24th Nordic Conference, NordSec 2019, Aalborg,
                  Denmark, November 18-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11875},
  pages        = {155--170},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35055-0\_10},
  doi          = {10.1007/978-3-030-35055-0\_10},
  timestamp    = {Tue, 21 Mar 2023 20:59:10 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/MelandJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcysa/MelandS18,
  author       = {Per H{\aa}kon Meland and
                  Fredrik Seehusen},
  title        = {When to Treat Security Risks with Cyber Insurance},
  journal      = {Int. J. Cyber Situational Aware.},
  volume       = {3},
  number       = {1},
  pages        = {39--60},
  year         = {2018},
  url          = {https://doi.org/10.22619/ijcsa.2018.100119},
  doi          = {10.22619/IJCSA.2018.100119},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcysa/MelandS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/BayoumyMS18,
  author       = {Yara Fareed Fahmy Bayoumy and
                  Per H{\aa}kon Meland and
                  Guttorm Sindre},
  title        = {A Netnographic Study on the Dark Net Ecosystem for Ransomware},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551424},
  doi          = {10.1109/CYBERSA.2018.8551424},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/BayoumyMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/MelandS18,
  author       = {Per H{\aa}kon Meland and
                  Fredrik Seehusen},
  title        = {When to Treat Security Risks with Cyber Insurance},
  booktitle    = {International Conference On Cyber Situational Awareness, Data Analytics
                  And Assessment, CyberSA 2018, Glasgow, Scotland, UK, June 11-12, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CyberSA.2018.8551456},
  doi          = {10.1109/CYBERSA.2018.8551456},
  timestamp    = {Thu, 06 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/MelandS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MelandBFLS18,
  author       = {Per H{\aa}kon Meland and
                  Karin Bernsmed and
                  Christian Fr{\o}ystad and
                  Jingyue Li and
                  Guttorm Sindre},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  John Mylopoulos and
                  Christos Kalloniatis},
  title        = {An Experimental Evaluation of Bow-Tie Analysis for Cybersecurity Requirements},
  booktitle    = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS
                  2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11387},
  pages        = {173--191},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12786-2\_11},
  doi          = {10.1007/978-3-030-12786-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MelandBFLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FroystadBM17,
  author       = {Christian Fr{\o}ystad and
                  Karin Bernsmed and
                  Per H{\aa}kon Meland},
  title        = {Protecting Future Maritime Communication},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {97:1--97:10},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3103169},
  doi          = {10.1145/3098954.3103169},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FroystadBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BernsmedFMNR17,
  author       = {Karin Bernsmed and
                  Christian Fr{\o}ystad and
                  Per H{\aa}kon Meland and
                  Dag Atle Nesheim and
                  {\O}rnulf Jan R{\o}dseth},
  editor       = {Peng Liu and
                  Sjouke Mauw and
                  Ketil St{\o}len},
  title        = {Visualizing Cyber Security Risks with Bow-Tie Diagrams},
  booktitle    = {Graphical Models for Security - 4th International Workshop, GraMSec
                  2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10744},
  pages        = {38--56},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-74860-3\_3},
  doi          = {10.1007/978-3-319-74860-3\_3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BernsmedFMNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MelandTMS17,
  author       = {Per H{\aa}kon Meland and
                  Inger Anne T{\o}ndel and
                  Marie Elisabeth Gaup Moe and
                  Fredrik Seehusen},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Facing Uncertainty in Cyber Insurance Policies},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {89--100},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_6},
  doi          = {10.1007/978-3-319-68063-7\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MelandTMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MelandTS15,
  author       = {Per H{\aa}kon Meland and
                  Inger Anne T{\o}ndel and
                  Bj{\o}rnar Solhaug},
  title        = {Mitigating Risk with Cyberinsurance},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {6},
  pages        = {38--43},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.137},
  doi          = {10.1109/MSP.2015.137},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MelandTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/MohammadiBPMWP15,
  author       = {Nazila Gol Mohammadi and
                  Torsten Bandyszak and
                  Sachar Paulus and
                  Per H{\aa}kon Meland and
                  Thorsten Weyer and
                  Klaus Pohl},
  editor       = {Janis Grabis and
                  Kurt Sandkuhl},
  title        = {Extending Software Development Methodologies to Support Trustworthiness-by-Design},
  booktitle    = {Proceedings of the CAiSE 2015 Forum at the 27th International Conference
                  on Advanced Information Systems Engineering co-located with 27th International
                  Conference on Advanced Information Systems Engineering (CAiSE 2015),
                  Stockholm, Sweden, June 10th, 2015},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1367},
  pages        = {213--220},
  publisher    = {CEUR-WS.org},
  year         = {2015},
  url          = {https://ceur-ws.org/Vol-1367/paper-28.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:34 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/MohammadiBPMWP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcc/MelandBJCU14,
  author       = {Per H{\aa}kon Meland and
                  Karin Bernsmed and
                  Martin Gilje Jaatun and
                  Humberto Nicol{\'{a}}s Castej{\'{o}}n Mart{\'{\i}}nez and
                  Astrid Undheim},
  title        = {Expressing cloud security requirements for SLAs in deontic contract
                  languages for cloud brokers},
  journal      = {Int. J. Cloud Comput.},
  volume       = {3},
  number       = {1},
  pages        = {69--93},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJCC.2014.058831},
  doi          = {10.1504/IJCC.2014.058831},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcc/MelandBJCU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MelandPGPDG14,
  author       = {Per H{\aa}kon Meland and
                  Elda Paja and
                  Erlend Andreas Gj{\ae}re and
                  St{\'{e}}phane Paul and
                  Fabiano Dalpiaz and
                  Paolo Giorgini},
  title        = {Threat Analysis in Goal-Oriented Security Requirements Modelling},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {2},
  pages        = {1--19},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014040101},
  doi          = {10.4018/IJSSE.2014040101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/MelandPGPDG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/MohammadiBPMWP14,
  author       = {Nazila Gol Mohammadi and
                  Torsten Bandyszak and
                  Sachar Paulus and
                  Per H{\aa}kon Meland and
                  Thorsten Weyer and
                  Klaus Pohl},
  editor       = {Thorsten Holz and
                  Sotiris Ioannidis},
  title        = {Extending Development Methodologies with Trustworthiness-By-Design
                  for Socio-Technical Systems - (Extended Abstract)},
  booktitle    = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
                  2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8564},
  pages        = {206--207},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08593-7\_14},
  doi          = {10.1007/978-3-319-08593-7\_14},
  timestamp    = {Wed, 25 Sep 2019 18:21:56 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/MohammadiBPMWP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/GjaereM14,
  author       = {Erlend Andreas Gj{\ae}re and
                  Per H{\aa}kon Meland},
  editor       = {Barbara Kordy and
                  Sjouke Mauw and
                  Wolter Pieters},
  title        = {Threats Management Throughout the Software Service Life-Cycle},
  booktitle    = {Proceedings First International Workshop on Graphical Models for Security,
                  GraMSec 2014, Grenoble, France, April 12, 2014},
  series       = {{EPTCS}},
  volume       = {148},
  pages        = {1--14},
  year         = {2014},
  url          = {https://doi.org/10.4204/EPTCS.148.1},
  doi          = {10.4204/EPTCS.148.1},
  timestamp    = {Thu, 23 Sep 2021 11:46:10 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GjaereM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/Meland14,
  author       = {Per H{\aa}kon Meland},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {Composite Services with Dynamic Behaviour},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_1},
  doi          = {10.1007/978-3-319-13518-2\_1},
  timestamp    = {Sun, 02 Oct 2022 16:18:07 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/Meland14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/MelandAADFGGLR14,
  author       = {Per H{\aa}kon Meland and
                  Muhammad Asim and
                  Dhouha Ayed and
                  Fabiano Dalpiaz and
                  Edith Felix and
                  Paolo Giorgini and
                  Susana Gonz{\'{a}}les and
                  Brett Lempereur and
                  John Ronan},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {Security and Trustworthiness Threats to Composite Services: Taxonomy,
                  Countermeasures, and Research Directions},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {10--35},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_2},
  doi          = {10.1007/978-3-319-13518-2\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/MelandAADFGGLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/MelandRTB14,
  author       = {Per H{\aa}kon Meland and
                  Erkuden Rios and
                  Vasilis Tountopoulos and
                  Achim D. Brucker},
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {The Aniketos Platform},
  booktitle    = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  pages        = {50--62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2\_4},
  doi          = {10.1007/978-3-319-13518-2\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/MelandRTB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/8900,
  editor       = {Achim D. Brucker and
                  Fabiano Dalpiaz and
                  Paolo Giorgini and
                  Per H{\aa}kon Meland and
                  Erkuden Rios},
  title        = {Secure and Trustworthy Service Composition - The Aniketos Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {8900},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13518-2},
  doi          = {10.1007/978-3-319-13518-2},
  isbn         = {978-3-319-13517-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/8900.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MelandG13,
  author       = {Per H{\aa}kon Meland and
                  Erlend Andreas Gj{\ae}re},
  title        = {Threat Representation Methods for Composite Service Process Models},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {2},
  pages        = {1--18},
  year         = {2013},
  url          = {https://doi.org/10.4018/jsse.2013040101},
  doi          = {10.4018/JSSE.2013040101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/MelandG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MelandGP13,
  author       = {Per H{\aa}kon Meland and
                  Erlend Andreas Gj{\ae}re and
                  St{\'{e}}phane Paul},
  title        = {The Use and Usefulness of Threats in Goal-Oriented Modelling},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {428--436},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.57},
  doi          = {10.1109/ARES.2013.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MelandGP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BernsmedUMJ13,
  author       = {Karin Bernsmed and
                  Astrid Undheim and
                  Per H{\aa}kon Meland and
                  Martin Gilje Jaatun},
  title        = {Towards an Ontology for Cloud Security Obligations},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {577--581},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.76},
  doi          = {10.1109/ARES.2013.76},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BernsmedUMJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/FrtunicJGDJMBC13,
  author       = {Milena Frtunic and
                  Filip Jovanovic and
                  Mladen Gligorijvic and
                  Lazar Dordevic and
                  Srecko Janicijevic and
                  Per H{\aa}kon Meland and
                  Karin Bernsmed and
                  Humberto Nicol{\'{a}}s Castej{\'{o}}n Mart{\'{\i}}nez},
  editor       = {Fr{\'{e}}d{\'{e}}ric Desprez and
                  Donald Ferguson and
                  Ethan Hadar and
                  Frank Leymann and
                  Matthias Jarke and
                  Markus Helfert},
  title        = {CloudSurfer - {A} Cloud Broker Application for Security Concerns},
  booktitle    = {{CLOSER} 2013 - Proceedings of the 3rd International Conference on
                  Cloud Computing and Services Science, Aachen, Germany, 8-10 May, 2013},
  pages        = {199--206},
  publisher    = {SciTePress},
  year         = {2013},
  timestamp    = {Fri, 31 Mar 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/FrtunicJGDJMBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/BagnatoKMS12,
  author       = {Alessandra Bagnato and
                  Barbara Kordy and
                  Per H{\aa}kon Meland and
                  Patrick Schweitzer},
  title        = {Attribute Decoration of Attack-Defense Trees},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {3},
  number       = {2},
  pages        = {1--35},
  year         = {2012},
  url          = {https://doi.org/10.4018/jsse.2012040101},
  doi          = {10.4018/JSSE.2012040101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/BagnatoKMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MelandG12,
  author       = {Per H{\aa}kon Meland and
                  Erlend Andreas Gj{\ae}re},
  title        = {Representing Threats in {BPMN} 2.0},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {542--550},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.13},
  doi          = {10.1109/ARES.2012.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MelandG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/MelandBJUC12,
  author       = {Per H{\aa}kon Meland and
                  Karin Bernsmed and
                  Martin Gilje Jaatun and
                  Astrid Undheim and
                  Humberto Nicol{\'{a}}s Castej{\'{o}}n Mart{\'{\i}}nez},
  editor       = {Frank Leymann and
                  Ivan I. Ivanov and
                  Marten van Sinderen and
                  Tony Shan},
  title        = {Expressing Cloud Security Requirements in Deontic Contract Languages},
  booktitle    = {{CLOSER} 2012 - Proceedings of the 2nd International Conference on
                  Cloud Computing and Services Science, Porto, Portugal, 18 - 21 April,
                  2012},
  pages        = {638--646},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Fri, 31 Mar 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/MelandBJUC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/BernsmedJMU12,
  author       = {Karin Bernsmed and
                  Martin Gilje Jaatun and
                  Per H{\aa}kon Meland and
                  Astrid Undheim},
  title        = {Thunder in the Clouds: Security challenges and solutions for federated
                  Clouds},
  booktitle    = {4th {IEEE} International Conference on Cloud Computing Technology
                  and Science Proceedings, CloudCom 2012, Taipei, Taiwan, December 3-6,
                  2012},
  pages        = {113--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CloudCom.2012.6427547},
  doi          = {10.1109/CLOUDCOM.2012.6427547},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/BernsmedJMU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/LeonSMED12,
  author       = {Miguel Ponce de Leon and
                  Richard Sanders and
                  Per H{\aa}kon Meland and
                  Marina Egea and
                  Zeta Dooly},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Sokratis K. Katsikas and
                  Gerald Quirchmayr},
  title        = {Aniketos: Challenges and Results},
  booktitle    = {Trust, Privacy and Security in Digital Business - 9th International
                  Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7449},
  pages        = {234--235},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32287-7\_28},
  doi          = {10.1007/978-3-642-32287-7\_28},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/LeonSMED12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BernsmedJMU11,
  author       = {Karin Bernsmed and
                  Martin Gilje Jaatun and
                  Per H{\aa}kon Meland and
                  Astrid Undheim},
  title        = {Security SLAs for Federated Cloud Services},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {202--209},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.34},
  doi          = {10.1109/ARES.2011.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BernsmedJMU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bir/PajaGPM11,
  author       = {Elda Paja and
                  Paolo Giorgini and
                  St{\'{e}}phane Paul and
                  Per H{\aa}kon Meland},
  editor       = {Laila Niedrite and
                  Renate Strazdina and
                  Benkt Wangler},
  title        = {Security Requirements Engineering for Secure Business Processes},
  booktitle    = {Workshops on Business Informatics Research - {BIR} 2011 International
                  Workshops and Doctoral Consortium, Riga, Latvia, October 6, 2011 Revised
                  Selected Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {106},
  pages        = {77--89},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29231-6\_7},
  doi          = {10.1007/978-3-642-29231-6\_7},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bir/PajaGPM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/Meland11,
  author       = {Per H{\aa}kon Meland},
  title        = {Service Injection: {A} Threat to Self-Managed Complex Systems},
  booktitle    = {{IEEE} Ninth International Conference on Dependable, Autonomic and
                  Secure Computing, {DASC} 2011, 12-14 December 2011, Sydney, Australia},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DASC.2011.25},
  doi          = {10.1109/DASC.2011.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/Meland11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sysose/MelandGL11,
  author       = {Per H{\aa}kon Meland and
                  Juan Bare{\~{n}}o Guerenabarrena and
                  David Llewellyn{-}Jones},
  title        = {The challenges of secure and trustworthy service composition in the
                  Future Internet},
  booktitle    = {6th International Conference on System of Systems Engineering, SoSE
                  2011, Albuquerque, New Mexico, USA, June 27-30, 2011},
  pages        = {329--334},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/SYSOSE.2011.5966619},
  doi          = {10.1109/SYSOSE.2011.5966619},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sysose/MelandGL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BaadshaugEM10,
  author       = {Egil Trygve Baadshaug and
                  Gencer Erdogan and
                  Per H{\aa}kon Meland},
  title        = {Security Modeling and Tool Support Advantages},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {537--542},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.11},
  doi          = {10.1109/ARES.2010.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BaadshaugEM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/MelandTJ10,
  author       = {Per H{\aa}kon Meland and
                  Inger Anne T{\o}ndel and
                  Jostein Jensen},
  editor       = {Fabio Massacci and
                  Dan S. Wallach and
                  Nicola Zannone},
  title        = {Idea: Reusability of Threat Models - Two Approaches with an Experimental
                  Evaluation},
  booktitle    = {Engineering Secure Software and Systems, Second International Symposium,
                  ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5965},
  pages        = {114--122},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11747-3\_9},
  doi          = {10.1007/978-3-642-11747-3\_9},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/MelandTJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/JensenTM10,
  author       = {Jostein Jensen and
                  Inger Anne T{\o}ndel and
                  Per H{\aa}kon Meland},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Experimental Threat Model Reuse with Misuse Case Diagrams},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {355--366},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_25},
  doi          = {10.1007/978-3-642-17650-0\_25},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/JensenTM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/xpu/ErdoganMM10,
  author       = {Gencer Erdogan and
                  Per H{\aa}kon Meland and
                  Derek Mathieson},
  editor       = {Alberto Sillitti and
                  Angela Martin and
                  Xiaofeng Wang and
                  Elizabeth Whitworth},
  title        = {Security Testing in Agile Web Application Development - {A} Case Study
                  Using the {EAST} Methodology},
  booktitle    = {Agile Processes in Software Engineering and Extreme Programming, 11th
                  International Conference, {XP} 2010, Trondheim, Norway, June 1-4,
                  2010. Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {48},
  pages        = {14--27},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13054-0\_2},
  doi          = {10.1007/978-3-642-13054-0\_2},
  timestamp    = {Tue, 20 Feb 2018 11:22:27 +0100},
  biburl       = {https://dblp.org/rec/conf/xpu/ErdoganMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/JensenTJMA09,
  author       = {Jostein Jensen and
                  Inger Anne T{\o}ndel and
                  Martin Gilje Jaatun and
                  Per H{\aa}kon Meland and
                  Herbj{\o}rn Andresen},
  title        = {Reusable Security Requirements for Healthcare Applications},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {380--385},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.107},
  doi          = {10.1109/ARES.2009.107},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/JensenTJMA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MelandAJRSST09,
  author       = {Per H{\aa}kon Meland and
                  Shanai Ardi and
                  Jostein Jensen and
                  Erkuden Rios and
                  Txus Sanchez and
                  Nahid Shahmehri and
                  Inger Anne T{\o}ndel},
  title        = {An Architectural Foundation for Security Model Sharing and Reuse},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {823--828},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.110},
  doi          = {10.1109/ARES.2009.110},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MelandAJRSST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RostadTMO08,
  author       = {Lillian R{\o}stad and
                  Inger Anne T{\o}ndel and
                  Per H{\aa}kon Meland and
                  Gunnar Ren{\'{e}} {\O}ie},
  title        = {Learning by Failing (and Fixing)},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {4},
  pages        = {54--56},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.89},
  doi          = {10.1109/MSP.2008.89},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RostadTMO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/WalderhaugMMSB08,
  author       = {St{\aa}le Walderhaug and
                  Per H{\aa}kon Meland and
                  Marius Mikalsen and
                  Terje Sagen and
                  John Ivar Brevik},
  title        = {Evacuation support system for improved medical documentation and information
                  flow in the field},
  journal      = {Int. J. Medical Informatics},
  volume       = {77},
  number       = {2},
  pages        = {137--151},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ijmedinf.2007.01.006},
  doi          = {10.1016/J.IJMEDINF.2007.01.006},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmi/WalderhaugMMSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/TondelJM08,
  author       = {Inger Anne T{\o}ndel and
                  Martin Gilje Jaatun and
                  Per H{\aa}kon Meland},
  title        = {Security Requirements for the Rest of Us: {A} Survey},
  journal      = {{IEEE} Softw.},
  volume       = {25},
  number       = {1},
  pages        = {20--27},
  year         = {2008},
  url          = {https://doi.org/10.1109/MS.2008.19},
  doi          = {10.1109/MS.2008.19},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/TondelJM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MelandJ08,
  author       = {Per H{\aa}kon Meland and
                  Jostein Jensen},
  title        = {Secure Software Design in Practice},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {1164--1171},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.48},
  doi          = {10.1109/ARES.2008.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MelandJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ArdiBMTS07,
  author       = {Shanai Ardi and
                  David Byers and
                  Per H{\aa}kon Meland and
                  Inger Anne T{\o}ndel and
                  Nahid Shahmehri},
  title        = {How can the developer benefit from security modeling?},
  booktitle    = {Proceedings of the The Second International Conference on Availability,
                  Reliability and Security, {ARES} 2007, The International Dependability
                  Conference - Bridging Theory and Practice, April 10-13 2007, Vienna,
                  Austria},
  pages        = {1017--1025},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARES.2007.96},
  doi          = {10.1109/ARES.2007.96},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ArdiBMTS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medinfo/MikalsenWMW07,
  author       = {Marius Mikalsen and
                  St{\aa}le Walderhaug and
                  Per H{\aa}kon Meland and
                  Ole Martin Winnem},
  editor       = {Klaus A. Kuhn and
                  James R. Warren and
                  Tze{-}Yun Leong},
  title        = {Linkcare - Enabling Continuity of Care for the Chronically Ill across
                  Levels and Profession},
  booktitle    = {{MEDINFO} 2007 - Proceedings of the 12th World Congress on Health
                  (Medical) Informatics - Building Sustainable Health Systems, 20-24
                  August, 2007, Brisbane, Australia},
  series       = {Studies in Health Technology and Informatics},
  volume       = {129},
  pages        = {3--7},
  publisher    = {{IOS} Press},
  year         = {2007},
  url          = {https://doi.org/10.3233/978-1-58603-774-1-3},
  doi          = {10.3233/978-1-58603-774-1-3},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/medinfo/MikalsenWMW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics