


default search action
Maritta Heisel
Person information
- affiliation: University of Duisburg-Essen, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c178]Jens Leicht, Julien Lukasewycz, Maritta Heisel:
PriPoCoG: Empowering End-Users' Data Protection Decisions. ICEIS (2) 2025: 668-679 - [c177]Jens Leicht, Maritta Heisel:
Management of Customized Privacy Policies. ICISSP (2) 2025: 385-396 - 2024
- [j26]Nicolás E. Díaz Ferreyra, Melina C. Vidoni, Maritta Heisel, Riccardo Scandariato:
Cybersecurity discussions in Stack Overflow: a developer-centred analysis of engagement and self-disclosure behaviour. Soc. Netw. Anal. Min. 14(1): 16 (2024) - [c176]Jens Leicht, Maritta Heisel:
Extending PriPoCoG: A Privacy Policy Editor for GDPR-Compliant Privacy Policies. ENASE 2024: 307-318 - [c175]Julia Pampus
, Maritta Heisel:
An Empirical Examination of the Technical Aspects of Data Sovereignty. ICSOFT 2024: 112-122 - 2023
- [c174]Maritta Heisel, Marvin Wagner:
Pattern-Based Risk Identification for Model-Based Risk Management. Applicable Formal Methods for Safe Industrial Products 2023: 114-129 - [c173]Jens Leicht, Marvin Wagner, Maritta Heisel:
Creating Privacy Policies from Data-Flow Diagrams. ESORICS Workshops (1) 2023: 433-453 - [c172]Jens Leicht, Maritta Heisel:
P2BAC: Privacy Policy Based Access Control Using P-LPL. ICISSP 2023: 686-697 - [c171]Marvin Wagner, Maritta Heisel:
Model-Based Documentation of Architectures for Cloud-Based Systems. ICSOFT 2023: 332-344 - 2022
- [j25]Angela Borchert
, Maritta Heisel:
The Role of Trustworthiness Facets for Developing Social Media Applications: A Structured Literature Review. Inf. 13(1): 34 (2022) - [j24]Nicolás E. Díaz Ferreyra
, Tobias Hecking
, Esma Aïmeur, Maritta Heisel, Heinz Ulrich Hoppe
:
Community detection for access-control decisions: Analysing the role of homophily and information diffusion in Online Social Networks. Online Soc. Networks Media 29: 100203 (2022) - [c170]Nicolás E. Díaz Ferreyra
, Sina Ostendorf, Esma Aïmeur, Maritta Heisel, Matthias Brand:
ENAGRAM: An App to Evaluate Preventative Nudges for Instagram. EuroUSEC 2022: 53-63 - [c169]Angela Borchert
, Nicolás E. Díaz Ferreyra
, Maritta Heisel:
Meeting Strangers Online: Feature Models for Trustworthiness Assessment. HCSE 2022: 3-22 - [c168]Jens Leicht, Maritta Heisel
, Armin Gerl
:
PriPoCoG: Guiding Policy Authors to Define GDPR-Compliant Privacy Policies. TrustBus 2022: 1-16 - [i6]Nicolás E. Díaz Ferreyra, Melina C. Vidoni, Maritta Heisel, Riccardo Scandariato:
Cybersecurity Discussions in Stack Overflow: A Developer-Centred Analysis of Engagement and Self-Disclosure Behaviour. CoRR abs/2207.01529 (2022) - [i5]Nicolás E. Díaz Ferreyra, Sina Ostendorf, Esma Aïmeur, Maritta Heisel, Matthias Brand:
ENAGRAM: An App to Evaluate Preventative Nudges for Instagram. CoRR abs/2208.04649 (2022) - 2021
- [j23]Angela Borchert, Maritta Heisel:
Conflict Identification and Resolution for Trust-Related Requirements Elicitation A Goal Modeling Approach. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(1): 111-131 (2021) - [c167]Angela Borchert, Aidmar Wainakh, Nicole Krämer, Max Mühlhäuser, Maritta Heisel:
The Relevance of Privacy Concerns, Trust, and Risk for Hybrid Social Media. ENASE (Selected Papers) 2021: 88-111 - [c166]Lirijan Sabani, Roman Wirtz, Maritta Heisel:
P2P Frames: Pattern-based Characterization of Functional Requirements for Peer-to-peer Systems. ENASE 2021: 239-250 - [c165]Angela Borchert, Aidmar Wainakh, Nicole Krämer, Max Mühlhäuser, Maritta Heisel:
Mitigating Privacy Concerns by Developing Trust-related Software Features for a Hybrid Social Media Application. ENASE 2021: 269-280 - [c164]Maritta Heisel, Aida Omerovic:
Risk Identification Based on Architectural Patterns. QUATIC 2021: 341-355 - [i4]Nicolás E. Díaz Ferreyra
, Tobias Hecking, Esma Aïmeur, Maritta Heisel, Heinz Ulrich Hoppe:
Community Detection for Access-Control Decisions: Analysing the Role of Homophily and Information Diffusion in Online Social Networks. CoRR abs/2104.09137 (2021) - 2020
- [j22]Nicolás Emilio Díaz Ferreyra
, Tobias Kroll
, Esma Aïmeur, Stefan Stieglitz
, Maritta Heisel:
Preventative Nudges: Introducing Risk Cues for Supporting Online Self-Disclosure Decisions. Inf. 11(8): 399 (2020) - [j21]Nicolás E. Díaz Ferreyra
, Tobias Kroll
, Esma Aïmeur, Stefan Stieglitz, Maritta Heisel:
Correction: Díaz Ferreyra, N.E., et al. Preventative Nudges: Introducing Risk Cues for Supporting Online Self-Disclosure Decisions. Information 2020, 11, 399. Inf. 11(12): 555 (2020) - [c163]Angela Borchert
, Nicolás E. Díaz Ferreyra, Maritta Heisel:
Balancing trust and privacy in computer-mediated introduction: featuring risk as a determinant for trustworthiness requirements elicitation. ARES 2020: 84:1-84:10 - [c162]Roman Wirtz, Maritta Heisel:
Systematic Treatment of Security Risks during Requirements Engineering. ENASE 2020: 132-143 - [c161]Angela Borchert, Nicolás Emilio Díaz Ferreyra, Maritta Heisel:
A Conceptual Method for Eliciting Trust-related Software Features for Computer-mediated Introduction. ENASE 2020: 269-280 - [c160]Roman Wirtz, Maritta Heisel:
Risk Treatment: An Iterative Method for Identifying Controls. ENASE (Selected Papers) 2020: 283-310 - [c159]Nazila Gol Mohammadi, Jens Leicht, Ludger Goeke, Maritta Heisel:
Assisted Generation of Privacy Policies using Textual Patterns. ENASE 2020: 347-358 - [c158]Nicolás E. Díaz Ferreyra
, Patrick Tessier, Gabriel Pedroza
, Maritta Heisel:
PDP-ReqLite: A Lightweight Approach for the Elicitation of Privacy and Data Protection Requirements. DPM/CBT@ESORICS 2020: 161-177 - [c157]Nicolás E. Díaz Ferreyra
, Esma Aïmeur, Hicham Hage, Maritta Heisel, Catherine García van Hoogstraten:
Persuasion Meets AI: Ethical Considerations for the Design of Social Engineering Countermeasures. KMIS 2020: 204-211 - [c156]Nazila Gol Mohammadi, Ludger Goeke, Maritta Heisel, Mike Surridge:
Systematic Risk Assessment of Cloud Computing Systems using a Combined Model-based Approach. ICEIS (2) 2020: 53-66 - [c155]Roman Wirtz, Maritta Heisel:
Risk Identification: From Requirements to Threat Models. ICISSP 2020: 385-396 - [c154]Monika Maidl, Gerhard Münz, Stefan Seltzsam, Marvin Wagner, Roman Wirtz, Maritta Heisel:
Model-Based Threat Modeling for Cyber-Physical Systems: A Computer-Aided Approach. ICSOFT (Selected Papers) 2020: 158-183 - [c153]Monika Maidl, Gerhard Münz, Stefan Seltzsam, Marvin Wagner, Roman Wirtz, Maritta Heisel:
Threat Modeling for Cyber-Physical Systems: A Two-dimensional Taxonomy Approach for Structuring Attack Actions. ICSOFT 2020: 160-171 - [c152]Angela Borchert
, Nicolás Emilio Díaz Ferreyra
, Maritta Heisel:
Building Trustworthiness in Computer-Mediated Introduction: A Facet-Oriented Framework. SMSociety 2020: 39-46 - [i3]Nicolás E. Díaz Ferreyra, Rene Meis, Maritta Heisel:
Learning from Online Regrets: From Deleted Posts to Risk Awareness in Social Network Sites. CoRR abs/2008.09391 (2020) - [i2]Nicolás E. Díaz Ferreyra
, Esma Aïmeur, Hicham Hage, Maritta Heisel, Catherine García van Hoogstraten:
Persuasion Meets AI: Ethical Considerations for the Design of Social Engineering Countermeasures. CoRR abs/2009.12853 (2020)
2010 – 2019
- 2019
- [c151]Nazila Gol Mohammadi, Roman Wirtz, Maritta Heisel:
Systematic Asset Identification and Modeling During Requirements Engineering. CRiSIS 2019: 50-66 - [c150]Roman Wirtz, Maritta Heisel:
Model-Based Risk Analysis and Evaluation Using CORAS and CVSS. ENASE (Selected Papers) 2019: 108-134 - [c149]Roman Wirtz, Maritta Heisel:
CVSS-based Estimation and Prioritization for Security Risks. ENASE 2019: 297-306 - [c148]Jens Leicht, Maritta Heisel:
Architecture to Manage and Protect Personal Data Utilising Blockchain. ENASE 2019: 340-349 - [c147]Nazila Gol Mohammadi, Julia Pampus
, Maritta Heisel:
Pattern-based incorporation of privacy preferences into privacy policies: negotiating the conflicting needs of service providers and end-users. EuroPLoP 2019: 5:1-5:12 - [c146]Roman Wirtz, Maritta Heisel:
Managing security risks: template-based specification of controls. EuroPLoP 2019: 10:1-10:13 - [c145]Nazila Gol Mohammadi, Angela Borchert
, Julia Pampus
, Maritta Heisel:
A generic conceptual data model of social media services. EuroPLoP 2019: 22:1-22:12 - [c144]Monika Maidl, Roman Wirtz, Tiange Zhao, Maritta Heisel, Marvin Wagner:
Pattern-based modeling of cyber-physical systems for analyzing security. EuroPLoP 2019: 23:1-23:10 - [c143]Roman Wirtz, Maritta Heisel:
RE4DIST: Model-based Elicitation of Functional Requirements for Distributed Systems. ICSOFT 2019: 71-81 - [c142]Roman Wirtz, Maritta Heisel, Marvin Wagner:
Distributed Frames: Pattern-Based Characterization of Functional Requirements for Distributed Systems. ICSOFT (Selected Papers) 2019: 81-107 - [c141]Lucas Davi, Denis Hatebur, Maritta Heisel, Roman Wirtz:
Combining Safety and Security in Autonomous Cars Using Blockchain Technologies. SAFECOMP Workshops 2019: 223-234 - [c140]Nazila Gol Mohammadi, Jens Leicht, Nelufar Ulfat-Bunyadi, Maritta Heisel:
Privacy Policy Specification Framework for Addressing End-Users' Privacy Requirements. TrustBus 2019: 46-62 - [c139]Nicolás Emilio Díaz Ferreyra
, Rene Meis, Maritta Heisel:
Learning from Online Regrets: From Deleted Posts to Risk Awareness in Social Network Sites. UMAP (Adjunct Publication) 2019: 117-125 - [p5]Nelufar Ulfat-Bunyadi, Maritta Heisel:
Context Modelling for Variability-intensive Systems During Requirements Engineering. Software Engineering for Variability Intensive Systems 2019: 57-94 - 2018
- [j20]Ludger Goeke, Nazila Gol Mohammadi
, Maritta Heisel:
Context Analysis of Cloud Computing Systems Using a Pattern-Based Approach. Future Internet 10(8): 72 (2018) - [c138]Roman Wirtz, Maritta Heisel:
A Systematic Method to Describe and Identify Security Threats Based on Functional Requirements. CRiSIS 2018: 205-221 - [c137]Roman Wirtz, Maritta Heisel, Rene Meis, Aida Omerovic, Ketil Stølen:
Problem-based Elicitation of Security Requirements - The ProCOR Method. ENASE 2018: 26-38 - [c136]Roman Wirtz, Maritta Heisel, Angela Borchert
, Rene Meis, Aida Omerovic, Ketil Stølen:
Risk-Based Elicitation of Security Requirements According to the ISO 27005 Standard. ENASE (Selected Papers) 2018: 71-97 - [c135]Nazila Gol Mohammadi, Zoltán Ádám Mann, Andreas Metzger, Maritta Heisel, James Greig:
Towards an End-to-End Architecture for Run-Time Data Protection in the Cloud. SEAA 2018: 514-518 - [c134]Nelufar Ulfat-Bunyadi, Nazila Gol Mohammadi, Maritta Heisel:
Supporting the Systematic Goal Refinement in KAOS using the Six-Variable Model. ICSOFT 2018: 136-145 - [c133]Nelufar Ulfat-Bunyadi, Nazila Gol Mohammadi, Roman Wirtz, Maritta Heisel:
Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem Diagrams. ICSOFT (Selected Papers) 2018: 150-172 - [c132]Benjamin Cabrera, Björn Ross, Marielle Dado, Maritta Heisel:
The Gender Gap in Wikipedia Talk Pages. ICWSM 2018: 572-575 - [c131]Nicolás E. Díaz Ferreyra
, Rene Meis, Maritta Heisel:
At Your Own Risk: Shaping Privacy Heuristics for Online Self-disclosure. PST 2018: 1-10 - [c130]Nazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel:
Problem-based Derivation of Trustworthiness Requirements from Users' Trust Concerns. PST 2018: 1-10 - [c129]Nicolás E. Díaz Ferreyra
, Tobias Hecking, Heinz Ulrich Hoppe, Maritta Heisel:
Access-Control Prediction in Social Network Sites: Examining the Role of Homophily. SocInfo (2) 2018: 61-74 - [c128]Nazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel:
Trustworthiness Cases - Toward Preparation for the Trustworthiness Certification. TrustBus 2018: 244-259 - 2017
- [j19]Rene Meis
, Maritta Heisel:
Computer-Aided Identification and Validation of Intervenability Requirements. Inf. 8(1): 30 (2017) - [j18]Nazila Gol Mohammadi
, Maritta Heisel:
A Framework for Systematic Refinement of Trustworthiness Requirements. Inf. 8(2): 46 (2017) - [j17]Kristian Beckers, Isabelle Côté, Thomas Frese, Denis Hatebur, Maritta Heisel:
A structured and systematic model-based development method for automotive systems, considering the OEM/supplier interface. Reliab. Eng. Syst. Saf. 158: 172-184 (2017) - [c127]Nelufar Ulfat-Bunyadi, Denis Hatebur, Maritta Heisel:
Performing a More Realistic Safety Analysis by Means of the Six-Variable Model. Automotive - Safety & Security 2017: 135-148 - [c126]Nicolás E. Díaz Ferreyra
, Rene Meis, Maritta Heisel:
Online Self-disclosure: From Users' Regrets to Instructional Awareness. CD-MAKE 2017: 83-102 - [c125]Nicolás Emilio Díaz Ferreyra
, Rene Meis, Maritta Heisel:
Towards an ILP Approach for Learning Privacy Heuristics from Users' Regrets. ENIC 2017: 187-197 - [c124]Zoltán Ádám Mann, Eliot E. Salant, Mike Surridge
, Dhouha Ayed, John Boyle, Maritta Heisel, Andreas Metzger, Paul Mundt
:
Secure Data Processing in the Cloud. ESOCC Workshops 2017: 149-153 - [c123]Rene Meis
, Maritta Heisel:
Aspect Frames: Describing Cross-Cutting Concerns in Aspect-Oriented Requirements Engineering. EuroPLoP 2017: 25:1-25:28 - [c122]Nicolás Emilio Díaz Ferreyra
, Rene Meis, Maritta Heisel:
Should User-generated Content be a Matter of Privacy Awareness? - A Position Paper. KMIS 2017: 212-216 - [c121]Rene Meis
, Maritta Heisel:
Towards Systematic Privacy and Operability (PRIOP) Studies. SEC 2017: 427-441 - [c120]Rene Meis
, Maritta Heisel:
Pattern-Based Representation of Privacy Enhancing Technologies as Early Aspects. TrustBus 2017: 49-65 - 2016
- [j16]Rene Meis
, Maritta Heisel:
Computer-Aided Identification and Validation of Privacy Requirements. Inf. 7(2): 28 (2016) - [j15]Azadeh Alebrahim, Stephan Faßbender, Martin Filipczyk, Michael Goedicke, Maritta Heisel, Uwe Zdun:
Variability for Qualities in Software Architecture. ACM SIGSOFT Softw. Eng. Notes 41(1): 32-35 (2016) - [c119]Nicolás Emilio Díaz Ferreyra
, Johanna Schäwel, Maritta Heisel, Christian Meske:
Addressing self-disclosure in social media: An instructional awareness approach. AICCSA 2016: 1-6 - [c118]Nazila Gol Mohammadi, Maritta Heisel:
Patterns for identification of trust concerns and specification of trustworthiness requirements. EuroPLoP 2016: 31 - [c117]Nelufar Ulfat-Bunyadi, Rene Meis, Maritta Heisel:
The Six-Variable Model - Context Modelling Enabling Systematic Reuse of Control Software. ICSOFT-PT 2016: 15-26 - [c116]Nelufar Ulfat-Bunyadi, Rene Meis, Nazila Gol Mohammadi, Maritta Heisel:
Introducing Product Line Engineering in a Bottom-up Approach. ICSOFT-PT 2016: 146-153 - [c115]Nelufar Ulfat-Bunyadi, Rene Meis, Maritta Heisel:
Facilitating Reuse of Control Software Through Context Modelling Based on the Six-Variable Model. ICSOFT (Selected Papers) 2016: 332-358 - [c114]Nazila Gol Mohammadi, Maritta Heisel:
Enhancing Business Process Models with Trustworthiness Requirements. IFIPTM 2016: 33-51 - [c113]Nazila Gol Mohammadi, Maritta Heisel:
A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN. TrustBus 2016: 3-18 - [c112]Rene Meis
, Maritta Heisel:
Understanding the Privacy Goal Intervenability. TrustBus 2016: 79-94 - 2015
- [c111]Azadeh Alebrahim, Stephan Faßbender, Martin Filipczyk, Michael Goedicke, Maritta Heisel, Uwe Zdun:
1st Workshop on VAriability for QUalIties in SofTware Architecture (VAQUITA): Workshop Introduction. ECSA Workshops 2015: 22:1-22:2 - [c110]Azadeh Alebrahim, Maritta Heisel:
Applying performance patterns for requirements analysis. EuroPLoP 2015: 35:1-35:15 - [c109]Azadeh Alebrahim, Stephan Fassbender, Martin Filipczyk, Michael Goedicke, Maritta Heisel:
Towards a reliable mapping between performance and security tactics, and architectural patterns. EuroPLoP 2015: 39:1-39:43 - [c108]Azadeh Alebrahim, Stephan Fassbender, Martin Filipczyk, Michael Goedicke, Maritta Heisel:
Towards systematic selection of architectural patterns with respect to quality requirements. EuroPLoP 2015: 40:1-40:20 - [c107]Rene Meis, Maritta Heisel:
Systematic Identification of Information Flows from Requirements to Support Privacy Impact Assessments. ICSOFT-PT 2015: 43-52 - [c106]Rene Meis
, Maritta Heisel:
Supporting Privacy Impact Assessments Using Problem-Based Privacy Analysis. ICSOFT (Selected Papers) 2015: 79-98 - [c105]Kristian Beckers, Maritta Heisel, Francisco Moyano, M. Carmen Fernández Gago:
Engineering trust- and reputation-based security controls for future internet systems. SAC 2015: 1344-1349 - [c104]Kristian Beckers, Isabelle Côté, Thomas Frese, Denis Hatebur, Maritta Heisel:
A Structured Validation and Verification Method for Automotive Systems Considering the OEM/Supplier Interface. SAFECOMP 2015: 90-108 - [c103]Azadeh Alebrahim, Nazila Gol Mohammadi, Maritta Heisel:
Challenges in Rendering and Maintaining Trustworthiness for Long-Living Software Systems. Software Engineering (Workshops) 2015: 103-105 - [c102]Rene Meis
, Roman Wirtz, Maritta Heisel:
A Taxonomy of Requirements for the Privacy Goal Transparency. TrustBus 2015: 195-209 - 2014
- [j14]Kristian Beckers, Isabelle Côté, Ludger Goeke, Selim Güler, Maritta Heisel:
A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain. Int. J. Secur. Softw. Eng. 5(2): 20-43 (2014) - [j13]Kristian Beckers, Maritta Heisel, Denis Hatebur:
Supporting Common Criteria Security Analysis with Problem Frames. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(1): 37-63 (2014) - [c101]Azadeh Alebrahim, Maritta Heisel:
Towards Developing Secure Software Using Problem-Oriented Security Patterns. CD-ARES 2014: 45-62 - [c100]Azadeh Alebrahim, Stephan Faßbender, Martin Filipczyk, Michael Goedicke, Maritta Heisel, Marco Konersmann:
Towards a Computer-Aided Problem-Oriented Variability Requirements Engineering Method. CAiSE Workshops 2014: 136-147 - [c99]Kristian Beckers, Stephan Faßbender, Maritta Heisel:
Deriving a pattern language syntax for context-patterns. EuroPLoP 2014: 2:1-2:25 - [c98]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Santiago Suppan:
A meta-pattern and pattern form for context-patterns. EuroPLoP 2014: 5:1-5:23 - [c97]Azadeh Alebrahim, Maritta Heisel:
Problem-oriented security patterns for requirements engineering. EuroPLoP 2014: 9:1-9:17 - [c96]Azadeh Alebrahim, Maritta Heisel, Rene Meis
:
A Structured Approach for Eliciting, Modeling, and Using Quality-Related Domain Knowledge. ICCSA (5) 2014: 370-386 - [c95]Stephan Faßbender, Maritta Heisel, Rene Meis:
Functional Requirements Under Security PresSuRE. ICSOFT PT 2014: 5-16 - [c94]Stephan Faßbender, Maritta Heisel, Rene Meis:
Aspect-oriented Requirements Engineering with Problem Frames. ICSOFT PT 2014: 145-156 - [c93]Stephan Faßbender, Maritta Heisel, Rene Meis
:
A Problem-, Quality-, and Aspect-Oriented Requirements Engineering Method. ICSOFT (Selected Papers) 2014: 291-310 - [c92]Stephan Faßbender, Maritta Heisel, Rene Meis
:
Problem-Based Security Requirements Elicitation and Refinement with PresSuRE. ICSOFT (Selected Papers) 2014: 311-330 - [c91]Azadeh Alebrahim, Stephan Faßbender, Maritta Heisel, Rene Meis
:
Problem-Based Requirements Interaction Analysis. REFSQ 2014: 200-215 - [c90]Kristian Beckers, Isabelle Côté, Thomas Frese, Denis Hatebur, Maritta Heisel:
Systematic Derivation of Functional Safety Requirements for Automotive Systems. SAFECOMP 2014: 65-80 - [c89]Kristian Beckers, Maritta Heisel, Leanid Krautsevich, Fabio Martinelli, Rene Meis
, Artsiom Yautsiukhin
:
Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis. SmartGridSec 2014: 30-47 - [c88]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Santiago Suppan:
A Threat Analysis Methodology for Smart Home Scenarios. SmartGridSec 2014: 94-124 - [c87]Francisco Moyano
, M. Carmen Fernández Gago
, Kristian Beckers, Maritta Heisel:
Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements. SmartGridSec 2014: 166-180 - [c86]Kristian Beckers, Stephan Faßbender, Stefanos Gritzalis
, Maritta Heisel, Christos Kalloniatis, Rene Meis
:
Privacy-Aware Cloud Deployment Scenario Selection. TrustBus 2014: 94-105 - [p4]Azadeh Alebrahim, Christine Choppy, Stephan Faßbender, Maritta Heisel:
Optimizing Functional and Quality Requirements According to Stakeholders' Goals. Relating System Quality and Software Architecture 2014: 75-120 - [p3]Kristian Beckers, Isabelle Côté, Stefan Fenz
, Denis Hatebur, Maritta Heisel:
A Structured Comparison of Security Standards. Engineering Secure Future Internet Services and Systems 2014: 1-34 - [p2]Kristian Beckers, Maritta Heisel, Bjørnar Solhaug, Ketil Stølen:
ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System. Engineering Secure Future Internet Services and Systems 2014: 315-344 - [e3]Maritta Heisel, Wouter Joosen, Javier López, Fabio Martinelli:
Engineering Secure Future Internet Services and Systems - Current Research. Lecture Notes in Computer Science 8431, Springer 2014, ISBN 978-3-319-07451-1 [contents] - 2013
- [j12]Kristian Beckers, Isabelle Côté, Stephan Faßbender, Maritta Heisel, Stefan Hofbauer
:
A pattern-based method for establishing a cloud-specific information security management system - Establishing information security management systems for clouds considering security, privacy, and legal compliance. Requir. Eng. 18(4): 343-395 (2013) - [j11]Kristian Beckers, Isabelle Côté, Stephan Faßbender, Maritta Heisel, Stefan Hofbauer
:
Erratum to: A pattern-based method for establishing a cloud-specific information security management system. Requir. Eng. 18(4): 397 (2013) - [c85]Kristian Beckers, Denis Hatebur, Maritta Heisel:
A Problem-Based Threat Analysis in Compliance with Common Criteria. ARES 2013: 111-120 - [c84]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Federica Paci
:
Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods. CD-ARES 2013: 178-194 - [c83]Nazila Gol Mohammadi, Azadeh Alebrahim, Thorsten Weyer, Maritta Heisel, Klaus Pohl:
A Framework for Combining Problem Frames and Goal Models to Support Context Analysis during Requirements Engineering. CD-ARES 2013: 272-288 - [c82]Kristian Beckers, Maritta Heisel, Isabelle Côté, Ludger Goeke, Selim Güler:
Structured Pattern-Based Security Requirements Elicitation for Clouds. ARES 2013: 465-474 - [c81]Kristian Beckers, Maritta Heisel:
A Usability Evaluation of the NESSoS Common Body of Knowledge. ARES 2013: 559-568 - [c80]Kristian Beckers, Stephan Faßbender, Maritta Heisel:
A meta-model for context-patterns. EuroPLoP 2013: 5:1-5:15 - [c79]Stephan Faßbender, Maritta Heisel:
A Computer-Aided Process from Problems to Laws in Requirements Engineering. ICSOFT (Selected Papers) 2013: 215-234 - [c78]Stephan Faßbender, Maritta Heisel:
From Problems to Laws in Requirements Engineering - Using Model-Transformation. ICSOFT 2013: 447-458 - [c77]Kristian Beckers, Maritta Heisel, Thomas Frese, Denis Hatebur:
A structured and model-based hazard analysis and risk assessment method for automotive systems. ISSRE 2013: 238-247 - [c76]Kristian Beckers, Stephan Faßbender, Denis Hatebur, Maritta Heisel, Isabelle Côté:
Common criteria compliant software development (CC-CASD). SAC 2013: 1298-1304 - [i1]Maritta Heisel, Mohamed Kaâniche, Alexander B. Romanovsky, Elena Troubitsyna:
Engineering Resilient Systems: Models, Methods and Tools (Dagstuhl Seminar 13022). Dagstuhl Reports 3(1): 30-46 (2013) - 2012
- [c75]Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel, Holger Schmidt, Widura Schwittek:
Ontology-Based Identification of Research Gaps and Immature Research Areas. CD-ARES 2012: 1-16 - [c74]Kristian Beckers, Maritta Heisel:
A Foundation for Requirements Analysis of Privacy Preserving Software. CD-ARES 2012: 93-107 - [c73]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Holger Schmidt:
Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation. ARES 2012: 242-248 - [c72]Widura Schwittek, Holger Schmidt, Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel:
A Common Body of Knowledge for Engineering Secure Software and Services. ARES 2012: 499-506 - [c71]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Rene Meis:
A Problem-Based Approach for Computer-Aided Privacy Threat Identification. APF 2012: 1-16 - [c70]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Rene Meis:
Pattern-Based Context Establishment for Service-Oriented Architectures. Software Service and Application Engineering 2012: 81-101 - [c69]Azadeh Alebrahim, Thein Than Tun, Yijun Yu, Maritta Heisel, Bashar Nuseibeh:
An Aspect-Oriented Approach to Relating Security Requirements and Access Control. CAiSE Forum 2012: 15-22 - [c68]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Jan-Christoph Küster, Holger Schmidt:
Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches. ESSoS 2012: 14-21 - [c67]Azadeh Alebrahim, Maritta Heisel:
Supporting quality-driven design decisions by modeling variability. QoSA 2012: 43-48 - [c66]Azadeh Alebrahim, Isabelle Côté, Maritta Heisel, Christine Choppy, Denis Hatebur:
Designing architectures from problem descriptions by interactive model transformation. SAC 2012: 1256-1258 - [c65]Marco Konersmann, Azadeh Alebrahim, Maritta Heisel, Michael Goedicke, Benjamin Kersten:
Deriving Quality-based Architecture Alternatives with Patterns. Software Engineering 2012: 71-82 - [e2]Maritta Heisel:
Software Service and Application Engineering - Essays Dedicated to Bernd Krämer on the Occasion of His 65th Birthday. Lecture Notes in Computer Science 7365, Springer 2012, ISBN 978-3-642-30834-5 [contents] - 2011
- [c64]Azadeh Alebrahim, Denis Hatebur, Maritta Heisel:
A Method to Derive Software Architectures from Quality Requirements. APSEC 2011: 322-330 - [c63]Isabelle Côté, Maritta Heisel:
A UML Profile and Tool Support for Evolutionary Requirements Engineering. CSMR 2011: 161-170 - [c62]Azadeh Alebrahim, Denis Hatebur, Maritta Heisel:
Towards Systematic Integration of Quality Requirements into Software Architecture. ECSA 2011: 17-25 - [c61]Denis Hatebur, Maritta Heisel, Jan Jürjens, Holger Schmidt:
Systematic Development of UMLsec Design Models Based on Security Requirements. FASE 2011: 232-246 - [c60]Widura Schwittek, Holger Schmidt, Stefan Eicker, Maritta Heisel:
Towards a Common Body of Knowledge for Engineering Secure Software and Services. KMIS 2011: 369-374 - [c59]Isabelle Côté, Maritta Heisel, Holger Schmidt, Denis Hatebur:
UML4PF - A tool for problem-oriented requirements analysis. RE 2011: 349-350 - [p1]Christine Choppy, Denis Hatebur, Maritta Heisel:
Systematic Architectural Design Based on Problem Patterns. Relating Software Requirements and Architectures 2011: 133-159 - 2010
- [j10]Benjamin Fabian
, Seda F. Gürses, Maritta Heisel, Thomas Santen, Holger Schmidt:
A comparison of security requirements engineering methods. Requir. Eng. 15(1): 7-40 (2010) - [c58]Denis Hatebur, Maritta Heisel:
Making Pattern- and Model-Based Software Development More Rigorous. ICFEM 2010: 253-269 - [c57]Denis Hatebur, Maritta Heisel:
A UML Profile for Requirements Analysis of Dependable Software. SAFECOMP 2010: 317-331
2000 – 2009
- 2009
- [c56]Alexander Fülleborn, Klaus Meffert, Maritta Heisel:
Problem-Oriented Documentation of Design Patterns. FASE 2009: 294-308 - [c55]Isabelle Côté, Maritta Heisel, Jeanine Souquières:
On the Evolution of Component-Based Software. CEE-SET 2009: 54-69 - [c54]Denis Hatebur, Maritta Heisel:
A Foundation for Requirements Analysis of Dependable Software. SAFECOMP 2009: 311-325 - [c53]Michael Goedicke, Maritta Heisel, Sascha Hunold, Stefan Kühne, Matthias Riebisch, Niels Streekmann:
Modellgetriebene Softwarearchitektur - Evolution, Integration und Migration (MSEIM 2009). Software Engineering 2009: 199-200 - [c52]Michael Goedicke, Maritta Heisel, Sascha Hunold
, Stefan Kühne, Matthias Riebisch, Niels Streekmann:
Workshop Modellgetriebene Softwarearchitektur - Evolution, Integration und Migration (MSEIM2009). Software Engineering (Workshops) 2009: 363-366 - [c51]Denis Hatebur, Maritta Heisel:
Deriving Software Architectures from Problem Descriptions. Software Engineering (Workshops) 2009: 383-392 - 2008
- [j9]Maritta Heisel, Denis Hatebur, Thomas Santen, Dirk Seifert:
Testing Against Requirements Using UML Environment Models. Softwaretechnik-Trends 28(3) (2008) - [c50]Denis Hatebur, Maritta Heisel, Holger Schmidt:
Analysis and Component-based Realization of Security Requirements. ARES 2008: 195-203 - [c49]Denis Hatebur, Maritta Heisel, Holger Schmidt:
A Formal Metamodel for Problem Frames. MoDELS 2008: 68-82 - [c48]Michael Goedicke, Maritta Heisel, Sascha Hunold
, Stefan Kühne, Matthias Riebisch, Niels Streekmann:
Workshop Modellgetriebene Softwarearchitektur - Evolution, Integration und Migration (MSEIM 2008). Software Engineering (Workshops) 2008: 173-177 - [c47]Michael Goedicke, Maritta Heisel, Sascha Hunold
, Stefan Kühne, Matthias Riebisch, Niels Streekmann:
Workshop Modellgetriebene Softwarearchitektur -Evolution, Integration und Migration. Software Engineering 2008: 285-287 - [c46]Maritta Heisel, Denis Hatebur, Thomas Santen, Dirk Seifen:
Using UML Environment Models for Test Case Generation. Software Engineering (Workshops) 2008: 399-406 - 2007
- [j8]Isabelle Côté, Maritta Heisel, Ina Wentzlaff:
Pattern-Based Exploration of Design Alternatives for the Evolution of Software Architectures. Int. J. Cooperative Inf. Syst. 16(3/4): 341-365 (2007) - [j7]Maritta Heisel:
Guest Editorial. Reliab. Eng. Syst. Saf. 92(11): 1489-1491 (2007) - [j6]Rainer Gimnich, Michael Goedicke, Wilhelm Hasselbring, Maritta Heisel, Ralf H. Reussner, Andreas Winter:
Bericht über den Workshop Software-Architektur und Migration im Rahmen der Software-Engineering 2007, 27. März 2007 in Hamburg. Softwaretechnik-Trends 27(2) (2007) - [c45]Denis Hatebur, Maritta Heisel, Holger Schmidt:
A Pattern System for Security Requirements Engineering. ARES 2007: 356-365 - [c44]Arnaud Lanoix, Denis Hatebur, Maritta Heisel, Jeanine Souquières:
Enhancing Dependability of Component-Based Systems. Ada-Europe 2007: 41-54 - [c43]Denis Hatebur, Maritta Heisel, Holger Schmidt:
A Security Engineering Process based on Patterns. DEXA Workshops 2007: 734-738 - [c42]Isabelle Côté, Maritta Heisel, Ina Wentzlaff:
Pattern-Based Evolution of Software Architectures. ECSA 2007: 29-43 - [c41]Isabelle Côté, Denis Hatebur, Maritta Heisel, Holger Schmidt, Ina Wentzlaff:
A Systematic Account of Problem Frames. EuroPLoP 2007: 749-768 - [c40]Rainer Gimnich, Michael Goedicke, Wilhelm Hasselbring, Maritta Heisel, Ralf H. Reussner, Andreas Winter:
Einführung. Software Engineering (Workshops) 2007: 151-152 - [c39]Rainer Gimnich, Michael Goedicke, Wilhelm Hasselbring, Maritta Heisel, Ralf H. Reussner, Andreas Winter:
WG5: Workshop Softwarearchitektur und Migration. Software Engineering 2007: 283-284 - 2006
- [c38]Christine Choppy, Denis Hatebur, Maritta Heisel:
Component composition through architectural patterns for problem frames. APSEC 2006: 27-36 - [c37]Denis Hatebur, Maritta Heisel, Holger Schmidt:
Security Engineering Using Problem Frames. ETRICS 2006: 238-253 - [c36]Denis Hatebur, Maritta Heisel, Jeanine Souquières:
A Method for Component-Based Software and System Development. EUROMICRO-SEAA 2006: 72-80 - [c35]Alexander Fülleborn, Maritta Heisel:
Methods to Create and Use Cross-Domain Analysis Patterns. EuroPLoP 2006: 427-442 - 2005
- [j5]Christine Choppy, Denis Hatebur, Maritta Heisel:
Architectural patterns for problem frames. IEE Proc. Softw. 152(4): 198-208 (2005) - [c34]Maritta Heisel, Denis Hatebur:
A Model-Based Development Process for Embedded System. MBEES 2005: 191-202 - [c33]Denis Hatebur, Maritta Heisel:
Problem Frames and Architectures for Security Problems. SAFECOMP 2005: 390-404 - [c32]Samir Chouali, Maritta Heisel, Jeanine Souquières:
Proving Component Interoperability with B Refinement. FACS 2005: 157-172 - 2004
- [c31]Maritta Heisel, Carsten von Schwichow:
A method for guiding software evolution. IASTED Conf. on Software Engineering 2004: 462-468 - [e1]Maritta Heisel, Peter Liggesmeyer, Stefan Wittmann:
Computer Safety, Reliability, and Security, 23rd International Conference, SAFECOMP 2004, Potsdam, Germany, September 21-24, 2004, Proceedings. Lecture Notes in Computer Science 3219, Springer 2004, ISBN 3-540-23176-5 [contents] - 2003
- [c30]Maritta Heisel, Jeanine Souquières:
Adding Features to Component-Based Systems. Objects, Agents, and Features 2003: 137-153 - 2002
- [c29]Thomas Santen, Maritta Heisel, Andreas Pfitzmann:
Confidentiality-Preserving Refinement is Compositional - Sometimes. ESORICS 2002: 194-211 - [c28]Maritta Heisel, Thomas Santen, Jeanine Souquières:
Toward a Formal Model of Software Components. ICFEM 2002: 57-68 - [c27]Thomas Rottke, Denis Hatebur, Maritta Heisel, Monika Heiner:
A Problem-Oriented Approach to Common Criteria Certification. SAFECOMP 2002: 334-346 - [c26]Christine Choppy, Maritta Heisel:
Use of Patterns in Formal Development: Systematic Transition from Problems to Architectural Designs. WADT 2002: 201-215 - 2001
- [j4]Wolfgang Grieskamp, Maritta Heisel, Heiko Dörr:
Specifying embedded systems with statecharts and Z: an agenda for cyclic software components. Sci. Comput. Program. 40(1): 31-57 (2001) - [c25]Maritta Heisel, Andreas Pfitzmann, Thomas Santen:
Confidentiality-Preserving Refinement. CSFW 2001: 295-306 - 2000
- [c24]Maritta Heisel, Jeanine Souquières:
A Heuristic Algorithm to Detect Feature Interactions in Requirements. FIREworks 2000: 143-162
1990 – 1999
- 1999
- [c23]Maritta Heisel, Jeanine Souquières:
A Method for Requirements Elicitation and Formal Specification. ER 1999: 309-324 - [c22]Monika Heiner, Maritta Heisel:
Modeling Safety-Critical Systems with Z and Petri Nets. SAFECOMP 1999: 361-374 - 1998
- [c21]Wolfgang Grieskamp, Maritta Heisel, Heiko Dörr:
Specifying Embedded Systems with Staecharts and Z: An Agenda for Cyclic Software Components. FASE 1998: 88-106 - [c20]Maritta Heisel, Jeanine Souquières:
A Heuristic Approach to Detect Feature Interactions in Requirements. FIW 1998: 165-171 - [c19]Maritta Heisel, Rainer Mackenthun, Thomas Neustupny, Sadegh Sadeghipour, Matthias Weber:
Tutorium: Entwicklung sicherheitskritischer eingebetteter Systeme: Der ESPRESS-Ansatz. GI Jahrestagung 1998: 401-403 - [c18]Maritta Heisel, Jeanine Souquières:
Methodological Support for Requirements Elicitation and Formal Specification. IWSSD 1998: 153-155 - [c17]Kirsten Winter, Thomas Santen, Maritta Heisel:
An Agenda for Specifying Software Components with Complex Data Models. SAFECOMP 1998: 16-31 - 1997
- [c16]Maritta Heisel, Stefan Jähnichen:
A Two-Layered Approach to Support Systematic Software Development. Requirements Targeting Software and Systems Engineering 1997: 179-202 - [c15]Maritta Heisel, Carsten Siihl:
Methodological Support for Formally Specifying Safety-Critical Software. SAFECOMP 1997: 295-308 - [c14]Maritta Heisel, Nicole Lévy:
Using LOTOS Patterns to Characterize Architectural Styles. TAPSOFT 1997: 818-832 - 1996
- [c13]Maritta Heisel, Carsten Sühl:
Formal Specification of Safety-Critical Software with Z and Real-Time CSP. SAFECOMP 1996: 31-45 - 1995
- [c12]Maritta Heisel:
Specification of the Unix File System: A Comparative Case Study. AMAST 1995: 475-488 - [c11]Maritta Heisel, Thomas Santen, Dominik Zimmermann:
Tool Support for Formal Software Development: A Generic Architecture. ESEC 1995: 272-293 - [c10]Maritta Heisel:
Six Steps Towards Provably Safe Software. SAFECOMP 1995: 191-205 - 1994
- [j3]Maritta Heisel, Debora Weber-Wulff:
Korrekte Software: Nur eine Illusion? Inform. Forsch. Entwickl. 9(4): 192-200 (1994) - 1993
- [c9]Maritta Heisel:
"Frauenspezifische Informatik" und Frauenförderpläne: Wie paßt das zusammen?. Frauen in Mathematik und Informatik 1993: 119-128 - [c8]Maritta Heisel, Debora Weber-Wulff:
Korrekte Software: Nur eine Illusion? GI Jahrestagung 1993: 240 - 1992
- [b1]Maritta Heisel:
Formale Programmentwicklung mit dynamischer Logik. Karlsruhe Institute of Technology, Germany, Dt. Univ.-Verlag 1992, ISBN 978-3-8244-2031-5, pp. 1-288 - [j2]Maritta Heisel:
Formalizing and Implementing Gries' Program Development Method in Dynamic Logic. Sci. Comput. Program. 18(1): 107-137 (1992) - 1990
- [c7]Maritta Heisel, Wolfgang Reif
, Werner Stephan:
Tactical Theorem Proving in Program Verification. CADE 1990: 117-131
1980 – 1989
- 1989
- [c6]Maritta Heisel, Wolfgang Reif
, Werner Stephan:
A Dynamic Logic for Program Verification. Logic at Botik 1989: 134-145 - [c5]Maritta Heisel, Wolfgang Reif, Werner Stephan:
Machine-Assisted Program Construction and Modification. GWAI 1989: 338-347 - 1988
- [j1]Maritta Heisel, Wolfgang Reif:
Bericht über den Workshop "Logik und Wissensrepräsentation". Künstliche Intell. 2(3): 15-17 (1988) - [c4]Maritta Heisel, Wolfgang Reif
, Werner Stephan:
Implementing Verification Strategies in the KIV-System. CADE 1988: 131-140 - 1987
- [c3]Maritta Heisel, Wolfgang Reif
, Werner Stephan:
Program Verification Using Dynamic Logic. CSL 1987: 102-117 - [c2]Maritta Heisel, Wolfgang Reif, Werner Stephan:
Program Verification by Symbolic Execution and Induction. GWAI 1987: 201-210 - 1986
- [c1]Reiner Hähnle
, Maritta Heisel, Wolfgang Reif
, Werner Stephan:
An Interactive Verification System Based on Dynamic Logic. CADE 1986: 306-315
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-03 23:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint