default search action
Holger Schmidt 0001
Person information
- affiliation: University of Applied Sciences Düsseldorf, Germany
- affiliation (former): University of Duisburg-Essen, Germany
- affiliation (former): TU Dortmund, Germany
Other persons with the same name
- Holger Schmidt — disambiguation page
- Holger Schmidt 0002 — Ulm University, Germany
- Holger Schmidt 0003 — Munich University of Technology, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c24]Holger Schmidt, Max van Aerssen, Christian Leich, Abdulkader Benni, Salar Al Ali, Jakob Tanz:
CopypastaVulGuard - A browser extension to prevent copy and paste spreading of vulnerable source code in forum posts. ARES 2022: 148:1-148:8
2010 – 2019
- 2012
- [c23]Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel, Holger Schmidt, Widura Schwittek:
Ontology-Based Identification of Research Gaps and Immature Research Areas. CD-ARES 2012: 1-16 - [c22]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Holger Schmidt:
Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation. ARES 2012: 242-248 - [c21]Kristian Beckers, Stephan Faßbender, Holger Schmidt:
An Integrated Method for Pattern-Based Elicitation of Legal Requirements Applied to a Cloud Computing Example. ARES 2012: 463-472 - [c20]Widura Schwittek, Holger Schmidt, Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel:
A Common Body of Knowledge for Engineering Secure Software and Services. ARES 2012: 499-506 - [c19]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Jan-Christoph Küster, Holger Schmidt:
Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches. ESSoS 2012: 14-21 - [c18]Kristian Beckers, Stephan Faßbender, Jan-Christoph Küster, Holger Schmidt:
A Pattern-Based Method for Identifying and Analyzing Laws. REFSQ 2012: 256-262 - 2011
- [j2]Holger Schmidt:
Threat and Risk-Driven Security Requirements Engineering. Int. J. Mob. Comput. Multim. Commun. 3(1): 35-50 (2011) - [c17]Kristian Beckers, Holger Schmidt, Jan-Christoph Küster, Stephan Faßbender:
Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing. ARES 2011: 327-333 - [c16]Holger Schmidt, Jan Jürjens:
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec. CAiSE 2011: 367-382 - [c15]Jan Jürjens, Loïc Marchal, Martín Ochoa, Holger Schmidt:
Incremental Security Verification for Evolving UMLsec models. ECMFA 2011: 52-68 - [c14]Thomas Heyman, Koen Yskout, Riccardo Scandariato, Holger Schmidt, Yijun Yu:
The Security Twin Peaks. ESSoS 2011: 167-180 - [c13]Denis Hatebur, Maritta Heisel, Jan Jürjens, Holger Schmidt:
Systematic Development of UMLsec Design Models Based on Security Requirements. FASE 2011: 232-246 - [c12]Widura Schwittek, Holger Schmidt, Stefan Eicker, Maritta Heisel:
Towards a Common Body of Knowledge for Engineering Secure Software and Services. KMIS 2011: 369-374 - [c11]Isabelle Côté, Maritta Heisel, Holger Schmidt, Denis Hatebur:
UML4PF - A tool for problem-oriented requirements analysis. RE 2011: 349-350 - [c10]Jan Jürjens, Martín Ochoa, Holger Schmidt, Loïc Marchal, Siv Hilde Houmb, Shareeful Islam:
Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications. SFM 2011: 504-526 - 2010
- [b1]Holger Schmidt:
A pattern- and component-based method to develop secure software. University of Münster, 2010, ISBN 978-3-86888-019-9, pp. 1-310 - [j1]Benjamin Fabian, Seda F. Gürses, Maritta Heisel, Thomas Santen, Holger Schmidt:
A comparison of security requirements engineering methods. Requir. Eng. 15(1): 7-40 (2010) - [c9]Holger Schmidt:
Threat- and Risk-Analysis During Early Security Requirements Engineering. ARES 2010: 188-195
2000 – 2009
- 2009
- [c8]Holger Schmidt:
Pattern-Based Confidentiality-Preserving Refinement. ESSoS 2009: 43-59 - 2008
- [c7]Denis Hatebur, Maritta Heisel, Holger Schmidt:
Analysis and Component-based Realization of Security Requirements. ARES 2008: 195-203 - [c6]Denis Hatebur, Maritta Heisel, Holger Schmidt:
A Formal Metamodel for Problem Frames. MoDELS 2008: 68-82 - 2007
- [c5]Denis Hatebur, Maritta Heisel, Holger Schmidt:
A Pattern System for Security Requirements Engineering. ARES 2007: 356-365 - [c4]Denis Hatebur, Maritta Heisel, Holger Schmidt:
A Security Engineering Process based on Patterns. DEXA Workshops 2007: 734-738 - [c3]Isabelle Côté, Denis Hatebur, Maritta Heisel, Holger Schmidt, Ina Wentzlaff:
A Systematic Account of Problem Frames. EuroPLoP 2007: 749-768 - 2006
- [c2]Denis Hatebur, Maritta Heisel, Holger Schmidt:
Security Engineering Using Problem Frames. ETRICS 2006: 238-253 - [c1]Holger Schmidt, Ina Wentzlaff:
Preserving Software Quality Characteristics from Requirements Analysis to Architectural Design. EWSA 2006: 189-203
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint