Yudistira Asnar
Cited by
Cited by
Goal-driven risk assessment in requirements engineering
Y Asnar, P Giorgini, J Mylopoulos
Requirements Engineering 16 (2), 101-116, 2011
Modelling risk and identifying countermeasure in organizations
Y Asnar, P Giorgini
International Workshop on Critical Information Infrastructures Security, 55-66, 2006
From trust to dependability through risk analysis
Y Asnar, P Giorgini, F Massacci, N Zannone
The Second International Conference on Availability, Reliability and …, 2007
Risk as dependability metrics for the evaluation of business solutions: a model-driven approach
Y Asnar, R Moretti, M Sebastianis, N Zannone
2008 Third International Conference on Availability, Reliability and …, 2008
Analyzing business continuity through a multi-layers model
Y Asnar, P Giorgini
International Conference on Business Process Management, 212-227, 2008
Perceived risk assessment
Y Asnar, N Zannone
Proceedings of the 4th ACM Workshop on Quality of Protection, 59-64, 2008
Using risk analysis to evaluate design alternatives
Y Asnar, V Bryl, P Giorgini
International Workshop on Agent-Oriented Software Engineering, 140-155, 2006
Secure and dependable patterns in organizations: An empirical approach
Y Asnar, P Giorgini, F Massacci, A Saidane, R Bonato, V Meduri, ...
15th IEEE International Requirements Engineering Conference (RE 2007), 287-292, 2007
Risk analysis as part of the requirements engineering process
Y Asnar, P Giorgini
University of Trento, 2007
Risk modelling and reasoning in goal models
Y Asnar, P Giorgini, J Mylopoulos
University of Trento, 2006
A method for security governance, risk, and compliance (GRC): a goal-process approach
Y Asnar, F Massacci
International School on Foundations of Security Analysis and Design, 152-184, 2011
Computer aided threat identification
Y Asnar, T Li, F Massacci, F Paci
2011 IEEE 13th Conference on Commerce and Enterprise Computing, 145-152, 2011
Applying tropos to socio-technical system design and runtime configuration
F Dalpiaz, R Ali, Y Asnar, V Bryl, P Giorgini
Realizing Trustworthy Business Services Through a New GRC Approach
Y Asnar, HW Lim, F Massacci, C Worledge
ISACA - JOnline 2, 2010
An evaluation of business solutions in manufacturing enterprises
Y Asnar, P Giorgini, P Ciancarini, R Moretti, M Sebastianis, N Zannone
International Journal of Business Intelligence and Data Mining 3 (3), 305, 2008
A vulnerability scanning tool for session management vulnerabilities
R Lukanta, Y Asnar, AI Kistijantoro
2014 International Conference on Data and Software Engineering (ICODSE), 1-6, 2014
Security and privacy requirements at organizational level
Y Asnar, R Bonato, V Bryl, L Compagna, K Dolinar, P Giorgini, ...
SERENITY Deliverable A 1, 2006
Reshaping software engineering education towards 2020 engineers
I Liem, Y Asnar, S Akbar, A Mulyanto, Y Widyani
2014 IEEE 27th Conference on Software Engineering Education and Training …, 2014
Organizational Patterns for Security and Dependability: from design to application
Y Asnar, F Massacci, A Saidane, C Riccucci, M Felici, A Tedeschi, ...
International Journal of Secure Software Engineering (IJSSE) 2 (3), 1-22, 2011
Requirements Analysis and Risk Assessment for Critical Information Systems
Y Asnar
PhD, Universita Degli Studi Di Trento, 2009
The system can't perform the operation now. Try again later.
Articles 1–20