Guttorm Sindre
Guttorm Sindre
Verified email at idi.ntnu.no
Title
Cited by
Cited by
Year
Eliciting security requirements with misuse cases
G Sindre, AL Opdahl
Requirements engineering 10 (1), 34-44, 2005
12952005
Understanding quality in conceptual modeling
OI Lindland, G Sindre, A Solvberg
IEEE software 11 (2), 42-49, 1994
11381994
Process models representing knowledge for action: a revised quality framework
J Krogstie, G Sindre, H Jørgensen
European Journal of Information Systems 15 (1), 91-102, 2006
4192006
Templates for misuse case description
G Sindre, AL Opdahl
Proceedings of the 7th International Workshop on Requirements Engineering …, 2001
2392001
Defining quality aspects for conceptual models
J Krogstie, OI Lindland, G Sindre
Information System Concepts, 216-231, 1995
2121995
Towards a deeper understanding of quality in requirements engineering
J Krogstie, OI Lindland, G Sindre
International Conference on Advanced Information Systems Engineering, 82-95, 1995
1861995
Evaluating the quality of information models: empirical testing of a conceptual model quality framework
DL Moody, G Sindre, T Brasethvik, A Solvberg
25th International Conference on Software Engineering, 2003. Proceedings …, 2003
1722003
The REBOOT approach to software reuse
G Sindre, R Conradi, EA Karlsson
Journal of Systems and Software 30 (3), 201-212, 1995
1511995
Experimental comparison of attack trees and misuse cases for security threat identification
AL Opdahl, G Sindre
Information and Software Technology 51 (5), 916-932, 2009
1422009
Capturing security requirements through misuse cases
G Sindre, AL Opdahl
NIK 2001, Norsk Informatikkonferanse 2001, http://www. nik. no/2001, 2001
1292001
Evaluating the quality of process models: Empirical testing of a quality framework
DL Moody, G Sindre, T Brasethvik, A Sølvberg
International Conference on Conceptual Modeling, 380-396, 2002
1102002
On the purpose of object-oriented analysis
GM Høydalsvik, G Sindre
ACM Sigplan Notices 28 (10), 240-255, 1993
1081993
Mal-activity diagrams for capturing attacks on business processes
G Sindre
International working conference on requirements engineering: foundation for …, 2007
1072007
A reuse-based approach to determining security requirements
G Sindre, DG Firesmith, AL Opdahl
Proc. 9th International Workshop on Requirements Engineering: Foundation for …, 2003
1072003
An analytical evaluation of BPMN using a semiotic quality framework
T Wahl, G Sindre
Advanced Topics in Database Research, Volume 5, 94-105, 2006
922006
Experimental validation of the learning effect for a pedagogical game on computer fundamentals
G Sindre, L Natvig, M Jahre
IEEE Transactions on Education 52 (1), 10-18, 2008
792008
Evaluating the effectiveness of learning interventions: an information systems case study
DL Moody, G Sindre
692003
A domain ontology building process for guiding requirements elicitation
I Omoronyia, G Sindre, T Stålhane, S Biffl, T Moser, W Sunindyo
International working conference on requirements engineering: Foundation for …, 2010
572010
A comparison of two approaches to safety analysis based on use cases
T Stålhane, G Sindre
International Conference on Conceptual Modeling, 423-437, 2007
502007
Software engineering students meet interdisciplinary project work and art
L Jaccheri, G Sindre
2007 11th International Conference Information Visualization (IV'07), 925-934, 2007
502007
The system can't perform the operation now. Try again later.
Articles 1–20