[{"user_id":"49934","department":[{"_id":"241"},{"_id":"662"}],"_id":"65261","language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the 14th International Conference on Model-Based Software and Systems Engineering","status":"public","author":[{"last_name":"Trentinaglia","orcid":"0000-0001-9728-4991","id":"49934","full_name":"Trentinaglia, Roman","first_name":"Roman"},{"first_name":"Thorsten","last_name":"Koch","full_name":"Koch, Thorsten","id":"13616"},{"orcid":"0000-0003-3470-3647","last_name":"Bodden","full_name":"Bodden, Eric","id":"59256","first_name":"Eric"}],"date_created":"2026-03-31T13:52:36Z","date_updated":"2026-03-31T13:53:55Z","publisher":"SCITEPRESS - Science and Technology Publications","doi":"10.5220/0014278000004058","title":"Using Attack and Failure Propagation Analysis for Context-Aware Security Control Suggestions","publication_status":"published","citation":{"apa":"Trentinaglia, R., Koch, T., &#38; Bodden, E. (2026). Using Attack and Failure Propagation Analysis for Context-Aware Security Control Suggestions. <i>Proceedings of the 14th International Conference on Model-Based Software and Systems Engineering</i>. <a href=\"https://doi.org/10.5220/0014278000004058\">https://doi.org/10.5220/0014278000004058</a>","ama":"Trentinaglia R, Koch T, Bodden E. Using Attack and Failure Propagation Analysis for Context-Aware Security Control Suggestions. In: <i>Proceedings of the 14th International Conference on Model-Based Software and Systems Engineering</i>. SCITEPRESS - Science and Technology Publications; 2026. doi:<a href=\"https://doi.org/10.5220/0014278000004058\">10.5220/0014278000004058</a>","mla":"Trentinaglia, Roman, et al. “Using Attack and Failure Propagation Analysis for Context-Aware Security Control Suggestions.” <i>Proceedings of the 14th International Conference on Model-Based Software and Systems Engineering</i>, SCITEPRESS - Science and Technology Publications, 2026, doi:<a href=\"https://doi.org/10.5220/0014278000004058\">10.5220/0014278000004058</a>.","short":"R. Trentinaglia, T. Koch, E. Bodden, in: Proceedings of the 14th International Conference on Model-Based Software and Systems Engineering, SCITEPRESS - Science and Technology Publications, 2026.","bibtex":"@inproceedings{Trentinaglia_Koch_Bodden_2026, title={Using Attack and Failure Propagation Analysis for Context-Aware Security Control Suggestions}, DOI={<a href=\"https://doi.org/10.5220/0014278000004058\">10.5220/0014278000004058</a>}, booktitle={Proceedings of the 14th International Conference on Model-Based Software and Systems Engineering}, publisher={SCITEPRESS - Science and Technology Publications}, author={Trentinaglia, Roman and Koch, Thorsten and Bodden, Eric}, year={2026} }","ieee":"R. Trentinaglia, T. Koch, and E. Bodden, “Using Attack and Failure Propagation Analysis for Context-Aware Security Control Suggestions,” 2026, doi: <a href=\"https://doi.org/10.5220/0014278000004058\">10.5220/0014278000004058</a>.","chicago":"Trentinaglia, Roman, Thorsten Koch, and Eric Bodden. “Using Attack and Failure Propagation Analysis for Context-Aware Security Control Suggestions.” In <i>Proceedings of the 14th International Conference on Model-Based Software and Systems Engineering</i>. SCITEPRESS - Science and Technology Publications, 2026. <a href=\"https://doi.org/10.5220/0014278000004058\">https://doi.org/10.5220/0014278000004058</a>."},"year":"2026"},{"type":"conference","publication":"AHFE International","status":"public","abstract":[{"lang":"eng","text":"<jats:p>Assessing and communicating software security has become a crucial concern in the era of digital transformation. As software systems grow more complex and interconnected, it becomes increasingly challenging to effectively evaluate and communicate a product's security status to both technical and non-technical stakeholders. The Software Product Health Assistant (SPHA) is designed to automatically collect and aggregate data from existing expert tools and derive, among other scores, a transparent Security Score. SPHA is designed to present and explain this Security Score to decision-makers to support their responsibilities. In this paper, we demonstrate how to integrate data from SMARAGD (System Modeler for Architectural Risk Assessment and Guidance on Defenses), a safety-informed threat modeling tool, into SPHA to enhance the existing definition of its Security Score. To achieve this, we combine information about known vulnerabilities with architectural and threat data to calculate a realistic risk score for the product in question.</jats:p>"}],"user_id":"49934","department":[{"_id":"241"},{"_id":"662"}],"_id":"60583","language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["2771-0718"]},"citation":{"chicago":"Strüwer, Jan-niclas, Roman Trentinaglia, Benedict Wohlers, Eric Bodden, and Roman Dumitrescu. “Assessing and Communicating Software Security: Enhancing Software Product Health with Architectural Threat Analysis.” In <i>AHFE International</i>, Vol. 168. AHFE International, 2025. <a href=\"https://doi.org/10.54941/ahfe1006145\">https://doi.org/10.54941/ahfe1006145</a>.","ieee":"J. Strüwer, R. Trentinaglia, B. Wohlers, E. Bodden, and R. Dumitrescu, “Assessing and Communicating Software Security: Enhancing Software Product Health with Architectural Threat Analysis,” in <i>AHFE International</i>, 2025, vol. 168, doi: <a href=\"https://doi.org/10.54941/ahfe1006145\">10.54941/ahfe1006145</a>.","ama":"Strüwer J, Trentinaglia R, Wohlers B, Bodden E, Dumitrescu R. Assessing and Communicating Software Security: Enhancing Software Product Health with Architectural Threat Analysis. In: <i>AHFE International</i>. Vol 168. AHFE International; 2025. doi:<a href=\"https://doi.org/10.54941/ahfe1006145\">10.54941/ahfe1006145</a>","mla":"Strüwer, Jan-niclas, et al. “Assessing and Communicating Software Security: Enhancing Software Product Health with Architectural Threat Analysis.” <i>AHFE International</i>, vol. 168, AHFE International, 2025, doi:<a href=\"https://doi.org/10.54941/ahfe1006145\">10.54941/ahfe1006145</a>.","short":"J. Strüwer, R. Trentinaglia, B. Wohlers, E. Bodden, R. Dumitrescu, in: AHFE International, AHFE International, 2025.","bibtex":"@inproceedings{Strüwer_Trentinaglia_Wohlers_Bodden_Dumitrescu_2025, title={Assessing and Communicating Software Security: Enhancing Software Product Health with Architectural Threat Analysis}, volume={168}, DOI={<a href=\"https://doi.org/10.54941/ahfe1006145\">10.54941/ahfe1006145</a>}, booktitle={AHFE International}, publisher={AHFE International}, author={Strüwer, Jan-niclas and Trentinaglia, Roman and Wohlers, Benedict and Bodden, Eric and Dumitrescu, Roman}, year={2025} }","apa":"Strüwer, J., Trentinaglia, R., Wohlers, B., Bodden, E., &#38; Dumitrescu, R. (2025). Assessing and Communicating Software Security: Enhancing Software Product Health with Architectural Threat Analysis. <i>AHFE International</i>, <i>168</i>. <a href=\"https://doi.org/10.54941/ahfe1006145\">https://doi.org/10.54941/ahfe1006145</a>"},"intvolume":"       168","year":"2025","author":[{"last_name":"Strüwer","full_name":"Strüwer, Jan-niclas","first_name":"Jan-niclas"},{"first_name":"Roman","id":"49934","full_name":"Trentinaglia, Roman","last_name":"Trentinaglia","orcid":"0000-0001-9728-4991"},{"last_name":"Wohlers","full_name":"Wohlers, Benedict","id":"53786","first_name":"Benedict"},{"first_name":"Eric","id":"59256","full_name":"Bodden, Eric","last_name":"Bodden","orcid":"0000-0003-3470-3647"},{"first_name":"Roman","full_name":"Dumitrescu, Roman","id":"16190","last_name":"Dumitrescu"}],"date_created":"2025-07-10T06:37:42Z","volume":168,"publisher":"AHFE International","date_updated":"2025-07-10T06:39:03Z","doi":"10.54941/ahfe1006145","title":"Assessing and Communicating Software Security: Enhancing Software Product Health with Architectural Threat Analysis"},{"_id":"59601","user_id":"49934","department":[{"_id":"241"},{"_id":"662"}],"language":[{"iso":"eng"}],"type":"misc","abstract":[{"lang":"eng","text":"Modern vehicles are becoming more connected and autonomous, and more software-defined in general. Such connectivity leads to security risks due to the increased attack surface for external intrusions. In addition, attacks can also lead to safety hazards as cars contain multiple safety-critical components. Therefore both safety and security must be considered in combination. In this whitepaper, we describe a tool-supported analysis method aligned with automotive standards to identify safety and security dependencies and automatically derive corresponding test cases. These test cases can be imported into the existing dSPACE tool chain to improve efficiency by reducing time-consuming manual work and susceptibility to errors. Thereby, our method brings together system design and testing phases to pave the way for an integrated safety and security-by-design life cycle in the automotive domain."}],"status":"public","date_updated":"2025-04-16T09:30:29Z","publisher":"dSPACE GmbH","author":[{"first_name":"Roman","orcid":"0000-0001-9728-4991","last_name":"Trentinaglia","full_name":"Trentinaglia, Roman","id":"49934"},{"first_name":"Markus","last_name":"Fockel","orcid":"0000-0002-1269-0702","id":"8472","full_name":"Fockel, Markus"},{"first_name":"Matthias","last_name":"Pukrop","full_name":"Pukrop, Matthias"},{"first_name":"Tobias","last_name":"Schaeffer","full_name":"Schaeffer, Tobias"}],"date_created":"2025-04-16T09:30:13Z","title":"Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing","main_file_link":[{"url":"https://www.iem.fraunhofer.de/content/dam/iem/dokumente/termine/whitepaper_safety-and-security_06_240527_e-v11.pdf"}],"publication_status":"published","related_material":{"link":[{"url":"https://www.iem.fraunhofer.de/de/newsroom/presse-und-news/fraunhofer-iem-dspace-veroeffentlichen-whitepaper.html","relation":"other"}]},"year":"2024","citation":{"apa":"Trentinaglia, R., Fockel, M., Pukrop, M., &#38; Schaeffer, T. (2024). <i>Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing</i>. dSPACE GmbH.","mla":"Trentinaglia, Roman, et al. <i>Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing</i>. dSPACE GmbH, 2024.","short":"R. Trentinaglia, M. Fockel, M. Pukrop, T. Schaeffer, Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing, dSPACE GmbH, 2024.","bibtex":"@book{Trentinaglia_Fockel_Pukrop_Schaeffer_2024, title={Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing}, publisher={dSPACE GmbH}, author={Trentinaglia, Roman and Fockel, Markus and Pukrop, Matthias and Schaeffer, Tobias}, year={2024} }","chicago":"Trentinaglia, Roman, Markus Fockel, Matthias Pukrop, and Tobias Schaeffer. <i>Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing</i>. dSPACE GmbH, 2024.","ieee":"R. Trentinaglia, M. Fockel, M. Pukrop, and T. Schaeffer, <i>Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing</i>. dSPACE GmbH, 2024.","ama":"Trentinaglia R, Fockel M, Pukrop M, Schaeffer T. <i>Whitepaper: From HARA and TARA to Risk-Based Safety and Security Dependency Testing</i>. dSPACE GmbH; 2024."},"page":"5"},{"doi":"10.13154/294-12716","title":"Automatically deriving test cases from safety-security dependencies","author":[{"first_name":"Roman","orcid":"0000-0001-9728-4991","last_name":"Trentinaglia","id":"49934","full_name":"Trentinaglia, Roman"},{"orcid":"0000-0002-1269-0702","last_name":"Fockel","id":"8472","full_name":"Fockel, Markus","first_name":"Markus"},{"first_name":"Matthias","full_name":"Pukrop, Matthias","last_name":"Pukrop"},{"full_name":"Schaeffer, Tobias","last_name":"Schaeffer","first_name":"Tobias"}],"date_created":"2024-12-04T14:55:47Z","date_updated":"2025-05-19T09:31:29Z","citation":{"apa":"Trentinaglia, R., Fockel, M., Pukrop, M., &#38; Schaeffer, T. (2024). Automatically deriving test cases from safety-security dependencies. <i>22th Escar Europe : The World’s Leading Automotive Cyber Security Conference : Embedded Security in Cars (Dortmund, 19. - 20.11.2024)</i>. <a href=\"https://doi.org/10.13154/294-12716\">https://doi.org/10.13154/294-12716</a>","mla":"Trentinaglia, Roman, et al. “Automatically Deriving Test Cases from Safety-Security Dependencies.” <i>22th Escar Europe : The World’s Leading Automotive Cyber Security Conference : Embedded Security in Cars (Dortmund, 19. - 20.11.2024)</i>, 2024, doi:<a href=\"https://doi.org/10.13154/294-12716\">10.13154/294-12716</a>.","short":"R. Trentinaglia, M. Fockel, M. Pukrop, T. Schaeffer, in: 22th Escar Europe : The World’s Leading Automotive Cyber Security Conference : Embedded Security in Cars (Dortmund, 19. - 20.11.2024), 2024.","bibtex":"@inproceedings{Trentinaglia_Fockel_Pukrop_Schaeffer_2024, title={Automatically deriving test cases from safety-security dependencies}, DOI={<a href=\"https://doi.org/10.13154/294-12716\">10.13154/294-12716</a>}, booktitle={22th escar Europe : The World’s Leading Automotive Cyber Security Conference : Embedded Security in Cars (Dortmund, 19. - 20.11.2024)}, author={Trentinaglia, Roman and Fockel, Markus and Pukrop, Matthias and Schaeffer, Tobias}, year={2024} }","ama":"Trentinaglia R, Fockel M, Pukrop M, Schaeffer T. Automatically deriving test cases from safety-security dependencies. In: <i>22th Escar Europe : The World’s Leading Automotive Cyber Security Conference : Embedded Security in Cars (Dortmund, 19. - 20.11.2024)</i>. ; 2024. doi:<a href=\"https://doi.org/10.13154/294-12716\">10.13154/294-12716</a>","chicago":"Trentinaglia, Roman, Markus Fockel, Matthias Pukrop, and Tobias Schaeffer. “Automatically Deriving Test Cases from Safety-Security Dependencies.” In <i>22th Escar Europe : The World’s Leading Automotive Cyber Security Conference : Embedded Security in Cars (Dortmund, 19. - 20.11.2024)</i>, 2024. <a href=\"https://doi.org/10.13154/294-12716\">https://doi.org/10.13154/294-12716</a>.","ieee":"R. Trentinaglia, M. Fockel, M. Pukrop, and T. Schaeffer, “Automatically deriving test cases from safety-security dependencies,” 2024, doi: <a href=\"https://doi.org/10.13154/294-12716\">10.13154/294-12716</a>."},"year":"2024","language":[{"iso":"eng"}],"user_id":"49934","department":[{"_id":"241"},{"_id":"662"}],"_id":"57578","status":"public","type":"conference","publication":"22th escar Europe : The World’s Leading Automotive Cyber Security Conference : Embedded Security in Cars (Dortmund, 19. - 20.11.2024)"},{"citation":{"chicago":"Trentinaglia, Roman, Sven Merschjohann, Markus Fockel, and Hendrik Eikerling. “Eliciting Security Requirements – An Experience Report.” In <i>REFSQ 2023: Requirements Engineering: Foundation for Software Quality</i>. Cham: Springer Nature Switzerland, 2023. <a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">https://doi.org/10.1007/978-3-031-29786-1_25</a>.","ieee":"R. Trentinaglia, S. Merschjohann, M. Fockel, and H. Eikerling, “Eliciting Security Requirements – An Experience Report,” 2023, doi: <a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">10.1007/978-3-031-29786-1_25</a>.","ama":"Trentinaglia R, Merschjohann S, Fockel M, Eikerling H. Eliciting Security Requirements – An Experience Report. In: <i>REFSQ 2023: Requirements Engineering: Foundation for Software Quality</i>. Springer Nature Switzerland; 2023. doi:<a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">10.1007/978-3-031-29786-1_25</a>","short":"R. Trentinaglia, S. Merschjohann, M. Fockel, H. Eikerling, in: REFSQ 2023: Requirements Engineering: Foundation for Software Quality, Springer Nature Switzerland, Cham, 2023.","bibtex":"@inproceedings{Trentinaglia_Merschjohann_Fockel_Eikerling_2023, place={Cham}, title={Eliciting Security Requirements – An Experience Report}, DOI={<a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">10.1007/978-3-031-29786-1_25</a>}, booktitle={REFSQ 2023: Requirements Engineering: Foundation for Software Quality}, publisher={Springer Nature Switzerland}, author={Trentinaglia, Roman and Merschjohann, Sven and Fockel, Markus and Eikerling, Hendrik}, year={2023} }","mla":"Trentinaglia, Roman, et al. “Eliciting Security Requirements – An Experience Report.” <i>REFSQ 2023: Requirements Engineering: Foundation for Software Quality</i>, Springer Nature Switzerland, 2023, doi:<a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">10.1007/978-3-031-29786-1_25</a>.","apa":"Trentinaglia, R., Merschjohann, S., Fockel, M., &#38; Eikerling, H. (2023). Eliciting Security Requirements – An Experience Report. <i>REFSQ 2023: Requirements Engineering: Foundation for Software Quality</i>. <a href=\"https://doi.org/10.1007/978-3-031-29786-1_25\">https://doi.org/10.1007/978-3-031-29786-1_25</a>"},"place":"Cham","year":"2023","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783031297854","9783031297861"]},"publication_status":"published","doi":"10.1007/978-3-031-29786-1_25","title":"Eliciting Security Requirements – An Experience Report","date_created":"2023-04-04T12:47:31Z","author":[{"first_name":"Roman","id":"49934","full_name":"Trentinaglia, Roman","last_name":"Trentinaglia","orcid":"0000-0001-9728-4991"},{"first_name":"Sven","last_name":"Merschjohann","full_name":"Merschjohann, Sven","id":"11394"},{"full_name":"Fockel, Markus","id":"8472","last_name":"Fockel","orcid":"0000-0002-1269-0702","first_name":"Markus"},{"first_name":"Hendrik","id":"29279","full_name":"Eikerling, Hendrik","last_name":"Eikerling"}],"publisher":"Springer Nature Switzerland","date_updated":"2023-04-04T12:51:41Z","status":"public","publication":"REFSQ 2023: Requirements Engineering: Foundation for Software Quality","type":"conference","language":[{"iso":"eng"}],"department":[{"_id":"241"},{"_id":"662"}],"user_id":"8472","_id":"43395"},{"publication":"Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development","type":"conference","status":"public","_id":"29847","department":[{"_id":"241"},{"_id":"662"}],"user_id":"49934","language":[{"iso":"eng"}],"publication_status":"published","year":"2022","citation":{"ama":"Fockel M, Schubert D, Trentinaglia R, Schulz H, Kirmair W. Semi-automatic Integrated Safety and Security Analysis for Automotive Systems. In: <i>Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development</i>. SCITEPRESS - Science and Technology Publications; 2022. doi:<a href=\"https://doi.org/10.5220/0010778500003119\">10.5220/0010778500003119</a>","ieee":"M. Fockel, D. Schubert, R. Trentinaglia, H. Schulz, and W. Kirmair, “Semi-automatic Integrated Safety and Security Analysis for Automotive Systems,” 2022, doi: <a href=\"https://doi.org/10.5220/0010778500003119\">10.5220/0010778500003119</a>.","chicago":"Fockel, Markus, David Schubert, Roman Trentinaglia, Hannes Schulz, and Wolfgang Kirmair. “Semi-Automatic Integrated Safety and Security Analysis for Automotive Systems.” In <i>Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development</i>. SCITEPRESS - Science and Technology Publications, 2022. <a href=\"https://doi.org/10.5220/0010778500003119\">https://doi.org/10.5220/0010778500003119</a>.","mla":"Fockel, Markus, et al. “Semi-Automatic Integrated Safety and Security Analysis for Automotive Systems.” <i>Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development</i>, SCITEPRESS - Science and Technology Publications, 2022, doi:<a href=\"https://doi.org/10.5220/0010778500003119\">10.5220/0010778500003119</a>.","bibtex":"@inproceedings{Fockel_Schubert_Trentinaglia_Schulz_Kirmair_2022, title={Semi-automatic Integrated Safety and Security Analysis for Automotive Systems}, DOI={<a href=\"https://doi.org/10.5220/0010778500003119\">10.5220/0010778500003119</a>}, booktitle={Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development}, publisher={SCITEPRESS - Science and Technology Publications}, author={Fockel, Markus and Schubert, David and Trentinaglia, Roman and Schulz, Hannes and Kirmair, Wolfgang}, year={2022} }","short":"M. Fockel, D. Schubert, R. Trentinaglia, H. Schulz, W. Kirmair, in: Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development, SCITEPRESS - Science and Technology Publications, 2022.","apa":"Fockel, M., Schubert, D., Trentinaglia, R., Schulz, H., &#38; Kirmair, W. (2022). Semi-automatic Integrated Safety and Security Analysis for Automotive Systems. <i>Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development</i>. <a href=\"https://doi.org/10.5220/0010778500003119\">https://doi.org/10.5220/0010778500003119</a>"},"publisher":"SCITEPRESS - Science and Technology Publications","date_updated":"2022-02-15T08:14:07Z","date_created":"2022-02-15T08:07:15Z","author":[{"orcid":"0000-0002-1269-0702","last_name":"Fockel","full_name":"Fockel, Markus","id":"8472","first_name":"Markus"},{"id":"9106","full_name":"Schubert, David","last_name":"Schubert","first_name":"David"},{"orcid":"0000-0001-9728-4991","last_name":"Trentinaglia","full_name":"Trentinaglia, Roman","id":"49934","first_name":"Roman"},{"first_name":"Hannes","full_name":"Schulz, Hannes","last_name":"Schulz"},{"first_name":"Wolfgang","last_name":"Kirmair","full_name":"Kirmair, Wolfgang"}],"title":"Semi-automatic Integrated Safety and Security Analysis for Automotive Systems","doi":"10.5220/0010778500003119"},{"date_updated":"2025-05-19T09:32:35Z","publisher":"ACM","author":[{"orcid":"0000-0001-9728-4991","last_name":"Trentinaglia","id":"49934","full_name":"Trentinaglia, Roman","first_name":"Roman"}],"date_created":"2022-12-09T08:50:22Z","title":"Deriving model-based safety and security assurance cases from design rationale of countermeasure patterns","doi":"10.1145/3550356.3558508","publication_status":"published","year":"2022","citation":{"ama":"Trentinaglia R. Deriving model-based safety and security assurance cases from design rationale of countermeasure patterns. In: <i>Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings</i>. ACM; 2022. doi:<a href=\"https://doi.org/10.1145/3550356.3558508\">10.1145/3550356.3558508</a>","ieee":"R. Trentinaglia, “Deriving model-based safety and security assurance cases from design rationale of countermeasure patterns,” 2022, doi: <a href=\"https://doi.org/10.1145/3550356.3558508\">10.1145/3550356.3558508</a>.","chicago":"Trentinaglia, Roman. “Deriving Model-Based Safety and Security Assurance Cases from Design Rationale of Countermeasure Patterns.” In <i>Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings</i>. ACM, 2022. <a href=\"https://doi.org/10.1145/3550356.3558508\">https://doi.org/10.1145/3550356.3558508</a>.","short":"R. Trentinaglia, in: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings, ACM, 2022.","mla":"Trentinaglia, Roman. “Deriving Model-Based Safety and Security Assurance Cases from Design Rationale of Countermeasure Patterns.” <i>Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings</i>, ACM, 2022, doi:<a href=\"https://doi.org/10.1145/3550356.3558508\">10.1145/3550356.3558508</a>.","bibtex":"@inproceedings{Trentinaglia_2022, title={Deriving model-based safety and security assurance cases from design rationale of countermeasure patterns}, DOI={<a href=\"https://doi.org/10.1145/3550356.3558508\">10.1145/3550356.3558508</a>}, booktitle={Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings}, publisher={ACM}, author={Trentinaglia, Roman}, year={2022} }","apa":"Trentinaglia, R. (2022). Deriving model-based safety and security assurance cases from design rationale of countermeasure patterns. <i>Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings</i>. <a href=\"https://doi.org/10.1145/3550356.3558508\">https://doi.org/10.1145/3550356.3558508</a>"},"_id":"34298","user_id":"49934","department":[{"_id":"241"},{"_id":"662"}],"language":[{"iso":"eng"}],"type":"conference","publication":"Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings","status":"public"}]
