To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Andreas Lothe Opdahl

From Wikipedia, the free encyclopedia

Andreas Lothe Opdahl (born 1964) is a Norwegian computer scientist and Professor of Information Systems Development at the University of Bergen, known for his theory about Security requirements engineering,[1] and for with Guttorm Sindre coining the term Misuse case.[2]

Life and work

Born in 1964, Opdahl received his M.Sc. in Computer science in 1988 from the Norwegian Institute of Technology (NTNU), where in 1992 he also received his PhD in computer science with the thesis, entitled "Performance engineering during information system development."

In 1985 Opdahl had started working as systems developer. He was lecturer at the Norwegian Institute of Technology from 1988 to 1992. In 1992 he was appointed Professor of Information Systems Development at the University of Bergen in the Department of Information Science and Media Studies. There he also directs the research group for Semantic and Social Information Systems (SSIS).

Selected publications

Books:

Articles, a selection:[3][4]

  • Sindre, Guttorm, and Andreas L. Opdahl. "Templates for misuse case description." Proceedings of the 7th International Workshop on Requirements Engineering, Foundation for Software Quality (REFSQ'2001), Switzerland. 2001.
  • Opdahl, Andreas L., and Brian Henderson-Sellers. "Ontological evaluation of the UML using the Bunge–Wand–Weber model." Software and systems modeling 1.1 (2002): 43-67.
  • Krogstie, J., Lyytinen, K., Opdahl, A. L., Pernici, B., Siau, K., & Smolander, K. (2004). "Research areas and challenges for mobile information systems." International Journal of Mobile Communications, 2(3), 220-234.
  • Sindre, Guttorm, and Andreas L. Opdahl. "Eliciting security requirements with misuse cases." Requirements engineering 10.1 (2005): 34-44.

References

  1. ^ Haley, Charles B., et al. "Security requirements engineering: A framework for representation and analysis." Software Engineering, IEEE Transactions on 34.1 (2008): 133-153.
  2. ^ Alexander, Ian. "Misuse cases: Use cases with hostile intent." IEEE Software 20.1 (2003): 58-66.
  3. ^ Andreas L. Opdahl at DBLP Bibliography Server Edit this at Wikidata
  4. ^ Andreas L. Opdahl publications indexed by Google Scholar Edit this at Wikidata

External links

This page was last edited on 16 January 2024, at 10:22
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.