Andreas Lothe Opdahl

Last updated

Andreas Lothe Opdahl (born 1964) is a Norwegian computer scientist and Professor of Information Systems Development at the University of Bergen, known for his theory about Security requirements engineering, [1] and for with Guttorm Sindre coining the term Misuse case. [2]

Contents

Life and work

Born in 1964, Opdahl received his M.Sc. in Computer science in 1988 from the Norwegian Institute of Technology (NTNU), where in 1992 he also received his PhD in computer science with the thesis, entitled "Performance engineering during information system development."

In 1985 Opdahl had started working as systems developer. He was lecturer at the Norwegian Institute of Technology from 1988 to 1992. In 1992 he was appointed Professor of Information Systems Development at the University of Bergen in the Department of Information Science and Media Studies. There he also directs the research group for Semantic and Social Information Systems (SSIS).

Selected publications

Books:

Articles, a selection: [3] [4]

Related Research Articles

Software engineering is a systematic engineering approach to software development.

Software development is the process of conceiving, specifying, designing, programming, documenting, testing, and bug fixing involved in creating and maintaining applications, frameworks, or other software components. Software development involves writing and maintaining the source code, but in a broader sense, it includes all processes from the conception of the desired software through to the final manifestation of the software, typically in a planned and structured process. Software development also includes research, new development, prototyping, modification, reuse, re-engineering, maintenance, or any other activities that result in software products.

<span class="mw-page-title-main">Barry Boehm</span> American computer scientist (1935–2022)

Barry William Boehm was an American software engineer, distinguished professor of computer science, industrial and systems engineering; the TRW Professor of Software Engineering; and founding director of the Center for Systems and Software Engineering at the University of Southern California. He was known for his many contributions to the area of software engineering.

<span class="mw-page-title-main">Meta-process modeling</span>

Meta-process modeling is a type of metamodeling used in software engineering and systems engineering for the analysis and construction of models applicable and useful to some predefined problems.

<span class="mw-page-title-main">Process modeling</span>

The term process model is used in various contexts. For example, in business process modeling the enterprise process model is often referred to as the business process model.

<span class="mw-page-title-main">Extended Enterprise Modeling Language</span>

Extended Enterprise Modeling Language (EEML) in software engineering is a modelling language used for Enterprise modelling across a number of layers.

Requirements traceability is a sub-discipline of requirements management within software development and systems engineering. Traceability as a general term is defined by the IEEE Systems and Software Engineering Vocabulary as (1) the degree to which a relationship can be established between two or more products of the development process, especially products having a predecessor-successor or primary-subordinate relationship to one another; (2) the identification and documentation of derivation paths (upward) and allocation or flowdown paths (downward) of work products in the work product hierarchy; (3) the degree to which each element in a software development product establishes its reason for existing; and (4) discernible association among two or more logical entities, such as requirements, system elements, verifications, or tasks.

<span class="mw-page-title-main">Misuse case</span>

Misuse case is a business process modeling tool used in the software development industry. The term Misuse Case or mis-use case is derived from and is the inverse of use case. The term was first used in the 1990s by Guttorm Sindre of the Norwegian University of Science and Technology, and Andreas L. Opdahl of the University of Bergen, Norway. It describes the process of executing a malicious act against a system, while use case can be used to describe any action taken by the system.

Reverse engineering is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accomplishes a task with very little insight into exactly how it does so. It is essentially the process of opening up or dissecting a system to see how it works, in order to duplicate or enhance it. Depending on the system under consideration and the technologies employed, the knowledge gained during reverse engineering can help with repurposing obsolete objects, doing security analysis, or learning how something works.

<span class="mw-page-title-main">View model</span>

A view model or viewpoints framework in systems engineering, software engineering, and enterprise engineering is a framework which defines a coherent set of views to be used in the construction of a system architecture, software architecture, or enterprise architecture. A view is a representation of the whole system from the perspective of a related set of concerns.

A goal model is an element of requirements engineering that may also be used more widely in business analysis. Related elements include stakeholder analysis, context analysis, and scenarios, among other business and technical areas.

John Krogstie is a Norwegian computer scientist, professor in information systems at the Norwegian University of Science and Technology (NTNU) in Trondheim, Norway, and an expert in the field of enterprise modelling.

Colette Rolland is a French computer scientist and Professor of Computer Science in the department of Mathematics and Informatics at the University of Paris 1 Pantheon-Sorbonne, and a leading researcher in the area of information and knowledge systems, known for her work on meta-modeling, particularly goal modelling and situational method engineering.

Jacobus Nicolaas (Sjaak) Brinkkemper is a Dutch computer scientist, and Full Professor of organisation and information at the Department of Information and Computing Sciences of Utrecht University.

<span class="mw-page-title-main">Arne Sølvberg</span> Norwegian computer scientist

Arne Sølvberg is a Norwegian computer scientist, professor in computer science at the Norwegian University of Science and Technology (NTNU) in Trondheim, Norway, and an expert in the field of information modelling.

Opdahl is a Norwegian surname that derives from Old Norse Uppdalr. Notable people with the surname include:

Luigi Logrippo is a Professor of Computer Science at the Université du Québec en Outaouais (UQO). He is the principal researcher of the LOTOS group at the University Of Ottawa. Currently luigi participates in LARSI.

Georgios (George) V. Magklaras is a computer scientist working as a Senior Computer Systems Engineer at the Norwegian Meteorological Institute, in Norway. He also co-founded Steelcyber Scientific, an information security based consultancy specialising in digital forensics. He is a High Performance Computing engineer and information security researcher. He developed methods in the field of insider IT misuse detection and prediction and digital forensics. He is the author of the LUARM and POFR tools for the Linux Operating System. He has been a strong advocate of Linux, Open Source tools and the Perl programming language and has given a series of lectures internationally in the fields of Intrusion Detection Systems, Digital forensics, Bioinformatics, Computer Programming and Systems Administration.

John Mylopoulos is a Greek-Canadian computer scientist, Professor at the University of Toronto, Canada, and at the University of Trento, Italy. He is known for his work in the field of conceptual modeling, specifically the development an agent-oriented software development methodology. called TROPOS.

References

  1. Haley, Charles B., et al. "Security requirements engineering: A framework for representation and analysis." Software Engineering, IEEE Transactions on 34.1 (2008): 133-153.
  2. Alexander, Ian. "Misuse cases: Use cases with hostile intent." IEEE Software 20.1 (2003): 58-66.
  3. Andreas L. Opdahl at DBLP Bibliography Server OOjs UI icon edit-ltr-progressive.svg
  4. Andreas L. Opdahl publications indexed by Google Scholar OOjs UI icon edit-ltr-progressive.svg