Search filters

List of works by Haralambos Mouratidis

A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos

A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations

A Dynamic Cyber Security Situational Awareness Framework for Healthcare ICT Infrastructures

scientific article published on 22 February 2022

A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography

scientific article published on 02 February 2022

A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System

A Language for Modelling Trust in Information Systems

scholarly article published 2009

A Meta-model for Legal Compliance and Trustworthiness of Information Systems

A Modelling Framework to Support Internal Control

article published in 2011

A Risk Based Approach for Security Assurance Evaluation of IT Systems

A conceptual model to support security analysis in the internet of things

scientific article published in 2017

A framework to support alignment of secure software engineering with legal regulations

A framework to support selection of cloud providers based on security and privacy requirements

article published in 2013

A new approach to evaluating security assurance

A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems

scientific article published in 2023

A security requirements modelling language for cloud computing environments

scientific article published on 16 October 2019

Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development

article

Advanced Information Systems Engineering Workshops

Advanced Information Systems Engineering Workshops

An Agent-Based System to Support Assurance of Security Requirements

An Agent-Based System to Support Geo-Information Analysis

An empirical study on the implementation and evaluation of a goal-driven software development risk management model

article

An information security risk-driven investment model for analysing human factors

scientific article published in 2016

Apparatus: A framework for security analysis in internet of things systems

scholarly article

Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology

scientific article published in 2018

Appraisal and reporting of security assurance at operational systems level

Author Correction: A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems

scientific article published in 2023

Dealing with trust and control: A meta-model for trustworthy information systems development

article

Delegation Mechanisms for Agent Architectural Design

scholarly article

Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructures on a VoIP Service

scholarly article published November 2008

Empirical evaluation of a cloud computing information security governance framework

scholarly article by Oscar Rebollo et al published February 2015 in Information and Software Technology

Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems

article

Enhancing secure business process design with security process patterns

scientific article published on 13 July 2019

Evaluating cloud deployment scenarios based on security and privacy requirements

Extracting security requirements from relevant laws and regulations

FAML: A Generic Metamodel for MAS Development

article

From goal-driven security requirements engineering to secure design

From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks

scholarly article published on 22 May 2018

Gamification and Serious Games for Cybersecurity Awareness and First Responders Training: An overview

scientific article published on 25 April 2023

Gamification and Serious Games for Cybersecurity Awareness and First Responders Training: An overview

preprint

Guest editorial: security requirements engineering: past, present and future

Information Systems Security Criticality and Assurance Evaluation

Integrating Security and Software Engineering

MODELING SECURE SYSTEMS USING AN AGENT-ORIENTED APPROACH AND SECURITY PATTERNS

Management versus security specialists: an empirical study on security related perceptions

Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern

scientific article published in 2022

Migrating into the Cloud: Identifying the Major Security and Privacy Concerns

Mobile recommender systems: Identifying the major concepts

scholarly article by Elias Pimenidis et al published 3 August 2018 in Journal of Information Science

Model Based Process to Support Security and Privacy Requirements Engineering

scientific article published in 2012

Modeling Delegation through an i*-based Approach

Modelling Security Using Trust Based Concepts

scientific article published in 2012

Modelling Trust Requirements by Means of a Visualization Language

scholarly article published September 2008

Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach

scientific article published on 20 July 2019

OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber Security

scientific article published in 2023

Practical evaluation of a reference architecture for the management of privacy level agreements

scientific article published in 2019

Practitioner's challenges in designing trust into online systems

Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform

scientific article published in 2020

Protecting Citizens’ Personal Data and Privacy: Joint Effort from GDPR EU Cluster Research Projects

scientific article published in 2020

Reasoning about willingness in networks of agents

Risk-aware decision support with constrained goal models

scientific article published in 2018

SECURE TROPOS: A SECURITY-ORIENTED EXTENSION OF THE TROPOS METHODOLOGY

Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05)

Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects

article

Secure Software Systems Engineering: The Secure Tropos Approach (Invited Paper)

article

Secure Tropos framework for software product lines requirements engineering

scholarly article by Daniel Mellado published in June 2014

Secure by Design

scientific article published in 2011

Secure information systems engineering: a manifesto

scientific article published in 2007

Security Assurance Metrics and Aggregation Techniques for IT Systems

Security Attack Testing (SAT)—testing the security of information systems at design time

Security Patterns

Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems

Selecting Security Patterns that Fulfill Security Requirements

Selecting a Cloud Service Provider in the age of cybercrime

scholarly article by Moussa Ouedraogo published in October 2013

Software Engineering for Secure Systems

scholarly article published 2011

Taxonomy of quality metrics for assessing assurance of security correctness

The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations

scientific article published on 16 August 2021

Towards a Comprehensive Framework for Secure Systems Development

article

Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations

Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts

scholarly article by Christos Kalloniatis published in June 2014

Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions

article by Michalis Pavlidis et al published 2013 in Lecture Notes in Computer Science

Using Security and Domain Ontologies for Security Requirements Analysis

When security meets software engineering: a case of modelling secure information systems