BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Austria
1 × Germany
1 × Luxembourg
1 × Portugal
1 × Spain
1 × The Netherlands
2 × France
Collaborated with:
P.Giorgini G.A.Manson J.Jürjens M.Weiss S.Islam S.Wagner A.Sunyaev J.Fox A.Gani R.Matulevicius N.Mayer E.Dubois P.Heymans N.Genon
Talks about:
secur (12) system (7) inform (5) toward (3) requir (3) framework (2) develop (2) analys (2) tropo (2) manag (2)

Person: Haralambos Mouratidis

DBLP DBLP: Mouratidis:Haralambos

Facilitated 2 volumes:

CAiSE 2014Ed
CAiSE 2011Ed

Contributed to:

REFSQ 20102010
CAiSE 20092009
CAiSE 20082008
RE 20082008
CAiSE 20062006
ICEIS v3 20042004
CAiSE 20032003
ICEIS v3 20032003

Wrote 8 papers:

REFSQ-2010-IslamMW #elicitation #framework #privacy #requirements #security #towards
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations (SI, HM, SW), pp. 255–261.
CAiSE-2009-MouratidisSJ #case study #experience #health #information management #lessons learnt
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects (HM, AS, JJ), pp. 231–245.
CAiSE-2008-MatuleviciusMMDHG #adaptation #development #information management #risk management #security
Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development (RM, NM, HM, ED, PH, NG), pp. 541–555.
RE-2008-WeissM #requirements #security
Selecting Security Patterns that Fulfill Security Requirements (MW, HM), pp. 169–172.
CAiSE-2006-MouratidisJF #development #framework #towards
Towards a Comprehensive Framework for Secure Systems Development (HM, JJ, JF), pp. 48–62.
ICEIS-v3-2004-MouratidisGM #design #information management #security #using
Using Security Attack Scenarios to Analyse Security During Information Systems Design (HM, PG, GAM), pp. 10–17.
CAiSE-2003-MouratidisGM #information management #modelling #security #towards
Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems (HM, PG, GAM), pp. 63–78.
ICEIS-v3-2003-MouratidisMGG #information management #requirements #security #using
Analysing Security Requirements of Information Systems Using Tropos (HM, GAM, AG, PG), pp. 623–626.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.