Arosha K. Bandara

According to our database1, Arosha K. Bandara authored at least 65 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
An anatomy of security conversations in stack overflow.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Society, 2019

Talking about security with professional developers.
Proceedings of the Joint 7th International Workshop on Conducting Empirical Studies in Industry and 6th International Workshop on Software Engineering Research and Industrial Practice, 2019

"Hopefully we are mostly secure": views on secure code in professional practice.
Proceedings of the 12th International Workshop on Cooperative and Human Aspects of Software Engineering, 2019

2018
Feature-Driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things.
TCPS, 2018

Requirements and specifications for adaptive security: concepts and analysis.
Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 2018

An investigation of security conversations in stack overflow: perceptions of security and community involvement.
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018

2017
Visual Simple Transformations: Empowering End-Users to Wire Internet of Things Objects.
ACM Trans. Comput.-Hum. Interact., 2017

Logging you, Logging me: A Replicable Study of Privacy and Sharing Behaviour in Groups of Visual Lifeloggers.
IMWUT, 2017

Valorising the IoT Databox: creating value for everyone.
Trans. Emerging Telecommunications Technologies, 2017

Identifying Conflicting Requirements in Systems of Systems.
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017

Learning to share: engineering adaptive decision-support for online social networks.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Enabling End-Users to Protect their Privacy.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Engineering Adaptive Model-Driven User Interfaces.
IEEE Trans. Software Eng., 2016

Protecting Privacy in the Cloud: Current Practices, Future Directions.
IEEE Computer, 2016

Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms.
Proceedings of the 6th International Conference on the Internet of Things, 2016

Privacy dynamics: learning privacy norms for social software.
Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2016

Wearables for physical privacy.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Towards a framework for managing inconsistencies in systems of systems.
Proceedings of the International Colloquium on Software-intensive Systems-of-Systems at 10th European Conference on Software Architecture, 2016

Privacy Itch and Scratch: On Body Privacy Warnings and Controls.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
"Why can't I do that?": Tracing Adaptive Security Decisions.
EAI Endorsed Trans. Self-Adaptive Systems, 2015

Teaching Software Systems Thinking at The Open University.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Managing Security Control Assumptions Using Causal Traceability.
Proceedings of the 8th IEEE/ACM International Symposium on Software and Systems Traceability, 2015

2014
Adaptive Model-Driven User Interface Development Systems.
ACM Comput. Surv., 2014

Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Distilling privacy requirements for mobile applications.
Proceedings of the 36th International Conference on Software Engineering, 2014

Requirements-driven mediation for collaborative security.
Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2014

Integrating adaptive user interface capabilities in enterprise applications.
Proceedings of the 36th International Conference on Software Engineering, 2014

Personal informatics for non-geeks: lessons learned from ordinary people.
Proceedings of the 2014 ACM Conference on Ubiquitous Computing, 2014

Traceability for Adaptive Information Security in the Cloud.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Educating the Internet-of-Things Generation.
IEEE Computer, 2013

Cedar studio: an IDE supporting adaptive model-driven user interfaces for enterprise applications.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2013

Crowdsourcing user interface adaptations for minimizing the bloat in enterprise applications.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2013

RBUIS: simplifying enterprise application user interfaces through engineering role-based adaptive behavior.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2013

Preserving Designer Input on Concrete User Interfaces Using Constraints While Maintaining Adaptive Behavior.
Proceedings of the Workshop on Context-Aware Adaptation of Service Front-Ends, 2013

2012
Engineering Autonomic Systems (EASy) (NII Shonan Meeting 2012-3).
NII Shonan Meet. Rep., 2012

Analysing monitoring and switching problems for adaptive systems.
Journal of Systems and Software, 2012

Teaching cybersecurity at a distance.
Inroads, 2012

Starting with Ubicomp: using the senseboard to introduce computing.
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012

Privacy arguments: Analysing selective disclosure requirements for mobile applications.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012

Using Interpreted Runtime Models for Devising Adaptive User Interfaces of Enterprise Applications.
Proceedings of the ICEIS 2012 - Proceedings of the 14th International Conference on Enterprise Information Systems, Volume 3, Wroclaw, Poland, 28 June, 2012

2011
PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications.
Proceedings of the POLICY 2011, 2011

From Model-Driven Software Development Processes to Problem Diagnoses at Runtime.
Proceedings of the Models@run.time - Foundations, Applications, and Roadmaps [Dagstuhl Seminar 11481, November 27, 2011

In the best families: tracking and relationships.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Commentary on 'Software architectures and mobility: A Roadmap'.
Journal of Systems and Software, 2010

On the impact of real-time feedback on users' behaviour in mobile location-sharing applications.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

"Privacy-shake", : a haptic interface for managing privacy settings in mobile location sharing applications.
Proceedings of the 12th Conference on Human-Computer Interaction with Mobile Devices and Services, 2010

ContraVision: presenting contrasting visions of future technology.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Contravision: exploring users' reactions to futuristic technology.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Policy conflict analysis for diffserv quality of service management.
IEEE Trans. Network and Service Management, 2009

Studying location privacy in mobile applications: 'predator vs. prey' probes.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Using argumentation logic for firewall configuration management.
Proceedings of the Integrated Network Management, 2009

Learning Rules from User Behaviour.
Proceedings of the Artificial Intelligence Applications and Innovations III, 2009

From spaces to places: emerging contexts in mobile privacy.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

Expressive policy analysis with enhanced system dynamicity.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
A formal logic approach to firewall packet filtering analysis and generation.
Artif. Intell. Rev., 2008

2007
Towards Learning Privacy Policies.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

2006
Policy refinement for IP differentiated services Quality of Service management.
IEEE Trans. Network and Service Management, 2006

Dynamic Policy Analysis and Conflict Resolution for DiffServ Quality of Service Management.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Using Argumentation Logic for Firewall Policy Specification and Analysis.
Proceedings of the Large Scale Management of Distributed Systems, 2006

2005
A formal approach to analysis and refinement of policies.
PhD thesis, 2005

Policy Conflict Analysis for Quality of Service Management.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Policy refinement for DiffServ quality of service management.
Proceedings of the Integrated Network Management, 2005

2004
A Goal-based Approach to Policy Refinement.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

2003
Using Event Calculus to Formalise Policy Specification and Analysis.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003


  Loading...