Golnaz Elahi

According to our database1, Golnaz Elahi authored at least 20 papers between 2005 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Making Trade-offs among Security and Other Requirements during System Design.
PhD thesis, 2012

Comparing alternatives for analyzing requirements trade-offs - In the absence of numerical data.
Inf. Softw. Technol., 2012

2011
Requirements trade-offs analysis in the absence of quantitative measures: a heuristic method.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Security Risk Management by Qualitative Vulnerability Analysis.
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011

Security Requirements Engineering in the Wild: A Survey of Common Practices.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

A Semi-automated Decision Support Tool for Requirements Trade-Off Analysis.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

A Semi-Automated Tool for Requirements Trade-off Analysis.
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011

SD Elements: A Tool for Secure Application Development Management.
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011

2010
A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities.
Requir. Eng., 2010

Automated Generation of Attack Routes for Service Security Analysis - A Preliminary Report.
Proceedings of the 4<sup>th</sup> International <i>i</i>* Workshop, 2010

Service Security Analysis Based on i*: An Approach from the Attacker Viewpoint.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Modeling and analysis of security trade-offs - A goal oriented approach.
Data Knowl. Eng., 2009

Trust Trade-off Analysis for Security Requirements Engineering.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations.
Proceedings of the Conceptual Modeling, 2009

2008
Modeling Knowledge Transfer in a Software Maintenance Organization - An Experience Report and Critical Analysis.
Proceedings of the Practice of Enterprise Modeling, First IFIP WG 8.1 Working Conference, 2008

Reflective Analysis of the Syntax and Semantics of the i* Framework.
Proceedings of the Advances in Conceptual Modeling - Challenges and Opportunities, 2008

Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs.
Proceedings of the Conceptual Modeling, 2007

2005
RUPSec: An Extension on RUP for Developing Secure Systems - Requirements Discipline.
Proceedings of the Second World Enformatika Conference, 2005

RUPSec : Extending Business Modeling and Requirements Disciplines of RUP for Developing Secure Systems.
Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2005), 30 August, 2005


  Loading...