Haralambos Mouratidis

According to our database1, Haralambos Mouratidis authored at least 138 papers between 2002 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Mobile recommender systems: Identifying the major concepts.
J. Inf. Sci., 2019

Practical evaluation of a reference architecture for the management of privacy level agreements.
Inf. & Comput. Security, 2019

Apparatus: A framework for security analysis in internet of things systems.
Ad Hoc Networks, 2019

DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019

Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements.
Proceedings of the 13th International Conference on Research Challenges in Information Science, 2019

Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE).
Proceedings of the Engineering Applications of Neural Networks, 2019

2018
A Security Analysis Method for Industrial Internet of Things.
IEEE Trans. Industrial Informatics, 2018

Assurance of Security and Privacy Requirements for Cloud Deployment Models.
IEEE Trans. Cloud Computing, 2018

Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology.
Inf. & Comput. Security, 2018

Risk-aware decision support with constrained goal models.
Inf. & Comput. Security, 2018

Cyber-attack path discovery in a dynamic supply chain maritime risk management system.
Comput. Stand. Interfaces, 2018

From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks.
CoRR, 2018

Towards the Definition of a Security Incident Response Modelling Language.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Evaluating a Reference Architecture for Privacy Level Agreement's Management.
Proceedings of the 12th Mediterranean Conference on Information Systems, 2018

2017
A Method for Privacy-preserving Collaborative Filtering Recommendations.
J. UCS, 2017

Security-aware elasticity for NoSQL databases in multi-cloud environments.
IJIIDS, 2017

Privacy-preserving collaborative recommendations based on random perturbations.
Expert Syst. Appl., 2017

A conceptual model to support security analysis in the internet of things.
Comput. Sci. Inf. Syst., 2017

Attribute-Based Security Verification of Business Process Models.
Proceedings of the 19th IEEE Conference on Business Informatics, 2017

Selecting Security Mechanisms in Secure Tropos.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

ASTo: A tool for security analysis of IoT systems.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

Supporting Privacy by Design Using Privacy Process Patterns.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Security requirements modelling for virtualized 5G small cell networks.
Proceedings of the 24th International Conference on Telecommunications, 2017

A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

Decision-Making in Security Requirements Engineering with Constrained Goal Models.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

A Metamodel for GDPR-based Privacy Level Agreements.
Proceedings of the ER Forum 2017 and the ER 2017 Demo Track co-located with the 36th International Conference on Conceptual Modelling (ER 2017), Valencia, Spain,, 2017

Recommender Systems Meeting Security: From Product Recommendation to Cyber-Attack Prediction.
Proceedings of the Engineering Applications of Neural Networks, 2017

Are Small Cells and Network Intelligence at the Edge the Drivers for 5G Market Adoption? The SESAME Case.
Proceedings of the Engineering Applications of Neural Networks, 2017

A Security Requirements Modelling Language to Secure Cloud Computing Environments.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2017

Privacy Level Agreements for Public Administration Information Systems.
Proceedings of the Forum and Doctoral Consortium Papers Presented at the 29th International Conference on Advanced Information Systems Engineering, 2017

Supporting Secure Business Process Design via Security Process Patterns.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2017

Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017

A Holistic Approach for Privacy Protection in E-Government.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
A survey on cloud forensics challenges and solutions.
Security and Communication Networks, 2016

An information security risk-driven investment model for analysing human factors.
Inf. & Comput. Security, 2016

Online Analysis of Security Risks in Elastic Cloud Applications.
IEEE Cloud Computing, 2016

Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments.
Proceedings of the Information Security Theory and Practice, 2016

Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

Modelling Secure Cloud Computing Systems from a Security Requirements Perspective.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Incorporating privacy patterns into semi-automatic business process derivation.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

System architecture and deployment scenarios for SESAME: Small cEllS coodinAtion for Multi-tenancy and Edge services.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

Security Alignment Analysis of Software Product Lines.
Proceedings of the 4th International Conference on Enterprise Systems, 2016

Apparatus: Reasoning About Security Requirements in the Internet of Things.
Proceedings of the Advanced Information Systems Engineering Workshops, 2016

Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach.
Proceedings of the Domain-Specific Conceptual Modeling, Concepts, Methods and Tools, 2016

2015
Empirical evaluation of a cloud computing information security governance framework.
Inf. Softw. Technol., 2015

Privacy as an Integral Part of the Implementation of Cloud Solutions.
Comput. J., 2015

Cloud Security Audit for Migration and Continuous Monitoring.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Modelling secure cloud systems based on system requirements.
Proceedings of the 2nd IEEE Workshop on Evolving Security and Privacy Requirements Engineering, 2015

Security-Aware Elasticity for NoSQL Databases.
Proceedings of the Model and Data Engineering - 5th International Conference, 2015

Eliciting Security Requirements for Business Processes of Legacy Systems.
Proceedings of the Practice of Enterprise Modeling, 2015

A Framework for Cloud Security Audit.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Conflicts Between Security and Privacy Measures in Software Requirements Engineering.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Managing Social Engineering Attacks- Considering Human Factors and Security Investment.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

Towards the Derivation of Secure Business Process Designs.
Proceedings of the Advances in Conceptual Modeling, 2015

Visually Mapping Requirements Models to Cloud Services.
Proceedings of the 21st International Conference on Distributed Multimedia Systems, Vancouver, Canada, August 31, 2015

A Meta-model for Assisting a Cloud Forensics Process.
Proceedings of the Risks and Security of Internet and Systems, 2015

Addressing Privacy and Trust Issues in Cultural Heritage Modelling.
Proceedings of the Risks and Security of Internet and Systems, 2015

Towards the Development of a Cloud Forensics Methodology: A Conceptual Model.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

A Framework for Secure Migration Processes of Legacy Systems to the Cloud.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

2014
An empirical study on the implementation and evaluation of a goal-driven software development risk management model.
Inf. Softw. Technol., 2014

Modeling Trust Relationships for Developing Trustworthy Information Systems.
IJISMD, 2014

Secure Tropos framework for software product lines requirements engineering.
Comput. Stand. Interfaces, 2014

Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts.
Comput. Stand. Interfaces, 2014

A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
Taxonomy of quality metrics for assessing assurance of security correctness.
Software Quality Journal, 2013

Evaluating cloud deployment scenarios based on security and privacy requirements.
Requir. Eng., 2013

A framework to support selection of cloud providers based on security and privacy requirements.
Journal of Systems and Software, 2013

Selecting a Cloud Service Provider in the age of cybercrime.
Comput. Secur., 2013

Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Migrating into the Cloud: Identifying the Major Security and Privacy Concerns.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

Using Security and Domain Ontologies for Security Requirements Analysis.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
Aligning Security and Privacy to Support the Development of Secure Information Systems.
J. UCS, 2012

Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management.
J. UCS, 2012

Appraisal and reporting of security assurance at operational systems level.
Journal of Systems and Software, 2012

Preface.
Inf. Syst., 2012

Modelling Security Using Trust Based Concepts.
IJSSE, 2012

Model Based Process to Support Security and Privacy Requirements Engineering.
IJSSE, 2012

Dealing with trust and control: A meta-model for trustworthy information systems development.
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012

Extracting security requirements from relevant laws and regulations.
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012

A Meta-model for Legal Compliance and Trustworthiness of Information Systems.
Proceedings of the Advanced Information Systems Engineering Workshops, 2012

A Model Transformation from Misuse Cases to Secure Tropos.
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012

2011
A framework to support alignment of secure software engineering with legal regulations.
Software and Systems Modeling, 2011

Secure Software Systems Engineering: The Secure Tropos Approach (Invited Paper).
JSW, 2011

Secure by Design: Developing Secure Software Systems from the Ground Up.
IJSSE, 2011

Security Assurance Evaluation and IT Systems' Context of Use Security Criticality.
IJHCR, 2011

A Modelling Framework to Support Internal Control.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos.
Proceedings of the IS Olympics: Information Systems in a Diverse World, 2011

A new approach to evaluating security assurance.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
An architectural description language for secure Multi-Agent Systems.
Web Intelligence and Agent Systems, 2010

Guest editorial: security requirements engineering: past, present and future.
Requir. Eng., 2010

Practitioner's challenges in designing trust into online systems.
JTAER, 2010

Using a Situational Method Engineering Approach to Identify Reusable Method Fragments from the Secure TROPOS Methodology.
Journal of Object Technology, 2010

From goal-driven security requirements engineering to secure design.
Int. J. Intell. Syst., 2010

An Agent-Based System to Support Assurance of Security Requirements.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Information Systems Security Criticality and Assurance Evaluation.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2010

2009
Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems.
Proceedings of the Safety and Security in Multiagent Systems, 2009

FAML: A Generic Metamodel for MAS Development.
IEEE Trans. Software Eng., 2009

A security-aware metamodel for multi-agent systems (MAS).
Inf. Softw. Technol., 2009

A Risk Based Approach for Security Assurance Evaluation of IT Systems.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects.
Proceedings of the Advanced Information Systems Engineering, 21st International Conference, 2009

2008
Management versus security specialists: an empirical study on security related perceptions.
Inf. Manag. Comput. Security, 2008

Selecting Security Patterns that Fulfill Security Requirements.
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008

Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructures on a VoIP Service.
Proceedings of the NTMS 2008, 2008

Curriculum for Modeling Security: Experiences and Lessons Learned.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

A Language for Modelling Trust in Information Systems.
Proceedings of the Information Systems Development, 2008

Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development.
Proceedings of the Advanced Information Systems Engineering, 20th International Conference, 2008

2007
Security Attack Testing (SAT) - testing the security of information systems at design time.
Inf. Syst., 2007

Secure Tropos: a Security-Oriented Extension of the Tropos Methodology.
International Journal of Software Engineering and Knowledge Engineering, 2007

Information Systems Security: Cases of Network Administrator Threats.
IJISP, 2007

Secure information systems engineering: a manifesto.
IJESDF, 2007

Information Systems Development: A Trust Ontology.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Trust Ontology for Information Systems Development.
Proceedings of the Information Systems Development, 2007

An Agent-Based System to Support Geo-Information Analysis.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

2006
Modeling Secure Systems Using an Agent-oriented Approach and Security Patterns.
International Journal of Software Engineering and Knowledge Engineering, 2006

Reasoning About Willingness in Networks of Agents.
Proceedings of the Software Engineering for Multi-Agent Systems V, 2006

Modeling Delegation through an i*-based Approach.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Towards a Comprehensive Framework for Secure Systems Development.
Proceedings of the Advanced Information Systems Engineering, 18th International Conference, 2006

2005
When security meets software engineering: a case of modelling secure information systems.
Inf. Syst., 2005

Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05).
Comput. Secur., 2005

Patterns for Modelling Agent Systems with Tropos.
Proceedings of the Software Engineering for Multi-Agent Systems IV, 2005

Delegation Mechanisms for Agent Architectural Design.
Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2005

Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems.
Proceedings of the Conceptual Modeling, 2005

A secure architectural description language for agent systems.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

2004
Using Security Attack Scenarios to Analyse Security During Information Systems Design.
Proceedings of the ICEIS 2004, 2004

2003
A Novel Agent-Based System to Support the Single Assessment Process of Older People.
Health Informatics Journal, 2003

Analysis and Design of the eSAP: An Integrated Health and Social Care Information System.
Health Informatics Journal, 2003

Multi-agent Systems and Security Requirements Analysis.
Proceedings of the Software Engineering for Multi-Agent Systems II, 2003

An Ontology for Modelling Security: The Tropos Approach.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003

Analysing Security Requirements of Information Systems Using Tropos.
Proceedings of the ICEIS 2003, 2003

A Set of Patterns for Secure Agent Systems.
Proceedings of the 8th European Conference on Pattern Languages of Programms (EuroPLoP '2003), 2003

Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems.
Proceedings of the Advanced Information Systems Engineering, 15th International Conference, 2003

Modelling secure multiagent systems.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

Modeling Deployment and Mobility Issues in Multiagent Systems Using AUML.
Proceedings of the Agent-Oriented Software Engineering IV, 4th International Workshop, 2003

2002
Using Tropos Methodology to Model an Integrated Health Assessment System.
Proceedings of the AOIS '02, 2002


  Loading...