Nazila Gol Mohammadi

Orcid: 0000-0001-9033-1476

According to our database1, Nazila Gol Mohammadi authored at least 31 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Systematic Risk Assessment of Cloud Computing Systems using a Combined Model-based Approach.
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020

Assisted Generation of Privacy Policies using Textual Patterns.
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020

2019
Privacy Policy Specification Framework for Addressing End-Users' Privacy Requirements.
Proceedings of the Trust, Privacy and Security in Digital Business, 2019

Pattern-based incorporation of privacy preferences into privacy policies: negotiating the conflicting needs of service providers and end-users.
Proceedings of the 24th European Conference on Pattern Languages of Programs, 2019

A generic conceptual data model of social media services.
Proceedings of the 24th European Conference on Pattern Languages of Programs, 2019

Systematic Asset Identification and Modeling During Requirements Engineering.
Proceedings of the Risks and Security of Internet and Systems, 2019

Trustworthy Cyber-Physical Systems - A Systematic Framework towards Design and Evaluation of Trust and Trustworthiness
Springer Vieweg, ISBN: 978-3-658-27487-0, 2019

2018
Context Analysis of Cloud Computing Systems Using a Pattern-Based Approach.
Future Internet, 2018

Trustworthiness Cases - Toward Preparation for the Trustworthiness Certification.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Problem-based Derivation of Trustworthiness Requirements from Users' Trust Concerns.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem Diagrams.
Proceedings of the Software Technologies - 13th International Conference, 2018

Supporting the Systematic Goal Refinement in KAOS using the Six-Variable Model.
Proceedings of the 13th International Conference on Software Technologies, 2018

Towards an End-to-End Architecture for Run-Time Data Protection in the Cloud.
Proceedings of the 44th Euromicro Conference on Software Engineering and Advanced Applications, 2018

2017
A Framework for Systematic Refinement of Trustworthiness Requirements.
Inf., 2017

2016
A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

Enhancing Business Process Models with Trustworthiness Requirements.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

Introducing Product Line Engineering in a Bottom-up Approach.
Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - Volume 2: ICSOFT-PT, Lisbon, Portugal, July 24, 2016

Patterns for identification of trust concerns and specification of trustworthiness requirements.
Proceedings of the 21st European Conference on Pattern Languages of Programs, 2016

2015
A Framework for Evaluating the End-to-End Trustworthiness.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Challenges in Rendering and Maintaining Trustworthiness for Long-Living Software Systems.
Proceedings of the Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2015, 2015

A Tool for Monitoring and Maintaining System Thrustworthiness at Runtime.
Proceedings of the Joint Proceedings of REFSQ-2015 Workshops, 2015

Cyber-Physical Systems Design for Runtime Thrustworthiness Maintenance Supported by Tools.
Proceedings of the Joint Proceedings of REFSQ-2015 Workshops, 2015

Evidence-Based Trustworthiness of Internet-Based Services Through Controlled Software Development.
Proceedings of the Cyber Security and Privacy, 2015

Extending Software Development Methodologies to Support Trustworthiness-by-Design.
Proceedings of the CAiSE 2015 Forum at the 27th International Conference on Advanced Information Systems Engineering co-located with 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015

Combining Risk-Management and Computational Approaches for Trustworthiness Evaluation of Socio-Technical Systems.
Proceedings of the CAiSE 2015 Forum at the 27th International Conference on Advanced Information Systems Engineering co-located with 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015

2014
Maintaining Trustworthiness of Socio-Technical Systems at Run-Time.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems - (Extended Abstract).
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

2013
Trustworthy Software Development.
Proceedings of the Communications and Multimedia Security, 2013

Trustworthiness Attributes and Metrics for Engineering Trusted Internet-Based Software Systems.
Proceedings of the Cloud Computing and Services Science - Third International Conference, 2013

An Analysis of Software Quality Attributes and Their Contribution to Trustworthiness.
Proceedings of the CLOSER 2013, 2013

A Framework for Combining Problem Frames and Goal Models to Support Context Analysis during Requirements Engineering.
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013


  Loading...