Raimundas Matulevicius

Orcid: 0000-0002-1829-4794

Affiliations:
  • University of Tartu, Estonia


According to our database1, Raimundas Matulevicius authored at least 133 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-based ontology driven reference framework for security risk management.
Data Knowl. Eng., January, 2024

Create your own MUSE: A method for updating security level evaluation instruments.
Comput. Stand. Interfaces, January, 2024

2023
Tool-supported method for privacy analysis of a business process model.
J. Inf. Secur. Appl., August, 2023

Evaluation of a Legally Binding Smart-Contract Language for Blockchain Applications.
J. Univers. Comput. Sci., July, 2023

Addressing insider attacks via forensic-ready risk management.
J. Inf. Secur. Appl., March, 2023

On the Shift to Decentralised Identity Management in Distributed Data Exchange Systems.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

A Model of Qualitative Factors in Forensic-Ready Software Systems.
Proceedings of the Research Challenges in Information Science: Information Science and the Connected World, 2023

Developing a Blueprint for Vocational Qualification of Blockchain Specialists Under the European CHAISE Initiative.
Proceedings of the Systems, Software and Services Process Improvement, 2023

A Case Study on the Impact of Forensic-Ready Information Systems on the Security Posture.
Proceedings of the Advanced Information Systems Engineering, 2023

Towards Healthcare Digital Twin Architecture.
Proceedings of the Perspectives in Business Informatics Research, 2023

A Decentralised Public Key Infrastructure for X-Road.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Blockchain-Based Digital Twins: Research Trends, Issues, and Future Challenges.
ACM Comput. Surv., January, 2022

Multi-level privacy analysis of business processes: the Pleak toolset.
Int. J. Softw. Tools Technol. Transf., 2022

Privacy-preserving solution for vehicle parking services complying with EU legislation.
PeerJ Comput. Sci., 2022

Information Security Risks Analysis and Assessment in the Passenger-Autonomous Vehicle Interaction.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Ontological Representation of Healthcare Application Security Using Blockchain Technology.
Informatica, 2022

Forensic-Ready Risk Management Concepts.
CoRR, 2022

Security Attacks and Solutions for Digital Twins.
CoRR, 2022

Towards Situational Aware Cyber-Physical Systems: A Security-Enhancing Use Case of Blockchain-based Digital Twins.
CoRR, 2022

Towards situational aware cyber-physical systems: A security-enhancing use case of blockchain-based digital twins.
Comput. Ind., 2022

HArMoNICS: High-Assurance Microgrid Network Infrastructure Case Study.
IEEE Access, 2022

Method for Evaluating Information Security Level in Organisations.
Proceedings of the Research Challenges in Information Science, 2022

Integrating Hackathons into an Online Cybersecurity Course.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering Education and Training, 2022

BPMN4FRSS: An BPMN Extension to Support Risk-Based Development of Forensic-Ready Software Systems.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2022

Business Process Model and Notation for Forensic-Ready Software Systems.
Proceedings of the 17th International Conference on Evaluation of Novel Approaches to Software Engineering, 2022

Scenarios for Process-Aware Insider Attack Detection in Manufacturing.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Security Risk Management in Shared Mobility Integration.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Securing Cyber-Physical Systems Through Blockchain-Based Digital Twins and Threat Intelligence.
CoRR, 2021

BlockNet Report: Exploring the Blockchain Skills Concept and Best Practice Use Cases.
CoRR, 2021

BlockNet Report: Curriculum Guidance Document.
CoRR, 2021

Post-Quantum Era Privacy Protection for Intelligent Infrastructures.
IEEE Access, 2021

Exploring Sybil and Double-Spending Risks in Blockchain Systems.
IEEE Access, 2021

Survey of Model-Driven Engineering Techniques for Blockchain-Based Applications.
Proceedings of the Forum at Practice of Enterprise Modeling 2021 (PoEM-Forum 2021) (PoEM 2021), 2021

Securing an MQTT-based Traffic Light Perception System for Autonomous Driving.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Security Risk Estimation and Management in Autonomous Driving Vehicles.
Proceedings of the Intelligent Information Systems - CAiSE Forum 2021, Melbourne, VIC, Australia, June 28, 2021

Blockchain as a Countermeasure Solution for Security Threats of Healthcare Applications.
Proceedings of the Business Process Management: Blockchain and Robotic Process Automation Forum, 2021

Development of the Information Security Management System Standard for Public Sector Organisations in Estonia.
Proceedings of the 24th International Conference on Business Information Systems, 2021

Risk-Oriented Design Approach For Forensic-Ready Software Systems.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Information Security Analysis in the Passenger-Autonomous Vehicle Interaction.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Interdisciplinary Blockchain Education: Utilizing Blockchain Technology From Various Perspectives.
Frontiers Blockchain, 2020

Corda Security Ontology: Example of Post-Trade Matching and Confirmation.
Balt. J. Mod. Comput., 2020

Security Risk Management in E-commerce Systems: A Threat-driven Approach.
Balt. J. Mod. Comput., 2020

Developing and Evaluating a Hackathon Approach to Foster Cyber Security Learning.
Proceedings of the Collaboration Technologies and Social Computing, 2020

A Method for Managing GDPR Compliance in Business Processes.
Proceedings of the Advanced Information Systems Engineering, 2020

Blockchain Oracles: A Framework for Blockchain-Based Applications.
Proceedings of the Business Process Management: Blockchain and Robotic Process Automation Forum, 2020

Managing Security Risks in Post-Trade Matching and Confirmation Using CorDapp.
Proceedings of the Databases and Information Systems, 2020

2019
Privacy-enhanced BPMN: enabling data privacy analysis in business processes models.
Softw. Syst. Model., 2019

Business Process Privacy Analysis in Pleak - (Extended Abstract).
Inform. Spektrum, 2019

Selected Topics on Business Informatics Research: Introduction to Issue 21 of CSIMQ.
Complex Syst. Informatics Model. Q., 2019

Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns.
Comput. Secur., 2019

Security Risk Management in Cooperative Intelligent Transportation Systems: A Systematic Literature Review.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2019 Conferences, 2019

Business Process Privacy Analysis in Pleak.
Proceedings of the Fundamental Approaches to Software Engineering, 2019

Blockchain-Based Application Security Risks: A Systematic Literature Review.
Proceedings of the Advanced Information Systems Engineering Workshops, 2019

Comparison of Blockchain-Based Solutions to Mitigate Data Tampering Security Risk.
Proceedings of the Business Process Management: Blockchain and Central and Eastern Europe Forum, 2019

Combining Information Security Risk Management and Probabilistic Risk Assessment.
Proceedings of the Joint Proceedings of the BIR 2019 Workshops and Doctoral Consortium co-located with 18th International Conference on Perspectives in Business Informatics Research (BIR 2019), 2019

2018
Security Requirements Elicitation from Airline Turnaround Processes.
Bus. Inf. Syst. Eng., 2018

An Empirical Evaluation of the Requirements Engineering Tool for Socio-Technical Systems.
Proceedings of the 7th IEEE International Workshop on Empirical Requirements Engineering, 2018

Conceptual Representation of the GDPR: Model and Application Directions.
Proceedings of the Perspectives in Business Informatics Research, 2018

A Coarse-Grained Comparison of BPMN Extensions for Security Requirements Modelling.
Proceedings of the Joint Proceedings of the BIR 2018 Short Papers, 2018

Towards the Reference Model for Security Risk Management in Internet of Things.
Proceedings of the Databases and Information Systems, 2018

Application of the Reference Model for Security Risk Management in the Internet of Things Systems.
Proceedings of the Databases and Information Systems X, 2018

2017
Assessment of Aviation Security Risk Management for Airline Turnaround Processes.
Trans. Large Scale Data Knowl. Centered Syst., 2017

A Framework for Assessing Organisational IT Governance, Risk and Compliance.
Proceedings of the Software Process Improvement and Capability Determination, 2017

A Comprehensive Reference Model for Blockchain-based Distributed Ledger Technology.
Proceedings of the ER Forum 2017 and the ER 2017 Demo Track co-located with the 36th International Conference on Conceptual Modelling (ER 2017), Valencia, Spain,, 2017

An Approach to Capture Role-Based Access Control Models from Spring Web Applications.
Proceedings of the 21st IEEE International Enterprise Distributed Object Computing Conference, 2017

PE-BPMN: Privacy-Enhanced Business Process Model and Notation.
Proceedings of the Business Process Management - 15th International Conference, 2017

Fundamentals of Secure System Modelling
Springer, ISBN: 978-3-319-61716-9, 2017

2016
Modelling families of business process variants: A decomposition driven method.
Inf. Syst., 2016

Selected Topics on Business Informatics Research: Editorial Introduction to Issue 6 of CSIMQ.
Complex Syst. Informatics Model. Q., 2016

Criteria and Heuristics for Business Process Model Decomposition - Review and Comparative Evaluation.
Bus. Inf. Syst. Eng., 2016

Securing Airline-Turnaround Processes Using Security Risk-Oriented Patterns.
Proceedings of the Practice of Enterprise Modeling, 2016

Security Risk Management in the Aviation Turnaround Sector.
Proceedings of the Future Data and Security Engineering - Third International Conference, 2016

A Coarse-Grained Comparison of Modelling Languages for Business Motivation and Intentional Distribution.
Proceedings of the Perspectives in Business Informatics Research, 2016

Application of the Enterprise Model Frame for Security Requirements and Control Identification.
Proceedings of the Databases and Information Systems IX, 2016

The Enterprise Model Frame for Supporting Security Requirement Elicitation from Business Processes.
Proceedings of the Databases and Information Systems, 2016

2015
Selected Topics on Enterprise and Automated Systems: Editorial Introduction to Issue 4 of CSIMQ.
Complex Syst. Informatics Model. Q., 2015

A Model-driven Role-based Access Control for SQL Databases.
Complex Syst. Informatics Model. Q., 2015

Pattern-Based Security Requirements Derivation from Secure Tropos Models.
Proceedings of the Practice of Enterprise Modeling, 2015

An Experience Report of Improving Business Process Compliance Using Security Risk-Oriented Patterns.
Proceedings of the Practice of Enterprise Modeling, 2015

Integration of IT-Security Aspects into Information Demand Analysis and Patterns.
Proceedings of the Joint Proceedings of the BIR 2015 Workshops and Doctoral Consortium co-located with 14th International Conference on Perspectives in Business Informatics Research (BIR 2015), 2015

Refining Security Requirement Elicitation from Business Processes using Method Engineering.
Proceedings of the Joint Proceedings of the BIR 2015 Workshops and Doctoral Consortium co-located with 14th International Conference on Perspectives in Business Informatics Research (BIR 2015), 2015

2014
Securing business processes using security risk-oriented patterns.
Comput. Stand. Interfaces, 2014

SREBP: Security Requirement Elicitation from Business Processes.
Proceedings of the Joint Proceedings of REFSQ-2014 Workshops, 2014

Model Comprehension and Stakeholder Appropriateness of Security Risk-Oriented Modelling Languages.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2014

Presentation and Validation of Method for Security Requirements Elicitation from Business Processes.
Proceedings of the Information Systems Engineering in Complex Environments, 2014

A Method for Eliciting Security Requirements from the Business Process Models.
Proceedings of the Joint Proceedings of the CAiSE 2014 Forum and CAiSE 2014 Doctoral Consortium co-located with the 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), 2014

2013
Eliciting Security Requirements from the Business Processes Using Security Risk-Oriented Patterns.
it Inf. Technol., 2013

An Extension of Business Process Model and Notation for Security Risk Management.
Int. J. Inf. Syst. Model. Des., 2013

Second Workshop on Security in Business Processes - A workshop report.
Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., 2013

Workshop on Security in Business Processes - A workshop report.
Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model., 2013

A taxonomy for assessing security in business process modelling.
Proceedings of the IEEE 7th International Conference on Research Challenges in Information Science, 2013

Empirical Analysis of the Test Maturity Model Integration (TMMi).
Proceedings of the Information and Software Technologies - 19th International Conference, 2013

Decomposition Driven Consolidation of Process Models.
Proceedings of the Advanced Information Systems Engineering, 2013

Short Paper: Role-Based Access Control for Securing Dynamically Created Documents.
Proceedings of the Business Process Management Workshops, 2013

2012
Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management.
J. Univers. Comput. Sci., 2012

Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks.
Int. J. Secur. Softw. Eng., 2012

An ontology for enterprise and information systems modelling.
Appl. Ontology, 2012

Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2012

Identifying and Classifying Variations in Business Processes.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2012

Towards Definition of Secure Business Processes.
Proceedings of the Advanced Information Systems Engineering Workshops, 2012

A Model Transformation from Misuse Cases to Secure Tropos.
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012

An Evaluation Framework for Software Test Management Tools.
Proceedings of the Databases and Information Systems VII, 2012

2011
An approach to assess and compare quality of security models.
Comput. Sci. Inf. Syst., 2011

Towards transformation guidelines from secure tropos to misuse cases (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

2010
Visual syntax does matter: improving the cognitive effectiveness of the <i>i</i>* visual notation.
Requir. Eng., 2010

The Unified Enterprise Modelling Language - Overview and further work.
Comput. Ind., 2010

Validity of the Documentation Availability Model: Experimental Definition of Quality Interpretation.
Proceedings of the Advanced Information Systems Engineering, 22nd International Conference, 2010

Towards Model Transformation between SecureUML and UMLsec for Role-based Access Control.
Proceedings of the Databases and Information Systems VI, 2010

Comparing Quality of Security Models: A Case Study.
Proceedings of the Local Proceedings of the Fourteenth East-European Conference on Advances in Databases and Information Systems, 2010

A Systematic Approach to Define the Domain of Information System Security Risk Management.
Proceedings of the Intentional Perspectives on Information Systems Engineering., 2010

2009
Improving the Effectiveness of Visual Representations in Requirements Engineering: An Evaluation of i* Visual Syntax.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

2008
Défis de la sécurité de l'information. Support à la gestion des risques de sécurité par les modèles.
Ingénierie des Systèmes d Inf., 2008

Evaluating formal properties of feature diagram languages.
IET Softw., 2008

Positioning Map: a Visual Technique to Improve the Layout of Diagram Contextual Information.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2008

Towards a Measurement Framework for Security Risk Management.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

Improving the Syntax and Semantics of Goal Modelling Languages.
Proceedings of the 3rd International i* Workshop, Recife, Brazil, February 11-12, 2008, 2008

A Large Scope Transformational Approach for Distributed Architecture Design.
Proceedings of the Software Architecture, Second European Conference, 2008

Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development.
Proceedings of the Advanced Information Systems Engineering, 20th International Conference, 2008

Alignment of Misuse Cases with Security Risk Management.
Proceedings of the The Third International Conference on Availability, 2008

2007
Process Support for Requirements Engineering: A Requirements Engineering Tool Evaluation Approach.
PhD thesis, 2007

Comparing Goal Modelling Languages: An Experiment.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2007

Design of a Modelling Language for Information System Security Risk Management.
Proceedings of the First International Conference on Research Challenges in Information Science, 2007

Comparing GRL and KAOS using the UEML Approach.
Proceedings of the Enterprise Interoperability II, 2007

Visually Effective Goal Models Using KAOS.
Proceedings of the Advances in Conceptual Modeling - Foundations and Applications, 2007

2006
Ontological Analysis of KAOS Using Separation of Reference.
Proceedings of the 11th International Workshop on Exploring Modeling Methods for Systems Analysis and Design, 2006

2005
Prototype of the Evaluation Framework for Functional Requirements of RE-tools.
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005

Tool Support and Specification Quality: Experimental Validation of an RE-Tool Evaluation Framework.
Proceedings of the Perspectives in Conceptual Modeling, 2005

Validating an Evaluation Framework for Requirements Engineering Tools.
Proceedings of the Information Modeling Methods and Methodologies, 2005

2004
How Requirements Specification Quality Depends on Tools: A Case Study.
Proceedings of the Advanced Information Systems Engineering, 16th International Conference, 2004

A Step Towards Context Insensitive Quality Control for Ontology Building Methodologies.
Proceedings of the CAiSE'04 Workshops in connection with The 16th Conference on Advanced Information Systems Engineering, 2004

2003
Usability and Adaptability of Evaluation Framework for Requirements Engineering Tools.
Proceedings of the International Conference on Software Engineering Research and Practice, 2003

2002
Search for Dynamic Equilibrium in Duel Problems by Global Optimization.
Informatica, 2002

Evaluation Framework of Requirements Engineering Tools for Verification and Validation.
Proceedings of the Advanced Conceptual Modeling Techniques, 2002


  Loading...