Search concepts
|
Selected filters |
- 1 - 50 out of 76 results
- Export search results
Search results
-
2015
Conflicts between Security and Privacy Measures in Software Requirements Engineering
Ganji, D., Malekshahi Gheytassi, S. & Mouratidis, H., 4 Sep 2015, International Conference on Global Security, Safety, and Sustainability: ICGS3 2015: Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security. Cham: Springer, (Communications in Computer and Information Science; vol. 534).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
-
Towards the derivation of secure business process designs
Argyropoulos, N., Mouratidis, H. & Fish, A., 15 Dec 2015, Advances in Conceptual Modeling. Switzerland: Springer International Publishing, Vol. 9382. p. 248-258 11 p. (Lecture Notes in Computer Science).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
-
Eliciting security requirements for business processes of legacy systems
Argyropoulos, N., Alcañiz, L. M., Mouratidis, H., Fish, A., Rosado, D. G., de Guzmán, I. G-R. & Fernandez-Medina, E., 26 Nov 2015, The Practice of Enterprise Modeling. Switzerland: Springer International Publishing, Vol. 235. p. 91-107 17 p. (Lecture Notes in Business Information Processing).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
-
2016
Incorporating privacy patterns into semi-automatic business process derivation
Argyropoulos, N., Kalloniatis, C., Mouratidis, H. & Fish, A., 25 Aug 2016, 2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS). Piscataway, NJ: IEEE, p. 1-12 12 p.Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
Open AccessFile -
An information security risk-driven investment model for analysing human factors
Alavi, R., Islam, S. & Mouratidis, H., 13 Jun 2016, In: Information Management and Computer Security. 24, 2, p. 205-227 23 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile -
2013
Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions
Pavlidis, M., Mouratidis, H. & Islam, S., 28 Aug 2013, 10th International Conference on Trust, Privacy and Security in Digital Business (TrustBus). Prague, Czech Republic, Vol. 8058. p. 185-198 14 p. (Lecture Notes in Computer Science).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
-
2012
Dealing with Trust and Control: A Meta-Model for Trustworthy Information Systems Development
Pavlidis, M., Mouratidis, H., Islam, S. & Kearney, P., 16 May 2012, Sixth International Conference on Research Challenges in Information Science (RCIS), 2012. Valencia, Spain: IEEE, p. 1-9 9 p.Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
-
A CASE tool to support automated modelling and analysis of security requirements, based on secure tropos
Pavlidis, M., Islam, S. & Mouratidis, H., 1 Jan 2012, IS Olympics: Information Systems in a Diverse World - CAiSE Forum 2011, Selected Extended Papers. Springer-Verlag, p. 95-109 15 p. (Lecture Notes in Business Information Processing; vol. 107 LNBIP).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
-
2013
The role of trust in the development and adoption of cultural internet-based systems
Pavlidis, M., Kavakli, E., Bantimaroudis, P., Mouratidis, H., Kalloniatis, C. & Gritzalis, S., 1 Jan 2013, Proceedings of the European, Mediterranean and Middle Eastern Conference on Information Systems, EMCIS 2013. Ghoneim, A., AlShawi, S. & Ali, M. (eds.). (Proceedings of the European, Mediterranean and Middle Eastern Conference on Information Systems, EMCIS 2013).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
-
2020
A holistic approach for privacy requirements analysis: An industrial case study
Gharib, M., Giorgini, P., Salnitri, M., Paja, E., Mouratidis, H., Pavlidis, M. & Ruiz, J. F., 14 Oct 2020, Visual Privacy Management. Salnitri, M., Jürjens, J., Mouratidis, H., Mancini, L. & Giorgini, P. (eds.). Cham, p. 22-53 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12030 LNCS).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Chapter › peer-review
-
2015
Addressing Privacy and Trust Issues in Cultural Heritage Modelling
Pavlidis, M., Mouratidis, H., Gonzalez-Perez, C. & Kalloniatis, C., 22 Jul 2015, 10th International Conference, CRiSIS 2015. Lesbos Island, Greece: Springer International Publishing, Vol. 9572. p. 3-16 14 p. (Lecture Notes in Computer Science).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
Open AccessFile -
2020
Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures
Papastergiou, S., Mouratidis, H. & Kalogeraki, E. M., 4 Apr 2020, In: Evolving Systems.Research output: Contribution to journal › Article › peer-review
Open AccessFile -
2017
Privacy Data Management and Awareness for Public Administrations: a Case Study from the Healthcare Domain
Diamantopoulou, V., Angelopoulos, K., Flake, J., Praitano, A., Ruiz, J. F., Jurjens, J., Pavlidis, M., Bonutto, D., Castillo Sanz, A., Mouratidis, H., Garcia Robles, J. & Tozzi, A. E., 7 Jun 2017, APF2017 ENISA Annual Privacy Forum. Vienna, Austria: Springer LNCS, p. 192-209 18 p. (Lecture Notes in Computer Science).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
Open AccessFile -
2013
Evaluating cloud deployment scenarios based on security and privacy requirements
Kalloniatis, C., Mouratidis, H. & Islam, S., 4 Apr 2013, In: Requirements Engineering. 18, 4, p. 299-319 21 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile -
2016
Privacy-preserving collaborative recommendations based on random perturbations
Polatidis, N., Georgiadis, C. K., Pimenidis, E. & Mouratidis, H., 18 Nov 2016, In: Expert Systems with Applications. 71, p. 18-25 8 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile -
2019
A security requirements modelling language for cloud computing environments
Mouratidis, H., Shei, S. & Delaney, A., 25 Sep 2019, In: Software and Systems Modeling. p. 1-25Research output: Contribution to journal › Article › peer-review
Open AccessFile -
2017
Supporting secure business process design via security process patterns
Argyropoulos, N., Mouratidis, H. & Fish, A., 1 May 2017, Enterprise, Business-Process and Information Systems Modeling - 18th International Conference, BPMDS 2017, 22nd International Conference, EMMSAD 2017 Held at CAiSE 2017, Proceedings. Springer-Verlag, p. 9-13 5 p. (Lecture Notes in Business Information Processing; vol. 287).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
-
Are small cells and network intelligence at the edge the drivers for 5g market adoption? The sesame case
Neokosmidis, I., Rokkas, T., Chochliouros, I. P., Goratti, L., Mouratidis, H., Nasr, K. M., Vahid, S., Moessner, K., Albanese, A., Crosta, P. S. & Paglierani, P., 1 Jan 2017, Engineering Applications of Neural Networks - 18th International Conference, EANN 2017, Proceedings. Springer-Verlag, p. 693-703 11 p. (Communications in Computer and Information Science; vol. 744).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
-
2020
A conceptual redesign of a modelling language for cyber resiliency of healthcare systems
Athinaiou, M., Mouratidis, H., Fotis, T. & Pavlidis, M., 22 Feb 2020, Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Revised Selected Papers: In conjunction with ESORICS 2019. Katsikas, S., Katsikas, S., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Gritzalis, S., Kalloniatis, C., Mylopoulos, J., Antón, A., Pallas, F., Pohle, J., Sasse, A., Meng, W., Furnell, S. & Garcia-Alfaro, J. (eds.). Cham: Springer, p. 140-158 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11980 LNCS).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
Open AccessFile -
2016
Modelling secure cloud computing systems from a security requirements perspective
Shei, S., Kalloniatis, C., Mouratidis, H. & Delaney, A., 6 Aug 2016, Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Proceedings. Springer-Verlag, p. 48-62 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9830 LNCS).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
Open AccessFile -
2018
MITIGATE: a dynamic supply chain cyber risk assessment methodology
Schauer, S., Polemi, N. & Mouratidis, H., 1 Sep 2018, In: Journal of Transportation Security. 12, 1-2, p. 1–35Research output: Contribution to journal › Article › peer-review
Open AccessFile -
2017
A Conceptual Model to Support Security Analysis in the Internet of Things
Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E. & Kalloniatis, C., 1 Jul 2017, In: Computer Science And Information Systems. 14, 2, p. 557-578 22 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile -
2019
Cyber security incident handling, warning and response system for the european critical information infrastructures (cyberSANE)
Papastergiou, S., Mouratidis, H. & Kalogeraki, E. M., 15 May 2019, Engineering Applications of Neural Networks - 20th International Conference, EANN 2019, Proceedings. Maglogiannis, I., Jayne, C., Macintyre, J. & Iliadis, L. (eds.). Cham: Springer-Verlag, Vol. 1000. p. 476-487 12 p. (Communications in Computer and Information Science).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
Open AccessFile -
2020
DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance
Piras, L., Al-Obeidallah, M. G., Pavlidis, M., Mouratidis, H., Tsohou, A., Magkos, E., Praitano, A., Iodice, A. & Crespo, B. G. N., 14 Sep 2020, Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Proceedings. Gritzalis, S., Weippl, E. R., Kotsis, G., Khalil, I. & Tjoa, A. M. (eds.). p. 186-201 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12395 LNCS).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
Open AccessFile -
2016
Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach
Mouratidis, H., Argyropoulos, N. & Shei, S., 10 Jul 2016, Domain-Specific Conceptual Modeling: Concepts, Methods and Tools. Karagiannis, D., Mayr, H. C. & Mylopoulos, J. (eds.). Switzerland: Springer International Publishing, p. 357-380 24 p.Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Chapter
-
2012
Modelling Security Using Trust Based Concepts
Pavlidis, M., Mouratidis, H. & Islam, S., 15 May 2012, In: International Journal of Secure Software Engineering. 3, 2, p. 36-53 18 p.Research output: Contribution to journal › Article › peer-review
-
2015
Privacy as an Integral Part of the Implementation of Cloud Solutions
Kavakli, E., Kalloniatis, C., Mouratidis, H. & Gritzalis, S., 28 Sep 2015, In: Computer Journal. 58, 10, p. 2213-2224 12 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile -
2017
Supporting Privacy by Design using Privacy Process Patterns
Diamantopoulou, V., Kalloniatis, C., Gritzalis, S. & Mouratidis, H., 4 May 2017, IFIP SEC 2017 32nd IFIP International Information Security Conference. Rome, Italy: Springer LNCS, p. 491-505 15 p. (IFIP Advances in Information and Communication Technology).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
Open AccessFile -
Attribute-based security verification of business process models
Argyropoulos, N., Mouratidis, H. & Fish, A., 14 Aug 2017, Proceedings - 2017 IEEE 19th Conference on Business Informatics, CBI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 1. p. 43-52 10 p. 8010705. (Conference on Business Informatics).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
Open AccessFile -
2016
Design Activity in the Process of Migrating Security Features to Cloud
Marquez, L., Rosado, D. G., Mouratidis, H. & Fernandez Medina, E., 1 Jun 2016, In: IEEE Latin America Transactions. 14, 6, p. 2846-2852 7 p., 7555263.Research output: Contribution to journal › Article › peer-review
-
2018
Apparatus: A framework for security analysis in internet of things systems
Mavropoulos, O., Mouratidis, H., Fish, A. & Panaousis, E., 23 Aug 2018, In: Ad Hoc Networks.Research output: Contribution to journal › Article › peer-review
Open AccessFile -
2017
A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements
Argyropoulos, N., Shei, S., Kalloniatis, C., Mouratidis, H., Delaney, A., Fish, A. & Gritzalis, S., 4 Jan 2017, 50th Hawaii International Conference on System Sciences (HICSS). Hawaii, USA, p. 4827-4836 10 p.Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
Open AccessFile -
A Holistic Approach for Privacy Protection in E-Government
Angelopoulos, K., Diamantopoulou, V., Pavlidis, M., Mouratidis, H., Salnitri, M., Ruiz, J. F. & Giorgini, P., 30 Aug 2017, ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. New York: ACM, p. 0-0 1 p.Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
-
Evaluation of a security and privacy requirements methodology using the physics of notation
Diamantopoulou, V., Pavlidis, M. & Mouratidis, H., 22 Dec 2017, Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Revised Selected Papers. Mylopoulos, J., Lambrinoudakis, C., Kalloniatis, C., Cuppens, F., Cuppens, N., Anton, A., Katsikas, S. K. & Gritzalis, S. (eds.). Oslo, Norway: Springer-Verlag, p. 210-225 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10683 LNCS).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
Open AccessFile -
A metamodel for GDPR-based privacy level agreements
Diamantopoulou, V., Angelopoulos, K., Pavlidis, M. & Mouratidis, H., 1 Jan 2017, In: Ceur Workshop Proceedings. 1979, p. 299-305 7 p.Research output: Contribution to journal › Conference article › peer-review
Open AccessFile -
ASTo: A tool for security analysis of IoT systems
Mavropoulos, O., Mouratidis, H., Fish, A. & Panaousis, E., 30 Jun 2017, Proceedings - 2017 15th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2017. Institute of Electrical and Electronics Engineers Inc., p. 395-400 6 p. 7965757Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
-
2018
A Security Analysis Method for Industrial Internet of Things
Mouratidis, H. & Diamantopoulou, V., 3 May 2018, In: IEEE Transactions on Industrial Informatics. 14, 9, p. 4093 - 4100Research output: Contribution to journal › Article › peer-review
Open AccessFile -
2016
A survey on cloud forensics challenges and solutions
Simou, S., Kalloniatis, C., Gritzalis, S. & Mouratidis, H., 8 Nov 2016, In: Security and Communication Networks. 9, 18, p. 6285-6314 30 p.Research output: Contribution to journal › Article › peer-review
-
2020
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform
Tsohou, A., Magkos, E., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M. & Gallego-Nicasio Crespo, B., 16 Apr 2020, In: Information and Computer Security. 28, 4, p. 531-553 23 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile -
2017
Cyber-attack path discovery in a dynamic supply chain maritime risk management system
Polatidis, N., Pavlidis, M. & Mouratidis, H., 14 Sep 2017, In: Computer Standards & Interfaces. 56, p. 74-82 9 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile -
Selecting Security Mechanisms in Secure Tropos
Pavlidis, M., Panaousis, E. & Mouratidis, H., 27 Jul 2017, TrustBus 2017: Trust, Privacy and Security in Digital Business. Cham: Springer, Vol. 10442. p. 99-114 16 p. (Lecture Notes in Computer Science).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
Open AccessFile -
Security-aware elasticity for NoSQL databases in multi-cloud environments
Naskos, A., Gounaris, A., Mouratidis, H. & Katsaros, P., 14 Sep 2017, In: International Journal of Intelligent Information and Database Systems. 10, 3-4, p. 168-190 23 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile -
Privacy Level Agreements for Public Administration Information Systems
Diamantopoulou, V., Pavlidis, M. & Mouratidis, H., 12 Jun 2017, 29th International Conference on Advanced Information Systems Engineering (CAiSE) 2017 Forum. Essen, Germany: CEUR LNCS, p. 97-104 8 p. (CEUR Workshop Proceedings).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
Open AccessFile -
2019
Enhancing secure business process design with security process patterns
Argyropoulos, N., Mouratidis, H. & Fish, A., 13 Jul 2019, In: Software and Systems Modeling. 19, p. 555–577Research output: Contribution to journal › Article › peer-review
Open AccessFile -
2014
An empirical study on the implementation and evaluation of a goal-driven software development risk management model
Islam, S., Mouratidis, H. & Weipplc, E. R., 1 Jan 2014, In: Information and Software Technology. 56, 2, p. 117-133Research output: Contribution to journal › Article › peer-review
File -
2019
Modelling the Interplay of Security, Privacy and Trust in Sociotechnical Systems: A Computer-Aided Design Approach
Salnitri, M., Angelopoulos, K., Pavlidis, M., Diamantopoulou, V., Mouratidis, H. & Giorgini, P., 20 Jul 2019, In: Software and Systems Modeling. p. 1-25Research output: Contribution to journal › Article › peer-review
Open AccessFile -
2018
Risk-aware decision support with Constrained Goal Models
Argyropoulos, N., Angelopoulos, K., Mouratidis, H. & Fish, A., 8 Oct 2018, In: Information and Computer Security. 26, 4, p. 472-490Research output: Contribution to journal › Article › peer-review
Open AccessFile -
2019
Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements
Alkubaisy, D., Cox, K. & Mouratidis, H., 31 May 2019, Proceedings: RCIS 2019 - IEEE 13th International Conference on Research Challenges in Information Science: Towards a Design Science for Information Systems. Kolp, M., Vanderdonckt, J., Snoeck, M. & Wautelet, Y. (eds.). IEEE Computer Society, 8876999. (Proceedings - International Conference on Research Challenges in Information Science; vol. 2019-May).Research output: Chapter in Book/Conference proceeding with ISSN or ISBN › Conference contribution with ISSN or ISBN › peer-review
Open AccessFile -
2018
Mobile recommender systems: Identifying the major concepts
Pimenidis, E., Polatidis, N. & Mouratidis, H., 3 Aug 2018, In: Journal of Information Science.Research output: Contribution to journal › Article › peer-review
Open AccessFile -
A novel risk assessment methodology for SCADA maritime logistics environments
Kalogeraki, E. M., Papastergiou, S., Mouratidis, H. & Polemi, N., 28 Aug 2018, In: Applied Sciences (Switzerland). 8, 9, 1477.Research output: Contribution to journal › Article › peer-review
Open AccessFile