Adaptive Information Security
Relating Security Requirements to Design in Cloud Computing
QNRF NPRP 5-079-1-018
Nhlabatsi, Armstrong; Yu, Yijun; Zisman, Andrea; Tun, Thein; Khan, Niamul; Bandara, Arosha; Khan, Khaled and Nuseibeh, Bashar (2015).
Managing security control assumptions using causal traceability. In: 8th International Symposium on Software and Systems Traceability (SST 2015), 17 July 2015, Florence, Italy. Nhlabatsi, Armstrong;
Tun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; Khan, Khaled M. and Nuseibeh, Bashar (2015). "Why can't I do that?": tracing adaptive security decisions. EAI Endorsed Transactions on Self-Adaptive Systems, 1(1), article no. e2. Felderer, Michael; Katt, Basel; Kalb, Philipp; Jürjens, Jan; Ochoa, Martín; Paci, Federica; Tran, Le Minh Sang;
Tun, Thein; Yskout, Koen; Scandariato, Riccardo; Piessens, Frank; Vanoverberghe, Dries; Fourneret, Elizabeta; Gander, Matthias; Solhaug, Bjørnar and Breu, Ruth (2014). Evolution of security engineering artifacts: a state of the art survey. International Journal of Secure Software Engineering, 5(4) pp. 48–98. Nhlabatsi, Armstrong; Tun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; Khan, Khaled and Nuseibeh, Bashar (2014).
Traceability for adaptive information security in the cloud. In: 7th IEEE International Conference on Cloud Computing, 27 June - 2 July 2014, Alaska, USA. Related Publications
Yu, Yijun; Lin, Yu; Hu, Zhenjiang; Hidaka, Soichiro; Hiroyuki, Kato and Montrieux, Lionel (2012).
Maintaining invariant traceability through bidirectional transformations. In: 34th International Conference on Software Engineering, 02-09 June 2012, Zurich. Ali, Raian; Solis, Carlos; Omoronyia, Inah; Salehie, Mazeiar and Nuseibeh, Bashar (2012).
Social adaptation: when software gives users a voice. In: ENASE 2012: 7th International Conference Evaluation of Novel Approaches to Software Engineering , 28-30 June 2012, Wroclaw, Poland. Security
Tun, Thein Than; Yu, Yijun; Haley, C. and Nuseibeh, B. (2010).
Model-Based argument analysis for evolving security requirements. In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, 9-11 September 2010, Singapore. Nhlabatsi, Armstrong; Nuseibeh, Bashar and Yu, Yijun (2010).
Security requirements engineering for evolving software systems: a survey. International Journal of Secure Software Engineering (IJSSE), 1(1), pp. 54–73. Nuseibeh, Bashar; Haley, Charles B. and Foster, Craig (2009).
Securing the skies: In requirements we trust. Computer, 42(9), pp. 64–72. Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar (2008).
Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Transactions on Software Engineering, 34(1), pp. 133–153.