|
Search the dblp DataBase
Haralambos Mouratidis:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Haralambos Mouratidis, Paolo Giorgini, Ian R. Philp, Gordon A. Manson
Using Tropos Methodology to Model an Integrated Health Assessment System. [Citation Graph (0, 0)][DBLP] AOIS@CAiSE, 2002, pp:- [Conf]
- Agostino Poggi, Giovanni Rimassa, Paola Turci, James Odell, Haralambos Mouratidis, Gordon A. Manson
Modeling Deployment and Mobility Issues in Multiagent Systems Using AUML. [Citation Graph (0, 0)][DBLP] AOSE, 2003, pp:69-84 [Conf]
- Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
Modelling secure multiagent systems. [Citation Graph (0, 0)][DBLP] AAMAS, 2003, pp:859-866 [Conf]
- Haralambos Mouratidis, Manuel Kolp, Stéphane Faulkner, Paolo Giorgini
A secure architectural description language for agent systems. [Citation Graph (0, 0)][DBLP] AAMAS, 2005, pp:578-585 [Conf]
- Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. [Citation Graph (0, 0)][DBLP] CAiSE, 2003, pp:63-78 [Conf]
- Haralambos Mouratidis, Jan Jürjens, Jorge Fox
Towards a Comprehensive Framework for Secure Systems Development. [Citation Graph (0, 0)][DBLP] CAiSE, 2006, pp:48-62 [Conf]
- Haralambos Mouratidis, Michael Weiss, Paolo Giorgini
Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems. [Citation Graph (0, 0)][DBLP] ER, 2005, pp:225-240 [Conf]
- Stéphane Faulkner, Stéphane Dehousse, Manuel Kolp, Haralambos Mouratidis, Paolo Giorgini
Delegation Mechanisms for Agent Architectural Design. [Citation Graph (0, 0)][DBLP] IAT, 2005, pp:503-507 [Conf]
- Stéphane Dehousse, L. Liu, Stéphane Faulkner, Manuel Kolp, Haralambos Mouratidis
Modeling Delegation through an i*-based Approach. [Citation Graph (0, 0)][DBLP] IAT, 2006, pp:393-397 [Conf]
- Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
Using Security Attack Scenarios to Analyse Security During Information Systems Design. [Citation Graph (0, 0)][DBLP] ICEIS (3), 2004, pp:10-17 [Conf]
- Haralambos Mouratidis, Gordon A. Manson, Abdullah Gani, Paolo Giorgini
Analysing Security Requirements of Information Systems Using Tropos. [Citation Graph (0, 0)][DBLP] ICEIS (3), 2003, pp:623-626 [Conf]
- Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
An Ontology for Modelling Security: The Tropos Approach. [Citation Graph (0, 0)][DBLP] KES, 2003, pp:1387-1394 [Conf]
- Paolo Bresciani, Paolo Giorgini, Haralambos Mouratidis, Gordon A. Manson
Multi-agent Systems and Security Requirements Analysis. [Citation Graph (0, 0)][DBLP] SELMAS, 2003, pp:35-48 [Conf]
- Haralambos Mouratidis, Michael Weiss
Patterns for Modelling Agent Systems with Tropos. [Citation Graph (0, 0)][DBLP] SELMAS, 2005, pp:207-223 [Conf]
- Haralambos Mouratidis
Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05). [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:8, pp:614-617 [Journal]
- Haralambos Mouratidis, Michael Weiss, Paolo Giorgini
Modeling Secure Systems Using an Agent-oriented Approach and Security Patterns. [Citation Graph (0, 0)][DBLP] International Journal of Software Engineering and Knowledge Engineering, 2006, v:16, n:3, pp:471- [Journal]
- Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
When security meets software engineering: a case of modelling secure information systems. [Citation Graph (0, 0)][DBLP] Inf. Syst., 2005, v:30, n:8, pp:609-629 [Journal]
- Kamaljit Kaur Bimrah, Haralambos Mouratidis, David Preston
Information Systems Development: A Trust Ontology. [Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2007, pp:25-26 [Conf]
- Stéphane Dehousse, Stéphane Faulkner, Haralambos Mouratidis, Manuel Kolp, Paolo Giorgini
Reasoning About Willingness in Networks of Agents. [Citation Graph (0, 0)][DBLP] SELMAS, 2006, pp:117-131 [Conf]
- Haralambos Mouratidis, Paolo Giorgini
Security Attack Testing (SAT) - testing the security of information systems at design time. [Citation Graph (0, 0)][DBLP] Inf. Syst., 2007, v:32, n:8, pp:1166-1183 [Journal]
Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development. [Citation Graph (, )][DBLP]
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects. [Citation Graph (, )][DBLP]
A Risk Based Approach for Security Assurance Evaluation of IT Systems. [Citation Graph (, )][DBLP]
An Agent-Based System to Support Geo-Information Analysis. [Citation Graph (, )][DBLP]
Selecting Security Patterns that Fulfill Security Requirements. [Citation Graph (, )][DBLP]
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations. [Citation Graph (, )][DBLP]
Information Systems Security Criticality and Assurance Evaluation. [Citation Graph (, )][DBLP]
Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructures on a VoIP Service. [Citation Graph (, )][DBLP]
An Agent-Based System to Support Assurance of Security Requirements. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.007secs
|