The SCEAS System
Navigation Menu

Search the dblp DataBase


Haralambos Mouratidis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Haralambos Mouratidis, Paolo Giorgini, Ian R. Philp, Gordon A. Manson
    Using Tropos Methodology to Model an Integrated Health Assessment System. [Citation Graph (0, 0)][DBLP]
    AOIS@CAiSE, 2002, pp:- [Conf]
  2. Agostino Poggi, Giovanni Rimassa, Paola Turci, James Odell, Haralambos Mouratidis, Gordon A. Manson
    Modeling Deployment and Mobility Issues in Multiagent Systems Using AUML. [Citation Graph (0, 0)][DBLP]
    AOSE, 2003, pp:69-84 [Conf]
  3. Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
    Modelling secure multiagent systems. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2003, pp:859-866 [Conf]
  4. Haralambos Mouratidis, Manuel Kolp, Stéphane Faulkner, Paolo Giorgini
    A secure architectural description language for agent systems. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2005, pp:578-585 [Conf]
  5. Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
    Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. [Citation Graph (0, 0)][DBLP]
    CAiSE, 2003, pp:63-78 [Conf]
  6. Haralambos Mouratidis, Jan Jürjens, Jorge Fox
    Towards a Comprehensive Framework for Secure Systems Development. [Citation Graph (0, 0)][DBLP]
    CAiSE, 2006, pp:48-62 [Conf]
  7. Haralambos Mouratidis, Michael Weiss, Paolo Giorgini
    Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems. [Citation Graph (0, 0)][DBLP]
    ER, 2005, pp:225-240 [Conf]
  8. Stéphane Faulkner, Stéphane Dehousse, Manuel Kolp, Haralambos Mouratidis, Paolo Giorgini
    Delegation Mechanisms for Agent Architectural Design. [Citation Graph (0, 0)][DBLP]
    IAT, 2005, pp:503-507 [Conf]
  9. Stéphane Dehousse, L. Liu, Stéphane Faulkner, Manuel Kolp, Haralambos Mouratidis
    Modeling Delegation through an i*-based Approach. [Citation Graph (0, 0)][DBLP]
    IAT, 2006, pp:393-397 [Conf]
  10. Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
    Using Security Attack Scenarios to Analyse Security During Information Systems Design. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2004, pp:10-17 [Conf]
  11. Haralambos Mouratidis, Gordon A. Manson, Abdullah Gani, Paolo Giorgini
    Analysing Security Requirements of Information Systems Using Tropos. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2003, pp:623-626 [Conf]
  12. Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
    An Ontology for Modelling Security: The Tropos Approach. [Citation Graph (0, 0)][DBLP]
    KES, 2003, pp:1387-1394 [Conf]
  13. Paolo Bresciani, Paolo Giorgini, Haralambos Mouratidis, Gordon A. Manson
    Multi-agent Systems and Security Requirements Analysis. [Citation Graph (0, 0)][DBLP]
    SELMAS, 2003, pp:35-48 [Conf]
  14. Haralambos Mouratidis, Michael Weiss
    Patterns for Modelling Agent Systems with Tropos. [Citation Graph (0, 0)][DBLP]
    SELMAS, 2005, pp:207-223 [Conf]
  15. Haralambos Mouratidis
    Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05). [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:8, pp:614-617 [Journal]
  16. Haralambos Mouratidis, Michael Weiss, Paolo Giorgini
    Modeling Secure Systems Using an Agent-oriented Approach and Security Patterns. [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 2006, v:16, n:3, pp:471- [Journal]
  17. Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
    When security meets software engineering: a case of modelling secure information systems. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2005, v:30, n:8, pp:609-629 [Journal]
  18. Kamaljit Kaur Bimrah, Haralambos Mouratidis, David Preston
    Information Systems Development: A Trust Ontology. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2007, pp:25-26 [Conf]
  19. Stéphane Dehousse, Stéphane Faulkner, Haralambos Mouratidis, Manuel Kolp, Paolo Giorgini
    Reasoning About Willingness in Networks of Agents. [Citation Graph (0, 0)][DBLP]
    SELMAS, 2006, pp:117-131 [Conf]
  20. Haralambos Mouratidis, Paolo Giorgini
    Security Attack Testing (SAT) - testing the security of information systems at design time. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2007, v:32, n:8, pp:1166-1183 [Journal]

  21. Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development. [Citation Graph (, )][DBLP]

  22. Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects. [Citation Graph (, )][DBLP]

  23. A Risk Based Approach for Security Assurance Evaluation of IT Systems. [Citation Graph (, )][DBLP]

  24. An Agent-Based System to Support Geo-Information Analysis. [Citation Graph (, )][DBLP]

  25. Selecting Security Patterns that Fulfill Security Requirements. [Citation Graph (, )][DBLP]

  26. Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations. [Citation Graph (, )][DBLP]

  27. Information Systems Security Criticality and Assurance Evaluation. [Citation Graph (, )][DBLP]

  28. Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructures on a VoIP Service. [Citation Graph (, )][DBLP]

  29. An Agent-Based System to Support Assurance of Security Requirements. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.007secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002