|Security requirements engineering for cloud computing: The secure tropos approach|
H Mouratidis, N Argyropoulos, S Shei
Domain-Specific Conceptual Modeling: Concepts, Methods and Tools, 357-380, 2016
|A security requirements modelling language for cloud computing environments|
H Mouratidis, S Shei, A Delaney
Software and Systems Modeling 19, 271-295, 2020
|A semi-automatic approach for eliciting cloud security and privacy requirements|
N Argyropoulos, S Shei, C Kalloniatis, H Mouratidis, A Delaney, A Fish, ...
|Modelling secure cloud computing systems from a security requirements perspective|
S Shei, C Kalloniatis, H Mouratidis, A Delaney
Trust, Privacy and Security in Digital Business: 13th International …, 2016
|Modelling secure cloud systems based on system requirements|
S Shei, LM Alcaniz, H Mouratidis, A Delaney, DG Rosado, ...
2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements …, 2015
|A security requirements modelling language to secure cloud computing environments|
S Shei, H Mouratidis, A Delaney
Enterprise, Business-Process and Information Systems Modeling: 18th …, 2017
|Visually Mapping Requirements Models to Cloud Services.|
S Shei, AJ Delaney, S Kapetanakis, H Mouratidis
DMS, 108-114, 2015
|A model-driven approach towards designing and analysing secure systems for multi-clouds|
University of Brighton, 2018
|Security, Privacy and Trust in eServices|
NG Mohammadi, M Heisel, JM Horcas, M Pinto, L Fuentes, S Simou, ...