Shaun Shei
Citata da
Citata da
Security requirements engineering for cloud computing: The secure tropos approach
H Mouratidis, N Argyropoulos, S Shei
Domain-specific conceptual modeling, 357-380, 2016
A semi-automatic approach for eliciting cloud security and privacy requirements
N Argyropoulos, S Shei, C Kalloniatis, H Mouratidis, A Delaney, A Fish, ...
Proceedings of the 50th hawaii international conference on system sciences, 2017
A security requirements modelling language for cloud computing environments
H Mouratidis, S Shei, A Delaney
Software and Systems Modeling 19 (2), 271-295, 2020
Modelling secure cloud computing systems from a security requirements perspective
S Shei, C Kalloniatis, H Mouratidis, A Delaney
International Conference on Trust and Privacy in Digital Business, 48-62, 2016
Modelling secure cloud systems based on system requirements
S Shei, LM Alcaniz, H Mouratidis, A Delaney, DG Rosado, ...
2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements …, 2015
A security requirements modelling language to secure cloud computing environments
S Shei, H Mouratidis, A Delaney
Enterprise, Business-Process and Information Systems Modeling, 337-345, 2017
Visually Mapping Requirements Models to Cloud Services.
S Shei, AJ Delaney, S Kapetanakis, H Mouratidis
DMS, 108-114, 2015
A model-driven approach towards designing and analysing secure systems for multi-clouds
S Shei
University of Brighton, 2018
Security, Privacy and Trust in eServices
NG Mohammadi, M Heisel, JM Horcas, M Pinto, L Fuentes, S Simou, ...
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–9