Shareeful Islam
Shareeful Islam
School of Architecture, Computing and Engineering, University of East London, UK
Email verificata su uel.ac.uk - Home page
TitoloCitata daAnno
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec
SH Houmb, S Islam, E Knauss, J Jürjens, K Schneider
Requirements Engineering 15 (1), 63-93, 2010
1312010
A framework to support selection of cloud providers based on security and privacy requirements
H Mouratidis, S Islam, C Kalloniatis, S Gritzalis
Journal of Systems and Software 86 (9), 2276-2293, 2013
1262013
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
C Kalloniatis, H Mouratidis, M Vassilis, S Islam, S Gritzalis, E Kavakli
Computer Standards & Interfaces 36 (4), 759-775, 2014
702014
Evaluating cloud deployment scenarios based on security and privacy requirements
C Kalloniatis, H Mouratidis, S Islam
Requirements Engineering 18 (4), 299-319, 2013
632013
A framework to support alignment of secure software engineering with legal regulations
S Islam, H Mouratidis, J Jürjens
Software & Systems Modeling 10 (3), 369-394, 2011
522011
Software development risk management model: a goal driven approach
S Islam
Proceedings of the doctoral symposium for ESEC/FSE on Doctoral symposium, 5-8, 2009
502009
Integrating risk management activities into requirements engineering
S Islam, SH Houmb
2010 Fourth International Conference on Research Challenges in Information …, 2010
492010
Software development risk management model: a goal driven approach
S Islam
Proceedings of the doctoral symposium for ESEC/FSE on Doctoral symposium, 5-8, 2009
492009
Enhancing security requirements engineering by organizational learning
K Schneider, E Knauss, S Houmb, S Islam, J Jürjens
Requirements Engineering 17 (1), 35-56, 2012
482012
An empirical study on the implementation and evaluation of a goal-driven software development risk management model
S Islam, H Mouratidis, ER Weippl
Information and Software Technology 56 (2), 117-133, 2014
472014
Goal and risk factors in offshore outsourced software development from vendor's viewpoint
S Islam, MMA Joarder, SH Houmb
2009 Fourth IEEE International Conference on Global Software Engineering …, 2009
412009
Towards a framework to elicit and manage security and privacy requirements from laws and regulations
S Islam, H Mouratidis, S Wagner
International Working Conference on Requirements Engineering: Foundation for …, 2010
382010
Human factors in software security risk management
S Islam, W Dong
Proceedings of the first international workshop on Leadership and management …, 2008
312008
Model based process to support security and privacy requirements engineering
S Islam, H Mouratidis, C Kalloniatis, A Hudic, L Zechner
International Journal of Secure Software Engineering (IJSSE) 3 (3), 1-22, 2012
292012
Data confidentiality using fragmentation in cloud computing
A Hudic, S Islam, P Kieseberg, ER Weippl
Int. J. Communication Networks and Distributed Systems 1 (3/4), 1, 2012
262012
A goal-driven risk management approach to support security and privacy analysis of cloud-based system
S Islam, H Mouratidis, ER Weippl
Security Engineering for Cloud Computing: Approaches and Tools, 97-122, 2013
242013
Measuring security requirements for software security
S Islam, P Falcarin
2011 IEEE 10th International Conference on Cybernetic Intelligent Systems …, 2011
242011
Supporting requirements engineers in recognising security issues
E Knauss, S Houmb, K Schneider, S Islam, J Jürjens
International Working Conference on Requirements Engineering: Foundation for …, 2011
242011
Data confidentiality using fragmentation in cloud computing
A Hudic, S Islam, P Kieseberg, S Rennert, ER Weippl
International Journal of Pervasive Computing and Communications, 2013
232013
Coir fiber reinforced polypropylene composites: physical and mechanical properties
M Haque, N Islam, M Huque, M Hasan, S Islam, S Islam
Advanced Composite Materials 19 (1), 91-106, 2010
232010
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20