Shaun Shei
Shaun Shei
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Security requirements engineering for cloud computing: The secure tropos approach
H Mouratidis, N Argyropoulos, S Shei
Domain-Specific Conceptual Modeling: Concepts, Methods and Tools, 357-380, 2016
A security requirements modelling language for cloud computing environments
H Mouratidis, S Shei, A Delaney
Software and Systems Modeling 19 (2), 271-295, 2020
A semi-automatic approach for eliciting cloud security and privacy requirements
N Argyropoulos, S Shei, C Kalloniatis, H Mouratidis, A Delaney, A Fish, ...
Modelling secure cloud computing systems from a security requirements perspective
S Shei, C Kalloniatis, H Mouratidis, A Delaney
Trust, Privacy and Security in Digital Business: 13th International …, 2016
Modelling secure cloud systems based on system requirements
S Shei, LM Alcaniz, H Mouratidis, A Delaney, DG Rosado, ...
2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements …, 2015
A security requirements modelling language to secure cloud computing environments
S Shei, H Mouratidis, A Delaney
Enterprise, Business-Process and Information Systems Modeling: 18th …, 2017
A model-driven approach towards designing and analysing secure systems for multi-clouds
S Shei
University of Brighton, 2018
Visually Mapping Requirements Models to Cloud Services.
S Shei, AJ Delaney, S Kapetanakis, H Mouratidis
DMS, 108-114, 2015
Security, Privacy and Trust in eServices
NG Mohammadi, M Heisel, JM Horcas, M Pinto, L Fuentes, S Simou, ...
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–9