Shaun Shei
Title
Cited by
Cited by
Year
Security requirements engineering for cloud computing: The secure tropos approach
H Mouratidis, N Argyropoulos, S Shei
Domain-specific conceptual modeling, 357-380, 2016
292016
Modelling secure cloud systems based on system requirements
S Shei, LM Alcaniz, H Mouratidis, A Delaney, DG Rosado, ...
2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements …, 2015
102015
A semi-automatic approach for eliciting cloud security and privacy requirements
N Argyropoulos, S Shei, C Kalloniatis, H Mouratidis, A Delaney, A Fish, ...
Proceedings of the 50th hawaii international conference on system sciences, 2017
82017
Modelling secure cloud computing systems from a security requirements perspective
S Shei, C Kalloniatis, H Mouratidis, A Delaney
International Conference on Trust and Privacy in Digital Business, 48-62, 2016
82016
A security requirements modelling language to secure cloud computing environments
S Shei, H Mouratidis, A Delaney
Enterprise, Business-Process and Information Systems Modeling, 337-345, 2017
32017
A security requirements modelling language for cloud computing environments
H Mouratidis, S Shei, A Delaney
Software and Systems Modeling, 1-25, 2019
22019
Visually Mapping Requirements Models to Cloud Services.
S Shei, A Delaney, S Kapetanakis, H Mouratidis
DMS, 108-114, 2015
22015
A model-driven approach towards designing and analysing secure systems for multi-clouds
S Shei, H Mouratidis, S Kapetanakis, A Delaney
University of Brighton, 2018
12018
Security, Privacy and Trust in eServices
NG Mohammadi, M Heisel, JM Horcas, M Pinto, L Fuentes, S Simou, ...
The system can't perform the operation now. Try again later.
Articles 1–9