Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Golnaz Elahi
@phdthesis{DBLP:phd/ca/Elahi12, author = {Golnaz Elahi}, title = {Making Trade-offs among Security and Other Requirements during System Design}, school = {University of Toronto, Canada}, year = {2012}, url = {http://hdl.handle.net/1807/32704}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ca/Elahi12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/ElahiY12, author = {Golnaz Elahi and Eric S. K. Yu}, title = {Comparing alternatives for analyzing requirements trade-offs - In the absence of numerical data}, journal = {Inf. Softw. Technol.}, volume = {54}, number = {6}, pages = {517--530}, year = {2012}, url = {https://doi.org/10.1016/j.infsof.2011.10.007}, doi = {10.1016/J.INFSOF.2011.10.007}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/ElahiY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/ElahiY11, author = {Golnaz Elahi and Eric S. K. Yu}, editor = {Selmin Nurcan}, title = {A Semi-Automated Tool for Requirements Trade-off Analysis}, booktitle = {Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011}, series = {{CEUR} Workshop Proceedings}, volume = {734}, pages = {9--16}, publisher = {CEUR-WS.org}, year = {2011}, url = {https://ceur-ws.org/Vol-734/PaperDemo02.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:34 +0100}, biburl = {https://dblp.org/rec/conf/caise/ElahiY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/ElahiASSY11, author = {Golnaz Elahi and Tom Aratyn and Ramanan Sivaranjan and Rohit Sethi and Eric S. K. Yu}, editor = {Selmin Nurcan}, title = {{SD} Elements: {A} Tool for Secure Application Development Management}, booktitle = {Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011}, series = {{CEUR} Workshop Proceedings}, volume = {734}, pages = {81--88}, publisher = {CEUR-WS.org}, year = {2011}, url = {https://ceur-ws.org/Vol-734/PaperDemo11.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/caise/ElahiASSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ElahiYLL11, author = {Golnaz Elahi and Eric S. K. Yu and Tong Li and Lin Liu}, title = {Security Requirements Engineering in the Wild: {A} Survey of Common Practices}, booktitle = {Proceedings of the 35th Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22 July 2011}, pages = {314--319}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/COMPSAC.2011.48}, doi = {10.1109/COMPSAC.2011.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/ElahiYLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ElahiY11, author = {Golnaz Elahi and Eric S. K. Yu}, title = {A Semi-automated Decision Support Tool for Requirements Trade-Off Analysis}, booktitle = {Proceedings of the 35th Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22 July 2011}, pages = {466--475}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/COMPSAC.2011.67}, doi = {10.1109/COMPSAC.2011.67}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/ElahiY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esem/ElahiYZ11, author = {Golnaz Elahi and Eric S. K. Yu and Nicola Zannone}, editor = {James Walden and Laurie A. Williams}, title = {Security Risk Management by Qualitative Vulnerability Analysis}, booktitle = {Third International Workshop on Security Measurements and Metrics, Metrisec@ESEM 2011, Banff, Alberta, Canada, September 21, 2011}, pages = {1--10}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/Metrisec.2011.12}, doi = {10.1109/METRISEC.2011.12}, timestamp = {Mon, 07 Sep 2020 10:46:59 +0200}, biburl = {https://dblp.org/rec/conf/esem/ElahiYZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ElahiY11, author = {Golnaz Elahi and Eric S. K. Yu}, editor = {William C. Chu and W. Eric Wong and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Requirements trade-offs analysis in the absence of quantitative measures: a heuristic method}, booktitle = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011}, pages = {651--658}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1982185.1982331}, doi = {10.1145/1982185.1982331}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/ElahiY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/ElahiYZ10, author = {Golnaz Elahi and Eric S. K. Yu and Nicola Zannone}, title = {A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities}, journal = {Requir. Eng.}, volume = {15}, number = {1}, pages = {41--62}, year = {2010}, url = {https://doi.org/10.1007/s00766-009-0090-z}, doi = {10.1007/S00766-009-0090-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/ElahiYZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/LiLEYB10, author = {Tong Li and Lin Liu and Golnaz Elahi and Eric S. K. Yu and Barrett R. Bryant}, title = {Service Security Analysis Based on i*: An Approach from the Attacker Viewpoint}, booktitle = {Workshop Proceedings of the 34th Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} Workshops 2010, Seoul, Korea, 19-23 July 2010}, pages = {127--133}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/COMPSACW.2010.98}, doi = {10.1109/COMPSACW.2010.98}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/LiLEYB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istar/LiELY10, author = {Tong Li and Golnaz Elahi and Lin Liu and Eric S. K. Yu}, editor = {Jaelson Brelaz de Castro and Xavier Franch and John Mylopoulos and Eric S. K. Yu}, title = {Automated Generation of Attack Routes for Service Security Analysis - {A} Preliminary Report}, booktitle = {Proceedings of the 4\({}^{\mbox{th}}\) International \emph{i}* Workshop, Hammamet, Tunisia, June 07-08, 2010}, series = {{CEUR} Workshop Proceedings}, volume = {586}, pages = {57--61}, publisher = {CEUR-WS.org}, year = {2010}, url = {https://ceur-ws.org/Vol-586/iStar10-paper11.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:56 +0100}, biburl = {https://dblp.org/rec/conf/istar/LiELY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/ElahiY09, author = {Golnaz Elahi and Eric S. K. Yu}, title = {Modeling and analysis of security trade-offs - {A} goal oriented approach}, journal = {Data Knowl. Eng.}, volume = {68}, number = {7}, pages = {579--598}, year = {2009}, url = {https://doi.org/10.1016/j.datak.2009.02.004}, doi = {10.1016/J.DATAK.2009.02.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/ElahiY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/ElahiYZ09, author = {Golnaz Elahi and Eric S. K. Yu and Nicola Zannone}, editor = {Alberto H. F. Laender and Silvana Castano and Umeshwar Dayal and Fabio Casati and Jos{\'{e}} Palazzo Moreira de Oliveira}, title = {A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations}, booktitle = {Conceptual Modeling - {ER} 2009, 28th International Conference on Conceptual Modeling, Gramado, Brazil, November 9-12, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5829}, pages = {99--114}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04840-1\_10}, doi = {10.1007/978-3-642-04840-1\_10}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/er/ElahiYZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/ElahiY09, author = {Golnaz Elahi and Eric S. K. Yu}, title = {Trust Trade-off Analysis for Security Requirements Engineering}, booktitle = {{RE} 2009, 17th {IEEE} International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31 - September 4, 2009}, pages = {243--248}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RE.2009.12}, doi = {10.1109/RE.2009.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/ElahiY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/ElahiLY08, author = {Golnaz Elahi and Zeev Lieber and Eric S. K. Yu}, title = {Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider}, booktitle = {Proceedings of the 32nd Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2008, 28 July - 1 August 2008, Turku, Finland}, pages = {661--666}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/COMPSAC.2008.164}, doi = {10.1109/COMPSAC.2008.164}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/ElahiLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/HorkoffEAY08, author = {Jennifer Horkoff and Golnaz Elahi and Samer Abdulhadi and Eric S. K. Yu}, editor = {Il{-}Yeol Song and Mario Piattini and Yi{-}Ping Phoebe Chen and Sven Hartmann and Fabio Grandi and Juan Trujillo and Andreas L. Opdahl and Fernando Ferri and Patrizia Grifoni and Maria Chiara Caschera and Colette Rolland and Carson Woo and Camille Salinesi and Esteban Zim{\'{a}}nyi and Christophe Claramunt and Flavius Frasincar and Geert{-}Jan Houben and Philippe Thiran}, title = {Reflective Analysis of the Syntax and Semantics of the i* Framework}, booktitle = {Advances in Conceptual Modeling - Challenges and Opportunities, {ER} 2008 Workshops CMLSA, ECDM, FP-UML, M2AS, RIGiM, SeCoGIS, WISM, Barcelona Spain, October 20-23, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5232}, pages = {249--260}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87991-6\_31}, doi = {10.1007/978-3-540-87991-6\_31}, timestamp = {Wed, 09 Jun 2021 08:38:38 +0200}, biburl = {https://dblp.org/rec/conf/er/HorkoffEAY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip8-1/ElahiYA08, author = {Golnaz Elahi and Eric S. K. Yu and Maria Carmela Annosi}, editor = {Janis Stirna and Anne Persson}, title = {Modeling Knowledge Transfer in a Software Maintenance Organization - An Experience Report and Critical Analysis}, booktitle = {The Practice of Enterprise Modeling, First {IFIP} {WG} 8.1 Working Conference, PoEM 2008, Stockholm, Sweden, November 12-13, 2008. Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {15}, pages = {15--29}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89218-2\_2}, doi = {10.1007/978-3-540-89218-2\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip8-1/ElahiYA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/ElahiY07, author = {Golnaz Elahi and Eric S. K. Yu}, editor = {Christine Parent and Klaus{-}Dieter Schewe and Veda C. Storey and Bernhard Thalheim}, title = {A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs}, booktitle = {Conceptual Modeling - {ER} 2007, 26th International Conference on Conceptual Modeling, Auckland, New Zealand, November 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4801}, pages = {375--390}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75563-0\_26}, doi = {10.1007/978-3-540-75563-0\_26}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/er/ElahiY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euromicro/JaferianESS05, author = {Pooya Jaferian and Golnaz Elahi and Mohammad Reza Ayatollahzadeh Shirazi and Babak Sadeghian}, title = {RUPSec : Extending Business Modeling and Requirements Disciplines of {RUP} for Developing Secure Systems}, booktitle = {31st {EUROMICRO} Conference on Software Engineering and Advanced Applications {(EUROMICRO-SEAA} 2005), 30 August - 3 September 2005, Porto, Portugal}, pages = {232--239}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.ieeecomputersociety.org/10.1109/EURMIC.2005.52}, doi = {10.1109/EURMIC.2005.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euromicro/JaferianESS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wec/ShiraziJEBS05, author = {Mohammad Reza Ayatollahzadeh Shirazi and Pooya Jaferian and Golnaz Elahi and Hamidreza Baghi and Babak Sadeghian}, editor = {Cemal Ardil}, title = {RUPSec: An Extension on {RUP} for Developing Secure Systems - Requirements Discipline}, booktitle = {The Second World Enformatika Conference, WEC'05, February 25-27, 2005, Istanbul, Turkey, {CDROM}}, pages = {208--212}, publisher = {Enformatika, {\c{C}}anakkale, Turkey}, year = {2005}, timestamp = {Mon, 04 Jun 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wec/ShiraziJEBS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.