BibTeX records: Golnaz Elahi

download as .bib file

@phdthesis{DBLP:phd/ca/Elahi12,
  author       = {Golnaz Elahi},
  title        = {Making Trade-offs among Security and Other Requirements during System
                  Design},
  school       = {University of Toronto, Canada},
  year         = {2012},
  url          = {http://hdl.handle.net/1807/32704},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ca/Elahi12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/ElahiY12,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu},
  title        = {Comparing alternatives for analyzing requirements trade-offs - In
                  the absence of numerical data},
  journal      = {Inf. Softw. Technol.},
  volume       = {54},
  number       = {6},
  pages        = {517--530},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.infsof.2011.10.007},
  doi          = {10.1016/J.INFSOF.2011.10.007},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/ElahiY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/ElahiY11,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu},
  editor       = {Selmin Nurcan},
  title        = {A Semi-Automated Tool for Requirements Trade-off Analysis},
  booktitle    = {Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {734},
  pages        = {9--16},
  publisher    = {CEUR-WS.org},
  year         = {2011},
  url          = {https://ceur-ws.org/Vol-734/PaperDemo02.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:34 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/ElahiY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/ElahiASSY11,
  author       = {Golnaz Elahi and
                  Tom Aratyn and
                  Ramanan Sivaranjan and
                  Rohit Sethi and
                  Eric S. K. Yu},
  editor       = {Selmin Nurcan},
  title        = {{SD} Elements: {A} Tool for Secure Application Development Management},
  booktitle    = {Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {734},
  pages        = {81--88},
  publisher    = {CEUR-WS.org},
  year         = {2011},
  url          = {https://ceur-ws.org/Vol-734/PaperDemo11.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/ElahiASSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ElahiYLL11,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu and
                  Tong Li and
                  Lin Liu},
  title        = {Security Requirements Engineering in the Wild: {A} Survey of Common
                  Practices},
  booktitle    = {Proceedings of the 35th Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22
                  July 2011},
  pages        = {314--319},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/COMPSAC.2011.48},
  doi          = {10.1109/COMPSAC.2011.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ElahiYLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ElahiY11,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu},
  title        = {A Semi-automated Decision Support Tool for Requirements Trade-Off
                  Analysis},
  booktitle    = {Proceedings of the 35th Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22
                  July 2011},
  pages        = {466--475},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/COMPSAC.2011.67},
  doi          = {10.1109/COMPSAC.2011.67},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ElahiY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esem/ElahiYZ11,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu and
                  Nicola Zannone},
  editor       = {James Walden and
                  Laurie A. Williams},
  title        = {Security Risk Management by Qualitative Vulnerability Analysis},
  booktitle    = {Third International Workshop on Security Measurements and Metrics,
                  Metrisec@ESEM 2011, Banff, Alberta, Canada, September 21, 2011},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/Metrisec.2011.12},
  doi          = {10.1109/METRISEC.2011.12},
  timestamp    = {Mon, 07 Sep 2020 10:46:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esem/ElahiYZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ElahiY11,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu},
  editor       = {William C. Chu and
                  W. Eric Wong and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Requirements trade-offs analysis in the absence of quantitative measures:
                  a heuristic method},
  booktitle    = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC),
                  TaiChung, Taiwan, March 21 - 24, 2011},
  pages        = {651--658},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1982185.1982331},
  doi          = {10.1145/1982185.1982331},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/ElahiY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/ElahiYZ10,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu and
                  Nicola Zannone},
  title        = {A vulnerability-centric requirements engineering framework: analyzing
                  security attacks, countermeasures, and requirements based on vulnerabilities},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {1},
  pages        = {41--62},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-009-0090-z},
  doi          = {10.1007/S00766-009-0090-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/ElahiYZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/LiLEYB10,
  author       = {Tong Li and
                  Lin Liu and
                  Golnaz Elahi and
                  Eric S. K. Yu and
                  Barrett R. Bryant},
  title        = {Service Security Analysis Based on i*: An Approach from the Attacker
                  Viewpoint},
  booktitle    = {Workshop Proceedings of the 34th Annual {IEEE} International Computer
                  Software and Applications Conference, {COMPSAC} Workshops 2010, Seoul,
                  Korea, 19-23 July 2010},
  pages        = {127--133},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/COMPSACW.2010.98},
  doi          = {10.1109/COMPSACW.2010.98},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/LiLEYB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istar/LiELY10,
  author       = {Tong Li and
                  Golnaz Elahi and
                  Lin Liu and
                  Eric S. K. Yu},
  editor       = {Jaelson Brelaz de Castro and
                  Xavier Franch and
                  John Mylopoulos and
                  Eric S. K. Yu},
  title        = {Automated Generation of Attack Routes for Service Security Analysis
                  - {A} Preliminary Report},
  booktitle    = {Proceedings of the 4\({}^{\mbox{th}}\) International \emph{i}* Workshop,
                  Hammamet, Tunisia, June 07-08, 2010},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {586},
  pages        = {57--61},
  publisher    = {CEUR-WS.org},
  year         = {2010},
  url          = {https://ceur-ws.org/Vol-586/iStar10-paper11.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:56 +0100},
  biburl       = {https://dblp.org/rec/conf/istar/LiELY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/ElahiY09,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu},
  title        = {Modeling and analysis of security trade-offs - {A} goal oriented approach},
  journal      = {Data Knowl. Eng.},
  volume       = {68},
  number       = {7},
  pages        = {579--598},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.datak.2009.02.004},
  doi          = {10.1016/J.DATAK.2009.02.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/ElahiY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/ElahiYZ09,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu and
                  Nicola Zannone},
  editor       = {Alberto H. F. Laender and
                  Silvana Castano and
                  Umeshwar Dayal and
                  Fabio Casati and
                  Jos{\'{e}} Palazzo Moreira de Oliveira},
  title        = {A Modeling Ontology for Integrating Vulnerabilities into Security
                  Requirements Conceptual Foundations},
  booktitle    = {Conceptual Modeling - {ER} 2009, 28th International Conference on
                  Conceptual Modeling, Gramado, Brazil, November 9-12, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5829},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04840-1\_10},
  doi          = {10.1007/978-3-642-04840-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/er/ElahiYZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/ElahiY09,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu},
  title        = {Trust Trade-off Analysis for Security Requirements Engineering},
  booktitle    = {{RE} 2009, 17th {IEEE} International Requirements Engineering Conference,
                  Atlanta, Georgia, USA, August 31 - September 4, 2009},
  pages        = {243--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/RE.2009.12},
  doi          = {10.1109/RE.2009.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/ElahiY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ElahiLY08,
  author       = {Golnaz Elahi and
                  Zeev Lieber and
                  Eric S. K. Yu},
  title        = {Trade-off Analysis of Identity Management Systems with an Untrusted
                  Identity Provider},
  booktitle    = {Proceedings of the 32nd Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2008, 28 July - 1 August 2008,
                  Turku, Finland},
  pages        = {661--666},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/COMPSAC.2008.164},
  doi          = {10.1109/COMPSAC.2008.164},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/ElahiLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/HorkoffEAY08,
  author       = {Jennifer Horkoff and
                  Golnaz Elahi and
                  Samer Abdulhadi and
                  Eric S. K. Yu},
  editor       = {Il{-}Yeol Song and
                  Mario Piattini and
                  Yi{-}Ping Phoebe Chen and
                  Sven Hartmann and
                  Fabio Grandi and
                  Juan Trujillo and
                  Andreas L. Opdahl and
                  Fernando Ferri and
                  Patrizia Grifoni and
                  Maria Chiara Caschera and
                  Colette Rolland and
                  Carson Woo and
                  Camille Salinesi and
                  Esteban Zim{\'{a}}nyi and
                  Christophe Claramunt and
                  Flavius Frasincar and
                  Geert{-}Jan Houben and
                  Philippe Thiran},
  title        = {Reflective Analysis of the Syntax and Semantics of the i* Framework},
  booktitle    = {Advances in Conceptual Modeling - Challenges and Opportunities, {ER}
                  2008 Workshops CMLSA, ECDM, FP-UML, M2AS, RIGiM, SeCoGIS, WISM, Barcelona
                  Spain, October 20-23, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5232},
  pages        = {249--260},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87991-6\_31},
  doi          = {10.1007/978-3-540-87991-6\_31},
  timestamp    = {Wed, 09 Jun 2021 08:38:38 +0200},
  biburl       = {https://dblp.org/rec/conf/er/HorkoffEAY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip8-1/ElahiYA08,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu and
                  Maria Carmela Annosi},
  editor       = {Janis Stirna and
                  Anne Persson},
  title        = {Modeling Knowledge Transfer in a Software Maintenance Organization
                  - An Experience Report and Critical Analysis},
  booktitle    = {The Practice of Enterprise Modeling, First {IFIP} {WG} 8.1 Working
                  Conference, PoEM 2008, Stockholm, Sweden, November 12-13, 2008. Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {15},
  pages        = {15--29},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89218-2\_2},
  doi          = {10.1007/978-3-540-89218-2\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip8-1/ElahiYA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/ElahiY07,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu},
  editor       = {Christine Parent and
                  Klaus{-}Dieter Schewe and
                  Veda C. Storey and
                  Bernhard Thalheim},
  title        = {A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs},
  booktitle    = {Conceptual Modeling - {ER} 2007, 26th International Conference on
                  Conceptual Modeling, Auckland, New Zealand, November 5-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4801},
  pages        = {375--390},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75563-0\_26},
  doi          = {10.1007/978-3-540-75563-0\_26},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/er/ElahiY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euromicro/JaferianESS05,
  author       = {Pooya Jaferian and
                  Golnaz Elahi and
                  Mohammad Reza Ayatollahzadeh Shirazi and
                  Babak Sadeghian},
  title        = {RUPSec : Extending Business Modeling and Requirements Disciplines
                  of {RUP} for Developing Secure Systems},
  booktitle    = {31st {EUROMICRO} Conference on Software Engineering and Advanced Applications
                  {(EUROMICRO-SEAA} 2005), 30 August - 3 September 2005, Porto, Portugal},
  pages        = {232--239},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.ieeecomputersociety.org/10.1109/EURMIC.2005.52},
  doi          = {10.1109/EURMIC.2005.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euromicro/JaferianESS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wec/ShiraziJEBS05,
  author       = {Mohammad Reza Ayatollahzadeh Shirazi and
                  Pooya Jaferian and
                  Golnaz Elahi and
                  Hamidreza Baghi and
                  Babak Sadeghian},
  editor       = {Cemal Ardil},
  title        = {RUPSec: An Extension on {RUP} for Developing Secure Systems - Requirements
                  Discipline},
  booktitle    = {The Second World Enformatika Conference, WEC'05, February 25-27, 2005,
                  Istanbul, Turkey, {CDROM}},
  pages        = {208--212},
  publisher    = {Enformatika, {\c{C}}anakkale, Turkey},
  year         = {2005},
  timestamp    = {Mon, 04 Jun 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wec/ShiraziJEBS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics