Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Shareeful Islam
2010 – today
- 2013
[j11]Anca Juliana Stoica, Shareeful Islam: Integrative Educational Approach Oriented Towards Software and System Development. iJEP 3(1): 36-43 (2013)
[j10]Aleksandar Hudic, Shareeful Islam, Peter Kieseberg, Sylvi Rennert, Edgar Weippl: Data Confidentiality using Fragmentation in Cloud Computing. Int. J. Pervasive Computing and Communications 9(1) (2013)
[j9]Reza Alavi, Shareeful Islam, Hamid Jahankhani, Ameer Al-Nemrat: Analyzing Human Factors for an Effective Information Security Management System. IJSSE 4(1): 50-74 (2013)
[j8]Haralambos Mouratidis, Shareeful Islam, Christos Kalloniatis, Stefanos Gritzalis: A framework to support selection of cloud providers based on security and privacy requirements. Journal of Systems and Software 86(9): 2276-2293 (2013)
[c12]Michalis Pavlidis, Haralambos Mouratidis, Christos Kalloniatis, Shareeful Islam, Stefanos Gritzalis: Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions. TrustBus 2013: 185-198- 2012
[j7]Michalis Pavlidis, Haralambos Mouratidis, Shareeful Islam: Modelling Security Using Trust Based Concepts. IJSSE 3(2): 36-53 (2012)
[j6]Shareeful Islam, Haralambos Mouratidis, Christos Kalloniatis, Aleksandar Hudic, Lorenz Zechner: Model Based Process to Support Security and Privacy Requirements Engineering. IJSSE 3(3): 1-22 (2012)
[j5]Haralambos Mouratidis, Christos Kalloniatis, Shareeful Islam, Marc-Philippe Huget, Stefanos Gritzalis: Aligning Security and Privacy to Support the Development of Secure Information Systems. J. UCS 18(12): 1608-1627 (2012)
[j4]Kurt Schneider, Eric Knauss, Siv Hilde Houmb, Shareeful Islam, Jan Jürjens: Enhancing security requirements engineering by organizational learning. Requir. Eng. 17(1): 35-56 (2012)
[c11]Fatemeh Zarrabi, Michalis Pavlidis, Haralambos Mouratidis, Shareeful Islam, David Preston: A Meta-model for Legal Compliance and Trustworthiness of Information Systems. CAiSE Workshops 2012: 46-60
[c10]Fatemeh Zarrabi Jorshari, Haralambos Mouratidis, Shareeful Islam: Extracting security requirements from relevant laws and regulations. RCIS 2012: 1-9
[c9]Michalis Pavlidis, Haralambos Mouratidis, Shareeful Islam, Paul Kearney: Dealing with trust and control: A meta-model for trustworthy information systems development. RCIS 2012: 1-9
[c8]Aleksandar Hudic, Lorenz Zechner, Shareeful Islam, Christian Krieg, Edgar R. Weippl, Severin Winkler, Richard Hable: Towards a Unified Penetration Testing Taxonomy. SocialCom/PASSAT 2012: 811-812- 2011
[b1]Shareeful Islam: Software development risk management model: a goal-driven approach. Technical University Munich 2011, pp. 1-185
[j3]Shareeful Islam, Siv Hilde Houmb: Towards a Framework for Offshore Outsource Software Development Risk Management Model. JSW 6(1): 38-47 (2011)
[j2]Shareeful Islam, Haralambos Mouratidis, Jan Jürjens: A framework to support alignment of secure software engineering with legal regulations. Software and System Modeling 10(3): 369-394 (2011)
[c7]Michalis Pavlidis, Shareeful Islam: SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos. CAiSE Forum 2011: 89-96
[c6]Michalis Pavlidis, Shareeful Islam, Haralambos Mouratidis: A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos. CAiSE Forum (Selected Papers) 2011: 95-109
[c5]Eric Knauss, Siv Hilde Houmb, Kurt Schneider, Shareeful Islam, Jan Jürjens: Supporting Requirements Engineers in Recognising Security Issues. REFSQ 2011: 4-18
[c4]Jan Jürjens, Martín Ochoa, Holger Schmidt, Loïc Marchal, Siv Hilde Houmb, Shareeful Islam: Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications. SFM 2011: 504-526
[e1]Cornelia Boldyreff, Shareeful Islam, Michel Léonard, Bernhard Thalheim (Eds.): Proceedings of the CAiSE Doctoral Consortium 2011, London, United Kingdom, June 21, 2011. CEUR Workshop Proceedings 731, CEUR-WS.org 2011- 2010
[j1]Siv Hilde Houmb, Shareeful Islam, Eric Knauss, Jan Jürjens, Kurt Schneider: Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec. Requir. Eng. 15(1): 63-93 (2010)
[c3]Shareeful Islam, Siv Hilde Houmb: Integrating Risk Management Activities into Requirements Engineering. RCIS 2010: 299-310
[c2]Shareeful Islam, Haralambos Mouratidis, Stefan Wagner: Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations. REFSQ 2010: 255-261
2000 – 2009
- 2009
[c1]Shareeful Islam, M. Mahbubul Alam Joarder, Siv Hilde Houmb: Goal and Risk Factors in Offshore Outsourced Software Development from Vendor's Viewpoint. ICGSE 2009: 347-352
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:23 CEST by the dblp team



