All Stories

  1. “Why can’t I do that?”: Tracing Adaptive Security Decisions
  2. Empowering users of cloud computing on data confidentiality
  3. Reasoning about Security Policies of Services Using Answer Set Programming
  4. Traceability for Adaptive Information Security in the Cloud
  5. Secure Cloud Services: Matrix Multiplication Revisited
  6. Automatic verification of health regulatory compliance in cloud computing
  7. Trust in Cloud Services: Providing More Controls to Clients
  8. Role of contextual properties in enterprise service migration to cloud computing
  9. Developing and Evaluating Security-Aware Software Systems
  10. Social access control language (SocACL)
  11. Addressing security compatibility for multi-tenant cloud services
  12. Modeling security importance and preferences of software services
  13. Security oriented service composition: A framework
  14. Security-Aware Systems Applications and Software Development Methods
  15. Software Security Engineering
  16. Software Security Engineering
  17. Tracking and Constraining Authorization Provenance
  18. State of Sharing Clinical Information in a Healthcare System in the Gulf
  19. Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems
  20. Constraint-enhanced role engineering via answer set programming
  21. Identifying Contextual Properties of Software Architecture in Cloud Computing
  22. Ell Secure Information System Using Modal Logic Technique
  23. Cloud computing without seeing
  24. Profile-Based Security Assurances for Service Software
  25. Establishing Trust in Cloud Computing
  26. A Tool Support for Secure Software Integration
  27. Wireless Networks
  28. SecCom: A Prototype for Integrating Security-Aware Components
  29. Managing Web Service Quality
  30. Assessing quality of web based systems
  31. Specifying Security Goals of Component Based Systems: An End-User Perspective
  32. Security-Oriented Service Composition and Evolution
  33. Managing Corporate Information Systems Evolution and Maintenance
  34. Integrating Security Properties with Systems Design Artefacts
  35. Tasks and Methods for Software Maintenance: a process oriented framework
  36. Types of software evolution and software maintenance
  37. Security Properties of Software Components
  38. Adoption versus abandonment of CASE tools: lessons from two organizations
  39. Security-Aware Service Specification for Healthcare Information Systems
  40. A Decision Support System for Selecting Secure Web Services
  41. Ell Secure Information System Using Modal Logic Technique
  42. A Tool Support for Secure Software Integration
  43. A Decision Support System for Selecting Secure Web Services
  44. Security-Aware Service Specification for Healthcare Information Systems
  45. A Decision Support System for Selecting Secure Web Services