Author of the publication

Formal derivation of security design specifications from security requirements.

, , and . CSIIRW, page 10:1-10:3. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards safe and productive development of secure software: FADES and model-based software engineering., , and . CSIIRW, page 20. ACM, (2010)Information Uses and Gratifications Related to Crisis: Student Perceptions since the Egyptian Uprising., , , , , , and . ISCRAM, ISCRAM Association, (2019)Integrating Formal Analysis and Design to Preserve Security Properties., , , and . HICSS, page 1-10. IEEE Computer Society, (2009)Between a Rock and a Cell Phone: Communication and Information Technology Use during the 2011 Uprisings in Tunisia and Egypt., , , , , , , and . Int. J. Inf. Syst. Crisis Response Manag., 5 (1): 1-21 (2013)Goal-Oriented Software Security Engineering: The Electronic Smart Card Case Study., , , and . CSE (3), page 213-218. IEEE Computer Society, (2009)Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements., , , and . ARES, page 1443-1450. IEEE Computer Society, (2008)Quantified extreme scenario based design approach., , and . SAC, page 1117-1122. ACM, (2013)Between a rock and a cell phone: Communication and information technology use during the 2011 Egyptian uprising., , , , , , , and . ISCRAM, Simon Fraser University, Vancouver, Canada, (2012)Formal derivation of security design specifications from security requirements., , and . CSIIRW, page 10:1-10:3. ACM, (2008)ChameleonSoft: A moving target defense system., , and . CollaborateCom, page 241-250. ICST / IEEE, (2011)