The Open UniversitySkip to content
 

Items Authored or Edited by Bashar Nuseibeh

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [Create Shortened URL] SURL
Number of items: 96.

Edited Book

Nuseibeh, Bashar and Zave, Pamela eds. (2010). Software Requirements and Design: The Work of Michael Jackson. Good Friends Publishing Company.

Book Chapter

Tun, Thein; Yu, Yijun; Jackson, Michael; Laney, Robin and Nuseibeh, Bashar (2013). Aspect interactions: a requirements engineering perspective. In: Moreira, Ana; Chitchyan, Ruzanna; Araujo, João and Rashid, Awais eds. Aspect-Oriented Requirements Engineering. Heidelberg: Springer, pp. 271–286. file

Saleem, Saad Bin; Montrieux, Lionel; Yu, Yijun; Tun, Thein and Nuseibeh, Bashar (2013). Maintaining security requirements of software systems using evolving crosscutting dependencies. In: Chitchyan, Ruzanna; Moreira, Ana; Araujo, Joao and Rashid, Awais eds. Aspect Oriented Requirements Engineering. Springer. file

Trew, Tim; Botterweck, Goetz and Nuseibeh, Bashar (2011). A reference architecture for consumer electronics products and its application in requirements engineering. In: Avgeriou, P.; Grundy, J.; Hall, J. G.; Lago, P. and Mistrik, I. eds. Relating Software Requirements and Architectures. Heidelberg, Germany and London, UK and New York, USA: Springer, pp. 203–231. file

Bandara, Arosha; Shinpei, Hayashi; Jurjens, Jan; Kaiya, Haruhiko; Kubo, Atsuto; Laney, Robin; Mouratidis, Haris; Nhlabatsi, Armstrong; Nuseibeh, Bashar; Tahara, Yasuyuki; Tun, Thein; Washizaki, Hironori; Yoshioka, Nobukazi and Yu, Yijun (2010). Security patterns: comparing modeling approaches. In: Mouratidis, Haris ed. Software Engineering for Secure Systems: Industrial and Research Perspectives. Hershey, PA: IGI Global, pp. 75–111.

Tun, Thein Than; Yu, Yijun; Laney, Robin and Nuseibeh, Bashar (2009). Early identification of problem interactions: A tool-supported approach. In: Glinz, Martin and Heymans, Patrick eds. Requirements Engineering: Foundation for Software Quality, 15th International Working Conference. Lecture Notes in Computer Science (5512). Germany: Springer Verlag, pp. 74–88. file

Haley, Charles B; Laney, Robin; Moffett, Jonathan D and Nuseibeh, Bashar (2008). Arguing satisfaction of security requirements. In: Nemati, Hamid ed. Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, Volume 4. Information Science Reference.

Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar (2006). Arguing satisfaction of security requirements. In: Mouratidis, Haralambos and Giorgini, Paolo eds. Integrating security and software engineering: advances and future vision. Hershey, PA and London: Idea Group Publishing, pp. 15–42. file

Buckingham Shum, Simon; Selvin, A.M.; Sierhuis, Maarten; Conklin, Jeffrey; Haley, C.B. and Nuseibeh, Bashar (2006). Hypermedia support for argumentation-based rationale: 15 years on from gIBIS and QOC. In: Dutoit, A.; McCall, R.; Mistrik, I. and Paech, B. eds. Rationale Management in Software Engineering. Berlin: Springer-Verlag, pp. 111–132. file

Haley, Debra; Nuseibeh, Bashar; Thomas, Pete; Taylor, Josie and Lefrere, Paul (2005). The Learning Grid and E-Assessment using Latent Semantic Analysis. In: Ritrovato, P.; Allison, C.; Cerri, S.; Dimitrakos, T.; Gaeta, M. and Salerno, S. eds. Towards the Learning Grid. Advances in Human Learning Services. Frontiers in Artificial Intelligence and Applications, Volume. Amsterdam, Holland: IOS Press. file

Barroca, Leonor; Fiadeiro, J.L.; Jackson, M.; Laney, Robin and Nuseibeh, B. (2004). Problem frames: a case for coordination. In: De Nicola, Rocco; Ferrari, Gianluigi and Meredith, Greg eds. Coordination models and languages: 6th International Conference, COORDINATION 2004 Pisa Italy, February 24-27, 2004: Proceedings. Lecture notes in computer science, 2949 (2949/2004). Heidleburg, Germany: Springer, pp. 5–19.

Lin, Luncheng; Nuseibeh, Bashar; Ince, Darrel and Jackson, Michael (2004). Using abuse frames to bound the scope of security problems. In: Not Set ed. 12th IEEE International Requirements Engineering Conference (RE'04). IEEE Computer Society, pp. 354–355. file

Journal Article

Taubenberger, Stefan; Jurjens, Jan; Yu, Yijun and Nuseibeh, Bashar (2013). Resolving vulnerability identification errors using security requirements on business process models. Information Management and Computer Security, 21(3) pp. 202–223. file

Tun, Thein; Laney, Robin; Yu, Yijun and Nuseibeh, Bashar (2013). Specifying software features for composition: a tool-supported approach. Computer Networks, 57(12) pp. 2454–2464. file

Salifu, Mohammed; Yu, Yijun; Bandara, Arosha K. and Nuseibeh, Bashar (2012). Analysing monitoring and switching problems for adaptive systems. Journal of Systems and Software, 85(12) pp. 2829–2839.

Yang, Hui; Willis, Alistair; De Roeck, Anne and Nuseibeh, Bashar (2012). A hybrid model for automatic emotion recognition in suicide notes. Biomedical Informatics Insights, 5(Supp 1) pp. 17–30. file

Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo ; Willis, Alistair and Nuseibeh, Bashar (2011). Analysing anaphoric ambiguity in natural language requirements. Requirements Engineering, 16(3) pp. 163–189. file

Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2010). Requirements-driven design of service-oriented interactions. IEEE Software, 27(6) pp. 25–32. file

Nhlabatsi, Armstrong; Nuseibeh, Bashar and Yu, Yijun (2010). Security requirements engineering for evolving software systems: a survey. International Journal of Secure Software Engineering (IJSSE), 1(1) pp. 54–73. file

Nuseibeh, Bashar; Haley, Charles B. and Foster, Craig (2009). Securing the skies: In requirements we trust. Computer, 42(9) pp. 64–72.

Tun, Thein Than; Trew, Tim; Jackson, Michael; Laney, Robin and Nuseibeh, Bashar (2009). Specifying features of an evolving software system. Software: Practice and Experience, 39(11) pp. 973–1002. file

Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar (2008). Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Transactions on Software Engineering, 34(1) pp. 133–153. file

Richards, Mike; Price, Blaine A. and Nuseibeh, Bashar (2008). Placing computer security at the heart of learning. Progress in Informatics, 5(2008) pp. 91–98. file

Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar (2006). Using trust assumptions with security requirements. Requirements Engineering, 11(2) pp. 138–151.

Quinn, Brendan; Barroca, Leonor; Nuseibeh, Bashar; Fernandez-Ramil, Juan; Rapanotti, Lucia; Thomas, Pete and Wermelinger, Michel (2006). Learning software engineering at a distance. IEEE Software, 23(6) pp. 36–43. file

Hall, J.G.; Mistrik, I.; Nuseibeh, B. and Silva, A. (2005). Editorial: Relating software requirements and architectures. IEE Proceedings: Software, 152(4) pp. 141–142.

Price, Blaine A.; Adam, Karim and Nuseibeh, Bashar (2005). Keeping ubiquitous computing to yourself: a practical model for user control of privacy. International Journal of Human-Computer Studies, 63(1-2) pp. 228–253. file

Crook, Robert; Ince, Darrel and Nuseibeh, Bashar (2003). Modelling access policies using roles in requirements engineering. Information and Software Technology, 45(14) pp. 979–991.

Gervasi, Vincenzo and Nuseibeh, Bashar (2002). Lightweight Validation of Natural Language Requirements. Software: Practice and Experience, 32(2) pp. 113–133.

Nuseibeh, B. (2001). Weaving together requirements and architecture. Computer, 34(3) pp. 115–119. file

Conference Item

Chen, Bihuan; Peng, Xin; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyun (2014). Self-adaptation through incremental generative model transformations at runtime. In: 36th International Conference on Software Engineering (ICSE 2014), 31 May-7 June, 2014, Hyderabad, India (Forthcoming), ACM/IEEE. file

Bennaceur, Amel; Bandara, Arosha; Jackson, Michael; Liu, Wei; Montrieux, Lionel; Tun, Thein; Yu, Yijun and Nuseibeh, Bashar (2014). Requirements-driven mediation for collaborative security. In: SEAMS'14 - The 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2-3 June 2014, Hyderabad (forthcoming). file

Pasquale, Liliana; Ghezzi, Carlo; Menghi, Claudio; Tsigkanos, Christos and Nuseibeh, Bashar (2014). Topology aware adaptive security. In: 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS'14), 2-3 June 2014, Hyderabad, India (Forthcoming). file

Pasquale, Liliana; Yu, Yijun; Salehie, Mazeiar; Cavallaro, Luca; Tun, Thein Than and Nuseibeh, Bashar (2013). Requirements-driven adaptive digital forensics. In: 21st IEEE Requirements Engineering Conference, 15-19 July, 2013, Rio de Janeiro, Brazil. file

Omoronyia, Inah; Cavallaro, Luca; Salehie, Mazeiar; Pasquale, Liliana and Nuseibeh, Bashar (2013). Engineering adaptive privacy: on the role of privacy awareness requirements. In: 35th International Conference on Software Engineering (ICSE 2013), 18-26 May 2013, San Francisco, CA, USA (forthcoming), pp. 632–641. file

Pasquale, Liliana; Menghi, Claudio; Salehie, Mazeiar; Cavallaro, Luca; Omoronyia, Inah and Nuseibeh, Bashar (2012). SecuriTAS: a tool for engineering adaptive security. In: ACM SIGSOFT 20th International Symposium on Foundations of Software Engineering (FSE 2012), 11-16 November 2012, North Carolina, USA. file

Ali, Raian; Solis, Carlos; Omoronyia, Inah; Salehie, Mazeiar and Nuseibeh, Bashar (2012). Social adaptation: when software gives users a voice. In: ENASE 2012: 7th International Conference Evaluation of Novel Approaches to Software Engineering , 28-30 June 2012, Wroclaw, Poland. file

Lopez, Tamara; Petre, Marian and Nuseibeh, Bashar (2012). Getting at ephemeral flaws. In: Cooperative and Human Aspects of Software Engineering (CHASE), 2012 5th International Workshop on, 2 June, 2012, Zurich.

Alebrahim, Azadeh; Tun, Thein Than; Yu, Yijun; Heisel, Maritta and Nuseibeh, Bashar (2012). An aspect-oriented approach to relating security requirements and access control. In: CAiSE'12 Forum, 28 June 2012, Gdansk, Poland. file

Tun, Thein Than; Bandara, Arosha K.; Price, Blaine A.; Yu, Yijun; Haley, Charles; Omoronyia, Inah and Nuseibeh, Bashar (2012). Privacy arguments: analysing selective disclosure requirements for mobile applications. In: 20th IEEE International Requirements Engineering Conference, 24-28 September 2012 , Chicago, Illinois, pp. 131–140. file

Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair and Nuseibeh, Bashar (2012). Speculative requirements: automatic detection of uncertainty in natural language requirements. In: The 20th IEEE International Requirements Engineering Conference, 24-28 September 2012, Chicago, ILL, USA, IEEE, pp. 11–20. file

Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah and Nuseibeh, Bashar (2012). Adaptive security and privacy in smart grids: A software engineering vision. In: Software Engineering for the Smart Grid (SE4SG), 2012 International Workshop, 3 June 2012 , University of Zurich. file

Pasquale, Liliana; Salehie, Mazeiar; Ali, Raian; Omoronyia, Inah and Nuseibeh, Bashar (2012). On the role of primary and secondary assets in adaptive security: An application in smart grids. In: Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2012 ICSE Workshop , 4-5 June 2012, Switzerland. file

Omoronyia, Inah; Pasquale, Liliana; Salehie, Mazeiar; Cavallaro, Luca; Doherty, Gavin and Nuseibeh, Bashar (2012). Caprice: a tool for engineering adaptive privacy. In: 27th IEEE/ACM International Conference on Automated Software Engineering (ASE 2012), 3-7 September 2012, Essen, Germany. file

Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian and Nuseibeh, Bashar (2012). Requirements-driven adaptive security: protecting variable assets at runtime. In: 20th International Requirements Engineering Conference (RE'12), 24-28 September 2012, Chicago, USA, pp. 111–120. file

Yu, Yijun; Tun, Thein and Nuseibeh, Bashar (2011). Specifying and detecting meaningful changes in programs. In: 26th IEEE/ACM International Conference On Automated Software Engineering, 6-10 Nov 2011, Lawrence, Kansas, USA , pp. 273–282. file

Yu, Yijun; Bandara, Arosha; Tun, Thein Than and Nuseibeh, Bashar (2011). Towards learning to detect meaningful changes in software. In: Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering, 12 November 2011, Lawrence, Kansas, ACM, pp. 51–54. file

Ali, Raian; Solís, Carlos; Salehie, Mazeiar; Omoronyia, Inah; Nuseibeh, Bashar and Maalej, Walid (2011). Social sensing: when users become monitors. In: 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering (ESEC/FSE 2011), 5-9 September 2011, Szeged, Hungary. file

Yu, Yijun; Tun, Thein; Tedeschi, Alessandra; Franqueira, Virginia N. L. and Nuseibeh, Bashar (2011). OpenArgue: supporting argumentation to evolve secure software systems. In: 19th IEEE International Requirements Engineering Conference, 29 Aug - 02 Sep 2011 , pp. 351–352. file

Franqueira, Virginia Nunes Leas; Tun, Thein Than; Yu, Yijun; Wieringa, Roel and Nuseibeh, Bashar (2011). Risk and argument: a risk-based argumentation method for practical security. In: 19th IEEE International Conference on Requirements Engineering, 29 Aug - 2 Sep 2011, Trento, Italy, pp. 239–248. file

Benats, Guillaume; Bandara, Arosha; Yu, Yijun; Colin, Jean-Noel and Nuseibeh, Bashar (2011). PrimAndroid: privacy policy modelling and analysis for Android applications. In: IEEE International Symposium on Policies for Distributed Systems and Networks, 6-8 June 2011, Pisa, Italy. file

Borges, Rafael V.; Garcez, Artur D'Avila; Lamb, Luís C. and Nuseibeh, Bashar (2011). Learning to adapt requirements specifications of evolving systems (NIER Track). In: 33rd International Conference on Software Engineering (ICSE 2011), 21-28 May 2011, Honolulu, Hawaii, USA. file

Mancini, Clara; Rogers, Yvonne; Thomas, Keerthi; Joinson, Adam; Price, Blaine; Bandara, Arosha; Jedrzejczyk, Lukasz and Nuseibeh, Bashar (2011). In the best families: tracking and relationships. In: 29th International ACM Conference on Human Factors in Computing Systems, ACM CHI 2011, 07-12 May 2011, Vancouver, Canada, pp. 2419–2428. file

Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha and Nuseibeh, Bashar (2010). “Privacy-shake”: a haptic interface for managing privacy settings in mobile location sharing applications. In: MobileHCI '10: Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services, 7-10 September 2010, Libon, Portugal, ACM, pp. 411–412. file

Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha K. and Nuseibeh, Bashar (2010). On the impact of real-time feedback on users' behaviour in mobile location-sharing applications. In: SOUPS '10: Proceedings of the Sixth Symposium on Usable Privacy and Security, 14-16 July 2010, ACM, pp. 1–12. file

Tun, Thein Than; Yu, Yijun; Haley, C. and Nuseibeh, B. (2010). Model-Based argument analysis for evolving security requirements. In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, 9-11 September 2010, Singapore, IEEE, pp. 88–97. file

Mancini, Clara; Rogers, Yvonne; Bandara, Arosha; Coe, Tony; Jedrzejczyk, Lukasz; Joinson, Adam; Price, Blaine; Thomas, Keerthi and Nuseibeh, Bashar (2010). Contravision: Exploring users' reactions to futuristic technology. In: Proceedings of the 28th International Conference on Human factors in computing systems, 10-15 April 2010, Atlanta Georgia, USA, pp. 153–162. file

Price, Blaine A.; Mancini, Clara; Rogers, Yvonne; Bandara, Arosha K.; Coe, Tony; Joinson, Adam N.; Lay, Jeffery A. and Nuseibeh, Bashar (2010). ContraVision: presenting contrasting visions of future technology. In: 28th International Conference on Human Factors in Computing Systems, 10-15 Apr 2010, Atlanta, GA, USA, pp. 4759–4764. filefile

Yang, Hui; Willis, Alistair; De Roeck, Anne and Nuseibeh, Bashar (2010). Automatic detection of nocuous coordination ambiguities in natural language requirements. In: The IEEE/ACM international conference on Automated software engineering (ASE'10), 20–24 Sep 2010, Antwerp, Belgium, ACM, pp. 53–62. file

Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair and Nuseibeh, Bashar (2010). Extending Nocuous Ambiguity Analysis for Anaphora in Natural Language Requirements. In: 18th International IEEE Requirements Engineering Conference (RE'10), 27 Sep - 1 Oct 2010, Sydney, Australia, pp. 25–34.

Yang, Hui; De Roeck, Anne; Willis, Alistair and Nuseibeh, Bashar (2010). A methodology for automatic identification of nocuous ambiguity. In: The 23rd International Conference on Computational Linguistics (Coling 2010), 23-27 Aug 2010, Beijing, China, pp. 1218–1226. file

Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2009). Requirements-driven collaborative choreography customization. In: 7th International Joint Conference on Service Oriented Computing, 23-27 November 2009, Stockholm, Sweden. file

Gacitua, R.; Ma, L.; Nuseibeh, B.; Piwek, P.; De Roeck, A.; Rouncefield, M.; Sawyer, P.; Willis, A. and Yang, H. (2009). Making tacit requirements explicit. In: Second International Workshop on Managing Requirements Knowledge (MaRK’09) , 1 Sep 2009, Altanta, USA.

Ma, Lin; Nuseibeh, Bashar; Piwek, Paul; De Roeck, Anne and Willis, Alistair (2009). On presuppositions in requirements. In: 2009 Second International Workshop on Managing Requirements Knowledge (MaRK'09), 1 September 2009, Atlanta, Georgia, USA. file

Tun, Thein; Jackson, Michael; Laney, Robin; Nuseibeh, Bashar and Yu, Yijun (2009). Are your lights off? Using problem frames to diagnose system failures. In: 17th IEEE International Requirements Engineering Conference, 31 August - 4 September 2009, Atlanta, Georgia, USA. restricted access item, not available for direct download

Thomas, Keerthi; Mancini, Clara; Jedrzejczyk, Lukasz; Bandara, Arosha K.; Joinson, Adam; Price, Blaine A.; Rogers, Yvonne and Nuseibeh, Bashar (2009). Studying location privacy in mobile applications: 'predator vs. prey' probes. In: Proceedings of the 5th Symposium on Usable Privacy and Security, 15-17 July 2009, California, ACM, p. 1. file

Nhlabatsi, Armstrong; Laney, Robin and Nuseibeh, Bashar (2009). Feature interaction as a context sharing problem. In: International Conference on Feature Interactions, 11-12 June, University of Lisbon, Portugal.

Tun, Thein; Chapman, Rod; Haley, Charles; Laney, Robin and Nuseibeh, Bashar (2009). A framework for developing feature-rich software systems. In: 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2009), 14-16 April 2009, San Francisco, California, USA. file

Mancini, Clara; Thomas, Keerthi; Rogers, Yvonne; Price, Blaine A.; Jedrzejczyk, Lukazs; Bandara, Arosha K.; Joinson, Adam N. and Nuseibeh, Bashar (2009). From spaces to places: Emerging contexts in mobile privacy. In: Proceedings of the 11th International conference on Ubiquitous computing, 30 Sept - 3 Oct 2009, Orlando, Florida, USA, ACM, pp. 1–10. file

Mancini, Clara; Rogers, Yvonne; Jedrzejczyk, Lukasz; Thomas, Keerthi; Price, Blaine; Joinson, Adam; Bandara, Arosha and Nuseibeh, Bashar (2009). A multi-pronged empirical approach to mobile privacy investigation. In: Workshop on Mobile User Experience Research: Challenges, Methods & Tools. 27th ACM International Conference on Human Factors in Computing Systems, ACM CHI 2009, 4-9 Apr 2009, Boston, USA. file

Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2009). From organizational requirements to service choreography. In: 2009 IEEE Congress on Services (SERVICES 2009), 6-10 July, 2009, Los Angeles, CA, USA. file

Classen, Andreas; Heymans, Patrick; Tun, Thein and Nuseibeh, Bashar (2009). Towards safer composition. In: 31st International Conference on Software Engineering, 16-24 May 2009, Vancouver, BC, pp. 227–230. file

Lozano Rodriguez, Angela; Wermelinger, Michel and Nuseibeh, Bashar (2008). Evaluating the relation between changeability decay and the characteristics of clones and methods. In: 4th International ERCIM Workshop on Software Evolution and Evolvability, 15-16 September 2008, L'Aquila, Italy, IEEE, pp. 100–109. file

Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2008). Customizing choreography: Deriving conversations from organizational dependencies. In: 12th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2008), 15-19 September 2008, München, Germany. file

Haley, Charles B. and Nuseibeh, Bashar (2008). Bridging requirements and architecture for systems of systems. In: 3rd International Symposium on Information Technology (ITSIM'08), 26-28 Aug 2008, Kuala Lumpur, Malaysia.

Salifu, Mohammed; Yu, Yijun and Nuseibeh, Bashar (2007). Specifying Monitoring and Switching Problems in Context. In: 15th IEEE International Requirements Engineering Conference (RE 2007), 15 Oct - 19 Oct 2007, Delhi, India.

Classen, Andreas; Heymans, Patrick; Laney, Robin; Nuseibeh, Bashar and Tun, Thein Than (2007). On the structure of problem variability: From feature diagrams to problem frames. In: Proceedings of International workshop on Variability Modeling of Software-intensive Systems, 16-18 January 2007, Limerick, Ireland, pp. 109–118. file

Salifu, Mohammed; Nuseibeh, Bashar; Rapanotti, Lucia and Tun, Thein Than (2007). Using problem descriptions to represent variabilities for context-aware applications. In: Proceedings of 1st International workshop on Variability Modeling of Software-intensive Systems (VaMoS 2007), 16-18 Jan 2007, Limerick, Ireland, pp. 149–156. file

Laney, Robin; Tun, Thein Than; Jackson, Michael and Nuseibeh, Bashar (2007). Composing features by managing inconsistent requirements. In: Proceedings of 9th International Conference on Feature Interactions in Software and Communication Systems (ICFI 2007), 3-5 September 2007, Grenoble, France, pp. 141–156. file

Chantree, Francis; Nuseibeh, Bashar; De Roeck, Anne and Willis, Alistair (2006). Identifying nocuous ambiguities in natural language requirements. In: Proceedings of 14th IEEE International Requirements Engineering conference (RE'06), 11-15 Sept 2006, Minneapolis/St Paul, Minnesota, USA, IEEE, pp. 56–65.

Haley, Charles B.; Moffett, Jonathan D.; Laney, Robin and Nuseibeh, Bashar (2006). A framework for security requirements engineering. In: Software Engineering for Secure Systems Workshop (SESS'06), co-located with the 28th International Conference on Software Engineering (ICSE'06), 20-21 May 2006, Shanghai, China. file

Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2006). Patterns for service-oriented information exchange requirements. In: PLoP Pattern Languages of Programs 2006, 21-23 October 2006, Portland, Oregon. file

Crook, R.; Ince, D. and Nuseibeh, Bashar (2005). On Modelling access policies: relating roles to their organisational Context. In: Proceedings of 13th IEEE International Conference on Requirements Engineering, 29 Aug-2 Sept 2005, Paris, France.

Haley, Charles B.; Moffett, Jonathan D.; Laney, Robin and Nuseibeh, Bashar (2005). Arguing security: validating security requirements using structured argumentation. In: Third Symposium on Requirements Engineering for Information Security (SREIS'05) held in conjunction with the 13th International Requirements Engineering Conference (RE'05), 29 Aug 2005, Paris, France. file

Rapanotti, L.; Hall, J.G.; Jackson, M. and Nuseibeh, B. (2004). Architecture-driven problem decomposition. In: 12th IEEE International Conference on Requirements Engineering (RE 2004), 6-11 Sep 2004, Kyoto, Japan.

Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar (2004). The Effect of trust assumptions on the elaboration of security requirements. In: 12th IEEE International Requirements Engineering Conference (RE'04), 6-10 Sep 2004, Kyoto, Japan.

Laney, Robin; Barroca, Leonor; Jackson, Michael and Nuseibeh, Bashar (2004). Composing requirements using problem frames. In: 12th International Requirements Engineering Conference, 6-10 Sep 2004, Kyoto, Japan, IEEE, pp. 122–131.

Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar (2004). Using Problem Frames and projections to analyze requirements for distributed systems. In: Proceedings of the Tenth International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'04), co-located with the 16th International Conference on Advanced Information Systems Engineering (CAiSE'04), 7-8 Jun 2004, Riga, Latvia. file

Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar (2004). Picking battles: The impact of trust assumptions on the elaboration of security requirements. In: Proceedings of the Second International Conference on Trust Management (iTrust'04), 29 Mar - 1 Apr 2004, Oxford, UK. file

Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar (2004). Deriving security requirements from crosscutting threat descriptions. In: Proceedings of the Third International Conference on Aspect-Oriented Software Development (AOSD'04), 22-26 Mar 2004, Lancaster, UK, ACM Press, pp. 112–121. file

Haley, Debra; Nuseibeh, Bashar; Sharp, Helen and Taylor, Josie (2004). The conundrum of categorising requirements: managing requirements for learning on the move. In: 12th International Requirements Engineering Conference (RE'04), 6-10 Sept 2004, Kyoto, Japan. file

Haley, Charles and Nuseibeh, Bashar (2003). Going on-line on a shoestring: An experiment in concurrent development of requirements and architecture. In: International Conference on Advances in Infrastructure for Electronic Business, Education, Science, Medicine, and Mobile Technologies on the Internet, 6-12 Jan 2003, L'Aquila Italy. file

Lin, Luncheng; Nuseibeh, Bashar; Ince, Darrel; Jackson, Michael and Moffett, Jonathan (2003). Introducing abuse frames to analyse security requirements. In: Proceedings of the 11th International Conference on Requirements Engineering, 8th-12th Sept 2003, Monterey, USA.

Hall, J.G.; Jackson, M.; Laney, R. C.; Nuseibeh, B. and Rapanotti, L. (2002). Relating software requirements and architectures using problem frames. In: Proceedings of the IEEE Joint International Conference on Requirements Engineering, 2002, 09-13 Sep 2002, Essen, Germany. file

Russo, Alessandra; Miller, Rob; Nuseibeh, Bashar and Kramer, Jeff (2002). An abductive approach for analysing event-based requirements specifications. In: 18th International Conference on Logic Programming, 29 July - 01 August 2002, Copenhagen, Denmark.

Crook, Robert; Ince, Darrel; Lin, Luncheng and Nuseibeh, Bashar (2002). Security Requirements Engineering: when anti-requirements hit the fan. In: Proc IEEE International Conference on Requirements Engineering, 8-13 Sept 2002, Germany.

This list was generated on Thu Apr 24 23:06:21 2014 BST.

Policies | Disclaimer

© The Open University   + 44 (0)870 333 4340   general-enquiries@open.ac.uk