The Open UniversitySkip to content
 

Items Authored or Edited by Charles Haley

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [Create Shortened URL] SURL
Number of items: 19.

Tun, Thein Than; Yu, Yijun; Haley, C. and Nuseibeh, B. (2010). Model-Based argument analysis for evolving security requirements. In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, 9-11 September 2010, Singapore, IEEE, pp. 88–97. file

Montrieux, Lionel; Jürjens, Jan; Haley, Charles; Yu, Yijun; Schobbens, Pierre-Yves and Toussaint, Hubert (2010). Tool support for code generation from a UMLsec property. In: ASE'10 - 25th International Conference on Automated Software Engineering, 20-24 September 2010, Antwerp, Belgium. file

Nuseibeh, Bashar; Haley, Charles B. and Foster, Craig (2009). Securing the skies: In requirements we trust. Computer, 42(9) pp. 64–72.

Tun, Thein; Chapman, Rod; Haley, Charles; Laney, Robin and Nuseibeh, Bashar (2009). A framework for developing feature-rich software systems. In: 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2009), 14-16 April 2009, San Francisco, California, USA. file

Haley, Charles B. and Nuseibeh, Bashar (2008). Bridging requirements and architecture for systems of systems. In: 3rd International Symposium on Information Technology (ITSIM'08), 26-28 Aug 2008, Kuala Lumpur, Malaysia.

Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar (2008). Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Transactions on Software Engineering, 34(1) pp. 133–153. file

Haley, Charles B. (2008). Arguing security: A framework for analyzing security requirements. Saarbrücken: VDM Verlag Dr Müller.

Haley, Charles B; Laney, Robin; Moffett, Jonathan D and Nuseibeh, Bashar (2008). Arguing satisfaction of security requirements. In: Nemati, Hamid ed. Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, Volume 4. Information Science Reference.

Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar (2006). Arguing satisfaction of security requirements. In: Mouratidis, Haralambos and Giorgini, Paolo eds. Integrating security and software engineering: advances and future vision. Hershey, PA and London: Idea Group Publishing, pp. 15–42. file

Haley, Charles B.; Moffett, Jonathan D.; Laney, Robin and Nuseibeh, Bashar (2006). A framework for security requirements engineering. In: Software Engineering for Secure Systems Workshop (SESS'06), co-located with the 28th International Conference on Software Engineering (ICSE'06), 20-21 May 2006, Shanghai, China. file

Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar (2006). Using trust assumptions with security requirements. Requirements Engineering, 11(2) pp. 138–151.

Page, V.; Laney, R.; Dixon, M. and Haley, C. (2006). Trust obstacle mitigation for database systems. In: Bell, D. and Hong, J. eds. Flexible and Efficient Information Handling. Berlin: Springer, pp. 254–257.

Haley, Charles B.; Moffett, Jonathan D.; Laney, Robin and Nuseibeh, Bashar (2005). Arguing security: validating security requirements using structured argumentation. In: Third Symposium on Requirements Engineering for Information Security (SREIS'05) held in conjunction with the 13th International Requirements Engineering Conference (RE'05), 29 Aug 2005, Paris, France. file

Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar (2004). The Effect of trust assumptions on the elaboration of security requirements. In: 12th IEEE International Requirements Engineering Conference (RE'04), 6-10 Sep 2004, Kyoto, Japan.

Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar (2004). Using Problem Frames and projections to analyze requirements for distributed systems. In: Proceedings of the Tenth International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'04), co-located with the 16th International Conference on Advanced Information Systems Engineering (CAiSE'04), 7-8 Jun 2004, Riga, Latvia. file

Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar (2004). Picking battles: The impact of trust assumptions on the elaboration of security requirements. In: Proceedings of the Second International Conference on Trust Management (iTrust'04), 29 Mar - 1 Apr 2004, Oxford, UK. file

Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar (2004). Deriving security requirements from crosscutting threat descriptions. In: Proceedings of the Third International Conference on Aspect-Oriented Software Development (AOSD'04), 22-26 Mar 2004, Lancaster, UK, ACM Press, pp. 112–121. file

Haley, Charles B. (2003). Using problem frames with distributed architectures: a case for cardinality on interfaces. In: Proceedings of the Second International Software Requirements to Architectures Workshop (STRAW'03), co-located with the International Conference on Software Engineering (ICSE '03), 9 May 2003, Portland, Oregon, USA. restricted access item, not available for direct download

Haley, Charles and Nuseibeh, Bashar (2003). Going on-line on a shoestring: An experiment in concurrent development of requirements and architecture. In: International Conference on Advances in Infrastructure for Electronic Business, Education, Science, Medicine, and Mobile Technologies on the Internet, 6-12 Jan 2003, L'Aquila Italy. file

This list was generated on Fri Oct 24 01:40:31 2014 BST.

Policies | Disclaimer

© The Open University   + 44 (0)870 333 4340   general-enquiries@open.ac.uk