Publications
Secure Tropos & SecTro Tool Literature
- Mouratidis, H., & Giorgini, P. (2007). Secure tropos: a security-oriented extension of the tropos methodology. International Journal of Software Engineering and Knowledge Engineering, 17(02), 285-309.
- Mouratidis, H. (2009). Secure Tropos: an agent oriented software engineering methodology for the development of health and social care information systems. International Journal of Computer Science and Security, 3(3), 241-271.
- Mouratidis, H. (2011). Secure software systems engineering: the Secure Tropos approach. Journal of Software, 6(3), 331-339.
- Pavlidis, M., & Islam, S. (2011, June). SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos. In CAiSE Forum(pp. 89-96).
- Mouratidis, H., & Giorgini, P. (2009). Enhancing secure tropos to effectively deal with security requirements in the development of multiagent systems. In Safety and Security in Multiagent Systems (pp. 8-26). Springer Berlin Heidelberg.
- Matulevicius, R., Mouratidis, H., Mayer, N., Dubois, E., & Heymans, P. (2012). Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management. J. UCS, 18(6), 816-844.
- Bork, D., Pavlidis, M., Utz, W., (2017). Modeling Method Conceptualization within OMiLAB: The SecureTropos Case. RCIS 2017, Brighton, pp. 470-475 (PDF).
Ongoing Projects
- Shei, S., Márquez Alcañiz, L., Mouratidis, H., Delaney, A., Rosado, D. G., & Fernández-Medina, E. (2015, August). Modelling secure cloud systems based on system requirements. In 2nd Evolving Security & Privacy Requirements Engineering Workshop: Co-located with the 23rd IEEE International Requirements Engineering Conference (pp. 19-24).
- Shei, S., Delaney, A., Kapetanakis, S., & Mouratidis, H. Visually Mapping Requirements Models to Cloud Services. In 21st International Conference on Distributed Multimedia Systems (pp. 108-114).
- Argyropoulos, N., Mouratidis, H., & Fish, A. (2015). Towards the Derivation of Secure Business Process Designs. In Advances in Conceptual Modeling(pp. 248-258). Springer International Publishing.
- Argyropoulos, N., Alcañiz, L. M., Mouratidis, H., Fish, A., Rosado, D. G., de Guzmán, I. G. R., & Fernández-Medina, E. (2015). Eliciting Security Requirements for Business Processes of Legacy Systems. In The Practice of Enterprise Modeling (pp. 91-107). Springer International Publishing.