Shareeful Islam
Shareeful Islam
School of Architecture, Computing and Engineering, University of East London, UK
Verified email at uel.ac.uk - Homepage
TitleCited byYear
Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec
SH Houmb, S Islam, E Knauss, J Jürjens, K Schneider
Requirements Engineering 15 (1), 63-93, 2010
1332010
A framework to support selection of cloud providers based on security and privacy requirements
H Mouratidis, S Islam, C Kalloniatis, S Gritzalis
Journal of Systems and Software 86 (9), 2276-2293, 2013
1172013
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
C Kalloniatis, H Mouratidis, M Vassilis, S Islam, S Gritzalis, E Kavakli
Computer Standards & Interfaces 36 (4), 759-775, 2014
672014
Evaluating cloud deployment scenarios based on security and privacy requirements
C Kalloniatis, H Mouratidis, S Islam
Requirements Engineering 18 (4), 299-319, 2013
632013
A framework to support alignment of secure software engineering with legal regulations
S Islam, H Mouratidis, J Jürjens
Software & Systems Modeling 10 (3), 369-394, 2011
522011
Software development risk management model: a goal driven approach
S Islam
Proceedings of the doctoral symposium for ESEC/FSE on Doctoral symposium, 5-8, 2009
492009
Software development risk management model: a goal driven approach
S Islam
Proceedings of the doctoral symposium for ESEC/FSE on Doctoral symposium, 5-8, 2009
482009
Enhancing security requirements engineering by organizational learning
K Schneider, E Knauss, S Houmb, S Islam, J Jürjens
Requirements Engineering 17 (1), 35-56, 2012
472012
Integrating risk management activities into requirements engineering
S Islam, SH Houmb
2010 Fourth International Conference on Research Challenges in Information …, 2010
472010
An empirical study on the implementation and evaluation of a goal-driven software development risk management model
S Islam, H Mouratidis, ER Weippl
Information and Software Technology 56 (2), 117-133, 2014
442014
Goal and risk factors in offshore outsourced software development from vendor's viewpoint
S Islam, MMA Joarder, SH Houmb
2009 Fourth IEEE International Conference on Global Software Engineering …, 2009
382009
Towards a framework to elicit and manage security and privacy requirements from laws and regulations
S Islam, H Mouratidis, S Wagner
International Working Conference on Requirements Engineering: Foundation for …, 2010
372010
Human factors in software security risk management
S Islam, W Dong
Proceedings of the first international workshop on Leadership and management …, 2008
302008
Model based process to support security and privacy requirements engineering
S Islam, H Mouratidis, C Kalloniatis, A Hudic, L Zechner
International Journal of Secure Software Engineering (IJSSE) 3 (3), 1-22, 2012
272012
A goal-driven risk management approach to support security and privacy analysis of cloud-based system
S Islam, H Mouratidis, ER Weippl
Security Engineering for Cloud Computing: Approaches and Tools, 97-122, 2013
242013
Data confidentiality using fragmentation in cloud computing
A Hudic, S Islam, P Kieseberg, ER Weippl
Int. J. Communication Networks and Distributed Systems 1 (3/4), 1, 2012
242012
Measuring security requirements for software security
S Islam, P Falcarin
2011 IEEE 10th International Conference on Cybernetic Intelligent Systems …, 2011
242011
Supporting requirements engineers in recognising security issues
E Knauss, S Houmb, K Schneider, S Islam, J Jürjens
International Working Conference on Requirements Engineering: Foundation for …, 2011
242011
A risk management framework for cloud migration decision support
S Islam, S Fenz, E Weippl, H Mouratidis
Journal of Risk and Financial Management 10 (2), 10, 2017
222017
Coir fiber reinforced polypropylene composites: physical and mechanical properties
M Haque, N Islam, M Huque, M Hasan, S Islam, S Islam
Advanced Composite Materials 19 (1), 91-106, 2010
222010
The system can't perform the operation now. Try again later.
Articles 1–20