Architecture, Computing & Engineering


TitleArchitecture, Computing & Engineering
ACE
TypeSchool
UniversityUEL
DeanDr Seyed Ghorashi
Research AdministratorMrs Nazmin Uddin
Research Degrees LeaderDr Andrew Arewa
Dr Ameer Al-Nemrat
Examination OfficerMrs Nazmin Uddin

Latest research outputs

Sort by Date Title
Modelling Secure Multiagent Systems
Mouratidis, Haralambos, Giorgini, Paolo and Manson, Gordon 2003. Modelling Secure Multiagent Systems. Proceedings of the second international joint conference on Autonomous agents and multiagent systems AAMAS’03. July 14–18 2003 pp. 859 - 866

Conference paper

An Agent-Oriented Methodology for the Development of Secure Agent-Based Systems
Mouratidis, Haralambos 2003. An Agent-Oriented Methodology for the Development of Secure Agent-Based Systems. Proceedings PREP 2003. 14-16 April Exeter

Conference paper

Towards a comprehensive framework for secure systems development
Mouratidis, Haralambos, Jurjens, Jan and Fox, Jorge 2006. Towards a comprehensive framework for secure systems development. in: Dubois, E; Pohl, K (ed.) CAiSE 2006 LNCS 4001 pp.

Book chapter

Adapting Secure Tropos for Security Risk Management during Early Phases of the Information Systems Development
Matulevicius, Raimundas, Mayer, Nicolas, Mouratidis, Haralambos, Dubois, Eric, Heymans, Patrick and Genon, Nicolas 2008. Adapting Secure Tropos for Security Risk Management during Early Phases of the Information Systems Development. in: Bellahsène, Zohra and Léonard, Michel (ed.) Advanced Information Systems Engineering: 20th International Conference, CAiSE 2008 Montpellier, France, June 18-20, 2008, Proceedings Springer.

Book chapter

Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects
Mouratidis, Haralambos, Sunyaev, Ali and Jurjens, Jan 2009. Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects. CAiSE 2009. LNCS 5565 pp. 231-245

Conference paper

Enhancing secure Tropos to effectively deal with security requirements in the development of multiagent systems
Mouratidis, Haralambos and Giorgini, Paolo 2009. Enhancing secure Tropos to effectively deal with security requirements in the development of multiagent systems. in: Barley, M. (ed.) SASEMAS 2004-2006 LNAI 4342 pp.

Book chapter

Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems
Mouratidis, Haralambos, Giorgini, Paolo and Manson, Gordon 2003. Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems.

Conference paper

Towards the development of secure information systems: Security Reference Diagram and Security Attack Scenarios
Mouratidis, Haralambos, Giorgini, Paolo and Manson, Gordon 2004. Towards the development of secure information systems: Security Reference Diagram and Security Attack Scenarios.

Conference paper

A Secure Architectural Description Language for Agent Systems
Mouratidis, Haralambos, Kolp, Manuel, Faulkner, Stéphane and Giorgini, Paolo 2005. A Secure Architectural Description Language for Agent Systems. Proceedings 4th International Joint Conference on Autonomous Agents and Multiagent Systems. Utrecht - The Netherlands pp 578-585

Conference paper

Reasoning About Willingness in Networks of Agents
Dehousse, Stéphane, Faulkner, Stéphane, Mouratidis, Haralambos, Kolp, Manuel and Giorgini, Paolo 2007. Reasoning About Willingness in Networks of Agents. in: Choren, R. (ed.) SELMAS 2006 LNCS 4408 pp.

Book chapter

Deployment of a security assurance monitoring framework for telecommunication service infrastructures on a VoIP system
Ouedraogo, Moussa, Khadraoui, Djamel, De Rémont, Benoît, Dubois, Eric and Mouratidis, Haralambos 2008. Deployment of a security assurance monitoring framework for telecommunication service infrastructures on a VoIP system. proceedings of NTMS'2008. The 2nd International Conference on New technologies Mobility and Security

Conference paper

A Natural Extension of Tropos Methodology for Modelling Security
Mouratidis, Haralambos 2002. A Natural Extension of Tropos Methodology for Modelling Security. Proceedings Agent Oriented Methodologies Workshop. Annual ACM Conference on Object Oriented Programming Systems

Conference paper

Extending the Unified Modeling Language to Model Mobile Agents
Mouratidis, Haralambos 2002. Extending the Unified Modeling Language to Model Mobile Agents. Proceedings Agent Oriented Methodologies Workshop. Annual ACM Conference on Object Oriented Programming Systems

Conference paper

Secure Information Systems Engineering: A Manifesto
Mouratidis, Haralambos 2007. Secure Information Systems Engineering: A Manifesto. International Journal of Electronic Security and Digital Forensics. 1 (1), pp. 27-41.

Article

A Security-Aware Metamodel for Multi-Agent Systems (MAS)
Mouratidis, Haralambos 2009. A Security-Aware Metamodel for Multi-Agent Systems (MAS). Information and Software Technology. 51 (5), pp. 832-845.

Article

Usability of Web Browsers for Multi-touch Platforms
Khan, Hasan Zaryab 2010. Usability of Web Browsers for Multi-touch Platforms. Masters Thesis University of East London School of Architecture, Computing and Engineering

Masters Thesis

Microsoft Windows 7 Multi-touch Based Variability Management Solution
Job, C. 2010. Microsoft Windows 7 Multi-touch Based Variability Management Solution. Masters Thesis University of East London School of Architecture, Computing and Engineering

Masters Thesis

Techno Trans-nationalism
De Souza, P. 2010. Techno Trans-nationalism. The International Journal of the Arts in Society. 4 (2), pp. 411-422.

Article

Rethinking the Dissension between Software and Generative Art
De Souza, P. 2010. Rethinking the Dissension between Software and Generative Art. The International Journal of Technology, Knowledge and Society. 6 (5), pp. 13-26.

Article

Quality and Performance Evaluation of the Sri Lankan e-Government web Portal
Jahankhani, H. and Jahankhani, H. 2010. Quality and Performance Evaluation of the Sri Lankan e-Government web Portal. 6th International Conference on E-Government. Cape Peninsula University of Technology, Cape Town, South Africa Academic Publishing International (API).

Conference paper

Selecting Security Patterns that Fulfill Security Requirements
Weiss, Michael and Mouratidis, Haralambos 2008. Selecting Security Patterns that Fulfill Security Requirements. 16th IEEE International Conference on Requirements Engineering. Barcelona, Spain 08 - 12 Sep 2008

Conference paper

Analysis of Student and Staff Experience in Industrial Projects
Alexis, S., Kretsis, M. and Malik, G. 2009. Analysis of Student and Staff Experience in Industrial Projects. Proceedings International Conference of Education. Research and Innovation (ICERI 2009) Madrid

Conference paper

FAML: a generic metamodel for MAS development
Beydoun, Ghassan, Low, Graham, Henderson-Sellers, Brian, Mouratidis, Haralambos, Gomez-Sanz, Jorge, Pavón, Juan and Gonzalez-Perez, Cesar 2009. FAML: a generic metamodel for MAS development. IEEE Transactions on Software Engineering. 35 (6), pp. 841-863.

Article

An Ontology for Modelling Security: The Tropos Approach
Mouratidis, Haralambos, Giorgini, Paolo and Manson, Gordon 2003. An Ontology for Modelling Security: The Tropos Approach. Lecture Notes in Artificial Intelligence.

Article

Secure Tropos: An Agent Oriented Software Engineering Methodology for the Development of Health and Social Care Information Systems
Mouratidis, Haralambos 2009. Secure Tropos: An Agent Oriented Software Engineering Methodology for the Development of Health and Social Care Information Systems. International Journal of Computer Science and Security. 3 (3), pp. 241-271.

Article

Using Tropos methodology to Model an Integrated Health Assessment System
Mouratidis, Haralambos, Giorgini, Paolo, Philp, Ian and Manson, Gordon 2002. Using Tropos methodology to Model an Integrated Health Assessment System. Proceedings 4th International Bi-Conference Workshop on Agent-Oriented Information Systems. International Conference on Advanced Information Systems Toronto – Canada.

Conference paper

A Novel Agent-Based System to Support the Single Assessment Process of Older People
Mouratidis, Haralambos, Philp, Ian and Manson, Gordon 2003. A Novel Agent-Based System to Support the Single Assessment Process of Older People. Health Informatics Journal. 9 (3), pp. 149-162.

Article

Using Security Attack Scenarios to Analyse Security During Information Systems Design
Mouratidis, Haralambos, Giorgini, Paolo and Manson, Gordon 2004. Using Security Attack Scenarios to Analyse Security During Information Systems Design. Proceedings International Conference on Enterprise Information Systems, Porto-Portugal, pp. 10-17

Conference paper

Analysing Security in Information Systems
Mouratidis, Haralambos and Giorgini, Paolo 2004. Analysing Security in Information Systems. Proceedings of the 2nd International Workshop on Security in Information Systems. International Conference on Enterprise Information Systems Porto-Portugal.

Conference paper

When Security meets Software Engineering: A case of modelling secure information systems
Mouratidis, Haralambos, Giorgini, Paolo and Manson, Gordon 2005. When Security meets Software Engineering: A case of modelling secure information systems. Information Systems. 30 (8), pp. 609-629.

Article

Modelling Secure Systems Using An Agent Oriented Approach and Security Patterns
Mouratidis, Haralambos, Weiss, Michael and Giorgini, Paolo 2006. Modelling Secure Systems Using An Agent Oriented Approach and Security Patterns. International Journal of Software Engineering and Knowledge Engineering. 16 (3), pp. 471-498.

Article

Secure Tropos: A Security-Oriented Extension of the Tropos methodology
Mouratidis, Haralambos and Giorgini, Paolo 2007. Secure Tropos: A Security-Oriented Extension of the Tropos methodology. International Journal of Software Engineering and Knowledge Engineering. 17 (2), pp. 285-309.

Article

Security Attack Testing (SAT)—testing the security of information systems at design time
Mouratidis, Haralambos and Giorgini, Paolo 2007. Security Attack Testing (SAT)—testing the security of information systems at design time. Information Systems. 32 (8), pp. 1166-1183.

Article

Integrating Patterns and Agent-Oriented Methodologies to Provide Better Solutions for the Development of Secure Agent-Based Systems
Mouratidis, Haralambos, Giorgini, Paolo and Weiss, Michael 2003. Integrating Patterns and Agent-Oriented Methodologies to Provide Better Solutions for the Development of Secure Agent-Based Systems. Proceedings 6th ChiliPLoP Annual Conference. Hot Topic: Expressiveness of Pattern Languages Arizona-USA

Conference paper

Delegation Mechanisms for Agent Architectural Design
Faulkner, Stéphane, Dehousse, Stéphane, Kolp, Manuel, Mouratidis, Haralambos and Giorgini, Paolo 2005. Delegation Mechanisms for Agent Architectural Design. Proceedings IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT), Compiegne - France, pp. 503 – 507

Conference paper

Analysing Security Requirements of Information Systems using Tropos
Mouratidis, Haralambos 2006. Analysing Security Requirements of Information Systems using Tropos. Proceedings 1st Annual Conference on Advances in Computing and Technology (AC&T). London - United Kingdom pp. 55 – 64

Conference paper

Developing an Intelligent User Manager System for controlling Smart School Network Resources
Gani, Abdullah, Mouratidis, Haralambos, Abouzakhar, Nasser S. and Manson, Gordon 2002. Developing an Intelligent User Manager System for controlling Smart School Network Resources. Malaysian Journal of Computer Science. 15 (2), pp. 56-69.

Article

Security Patterns for Agent Systems
Mouratidis, Haralambos, Giorgini, Paolo and Schumacher, Markus 2003. Security Patterns for Agent Systems. 8th European Conference on Pattern Languages of Programs.

Conference paper

Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems
Mouratidis, Haralambos, Weiss, Michael and Giorgini, Paolo 2005. Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems. Delcambre, L. et al (eds ) Conceptual Modeling – ER 2005 24th International Conference on Conceptual Modelling (ER 2005) LNCS 3716

Conference paper

Modelling MAS-Specific Security Features
Beydoun, Ghassan, Low, Graham, Mouratidis, Haralambos and Henderson-Sellers, Brian 2007. Modelling MAS-Specific Security Features. Erik, H. A

Conference paper

  • 408666
    total views
  • 441382
    total downloads
  • 8173
    views this month
  • 5784
    downloads this month

People

Abba, Abdulrazaq

Abbas, Ali

Abbdalla, Khalid

Abou-Grad, Hisham

Adnan, Adnan

Ahad, Md Atiqur Rahman

Ahmed, Mahmud

Ahmed, Tauseef

Alexis, Solomon

Al-Nemrat, Ameer

Amirhosseini, Mohammad

Annan, Joseph

Apeagyei, Alex

Arewa, Andrew

Arunachalam, Subramaniam

Assadi Langroudi, Arya Assadi

Auwal, Bilyaminu

Ayoub, Ashraf

Bagheri, Meghdad

Baig, Hasan

Barbhuiya, Salim

Bashroush, Rabih

Belen Saglam, Rahime

Berardinelli, Nabeela

Bloch, Isaie

Bombo, Paul

Callaghan, Carl

Catina, Aleks

Catmur, Sarah

Chandler, Alan

Chooramun, Nitish

Christou, Philip

Ciupala, Anca

Cobo Displas, Isaac

Cockram, John

Coombs, Daniel

Da Palma Romao, Claudia

Doherty, Gary

Donyavi, Sohrab

Do Rosario Benros, Deborah

Edoh Jnr, Aloysius

Elgebaly, Ahmed

Eze, Elias

Falugi, Paola

Francis, Amanda

Fretton, Anthony

Gallagher, Pol

Georgeson, Michael

Ghorashi, Seyed

Ginsburgh, Susan

Greenleaf, Paul

Groothuizen, Christian

Gutierrez Rivas, Armor

Hadrys, Christoph

Haider, Umaima

Hakimazari, Hamid

Hammad, Rawad

Harding, Alexis

Harris, Charlotte

Hashemi, Arman

Healy, Cornelius

Hedges, Russell

Hossain, Shahera

Imran, Yasir

Ioakim, Andrew

Ismail, Umar

Jafari, Fahimeh

Jamshidi, Mohsen

Jayaratne, Ravindra

Jones, Luke

Jungfer, Carsten

Kans, Aaron

Karami, Amin

Karandinou, Anastasia

Karthaus, Roland

Kevin, Ladi

Khatoon, Shaheen

Kogawa, Toshiya

Kozminihs, Dmitrijs

Kure, Halima

Latham, Richard

Lee, Ka Lok

Lifschitz, Sharone

Li, Yang

Lota, Jaswinder

Maelzer, Lee

Mahmood, Azhar

Mahmood, Shahid

Malik, Gaurav

Mamun, Md Ibrahim

Martinez-Aleman, Carmen

Maughan Jones, Charlotte

Mcguire, Emma

Meibodi, Amir

Memon, Shahzad

Memou, Antigoni

Minton, Anna

Mohammad, Rasha

Mollasalehi, Sajedeh

Moniri, Mansour

Morad, Samir

Mungroo, Pat

Naghibi, Elnaz

Nakagawa, Miho

Nepal, Jaya

Nita, Lucian

Ogbebor, William

Ok'Onkwo, Christopher

Palmieri, Palmieri

Parekh, Dhara

Parisi, Luana

Patel, Kiran

Penny, Clare

Phillips, Catherine

Pinsky, Michael

Pollak, Catalina

Poznansky, Harriet

Pyecroft, Rob

Qazi, Nadeem

Qureshi, Jawed

Rabbani, Mohammad

Ramly, Athirah Binti

Raney, Karen

Roelofsma, Michele

Rogina, Rosa

Safieddine, Fadi

Saleem, Komal

Schultze-Westrum, Stephanie

Senatore, Alfonso

Serrano, Teresa

Sharif, Saeed

Shaw, Debra

Siddiqui, Arish

Sieczak, Anna

Sutharssan, Thamo

Tajima, Keita

Tann, David

Tansen, Kazi

Tu, Wenlin

Walsh, John

Whang, Seoung Wook

Winter, Keith

Wirz, Fulvio

Wiseman, Adam

Wright, Andrew

Zandi, Shahrokh

Zealey, Samuel