Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Haralambos Mouratidis is active.

Publication


Featured researches published by Haralambos Mouratidis.


Archive | 2006

Integrating Security and Software Engineering: Advances and Future Visions

Haralambos Mouratidis; Paolo Giorgini

A Sample of Contents: Integrating Security and Software Engineering A Methodology to Develop Secure Systems Using Patterns Extending Security in Agile Software Development Methods Access Control Specification in UML.


conference on advanced information systems engineering | 2003

Integrating security and systems engineering: towards the modelling of secure information systems

Haralambos Mouratidis; Paolo Giorgini; Gordon A. Manson

Security is a crucial issue for information systems. Traditionally, security is considered after the definition of the system. However, this approach often leads to problems, which translate into security vulnerabilities. From the viewpoint of the traditional security paradigm, it should be possible to eliminate such problems through better integration of security and systems engineering. This paper argues for the need to develop a methodology that considers security as an integral part of the whole system development process. The paper contributes to the current state of the art by proposing an approach that considers security concerns as an integral part of the entire system development process and by relating this approach with existing work. The different stages of the approach are described with the aid of a case study; a health and social care information system.


adaptive agents and multi-agents systems | 2003

Modelling secure multiagent systems

Haralambos Mouratidis; Paolo Giorgini; Gordon A. Manson

Security plays an important role in the development of multiagent systems. However, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system. This is, mainly, due to the fact that agent oriented software engineering methodologies have not integrated security concerns throughout their developing stages. The integration of security concerns during the whole range of the development stages could help towards the development of more secure multiagent systems. In this paper we introduce extensions to the Tropos methodology to enable it to model security concerns throughout the whole development process. A description of the new concepts is given along with an explanation of how these concepts are integrated to the current stages of Tropos. An example from the health care sector is used to illustrate the above.


international conference on knowledge-based and intelligent information and engineering systems | 2003

An Ontology for Modelling Security: The Tropos Approach

Haralambos Mouratidis; Paolo Giorgini; Gordon A. Manson

It has been argued that security concerns should inform all the stages of the development process of an agent-based system. However, this is not the case since current agent-oriented methodologies do not, usually, consider security concepts within their modelling ontology. In this paper we present extensions to the Tropos ontology to enable it to model security.


International Journal of Software Engineering and Knowledge Engineering | 2006

MODELING SECURE SYSTEMS USING AN AGENT-ORIENTED APPROACH AND SECURITY PATTERNS

Haralambos Mouratidis; Michael Weiss; Paolo Giorgini

In this paper we describe an approach for modelling security issues in information systems. It is based on an agent-oriented approach, and extends it with the use of security patterns. Agent-oriented software engineering provides advantages when modeling security issues, since agents are often a natural way of conceptualizing an information system, in particular at the requirements stage, when the viewpoints of multiple stakeholders need to be considered. Our approach uses the Tropos methodology for modelling a system as a set of agents and their social dependencies, with specific extensions for representing security constraints. As an extension to the existing methodology we propose the use of security patterns. These patterns capture proven solutions to common security issues, and support the systematic and structured mapping of these constraints to an architectural model of the system, in particular for non-security specialists.


AOIS@CAiSE | 2002

Using Tropos methodology to Model an Integrated Health Assessment System

Haralambos Mouratidis; Paolo Giorgini; Ian Philp; Gordon A. Manson


Archive | 2003

Testing the Suitability and the Limitations of Agent Technology to Support Integrated Assessment of Health and Social Care Needs of Older People

Haralambos Mouratidis; Gordon A. Manson; Ian Philp


Archive | 2003

Integrating Security Patterns in the Development of Secure Agent-Based Systems

Haralambos Mouratidis; Paolo Giorgini; Markus Schumacher; Michael Weiss


Archive | 2008

SPattern '08 Program Committee

Eduardo B. Fernandez; Günther Pernul; Eduardo Fernández-Medina; Jan Jürjens; Kostas Lambrinoudakis; Maria M. Larrondo-Petrie; Haralambos Mouratidis; Markus Schumacher; Virtual Forge; Fraunhofer Sit; Michael VanHilst; Hironori Washizaki; Nobukazu Yoshioka


Lecture Notes in Computer Science | 2004

Modeling deployment and mobility issues in multiagent systems using AUML

Agostino Poggi; Giovanni Rimassa; Paola Turci; J. Odell; Haralambos Mouratidis; Gordon A. Manson

Collaboration


Dive into the Haralambos Mouratidis's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Markus Schumacher

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ian Philp

Northern General Hospital

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jan Jürjens

University of Koblenz and Landau

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge