One of the most important challenges for software engineers is the design and implementation of t... more One of the most important challenges for software engineers is the design and implementation of trustworthy cloud services. Information system designers face an important issue, the design of cloud forensic-enabled systems that could assist investigators solving cloud-based cyber-crimes. Although digital forensics assists on this direction, limited evidence of cloud-based forensic approaches exist. These approaches don’t support information systems developers as they focus on the investigation only and also they don’t support modelling potential cases of forensics investigations. This paper aims to fill this gap by introducing a modelling language, presented in terms of a meta-model. Since most respective efforts focus on the investigation part a thorough analysis and a suggestion of a generic cloud forensic process is included as the main input for designing the proposed language.
International Journal of Secure Software Engineering, 2011
ABSTRACT This paper describes results and reflects on the experience of engineering a secure web ... more ABSTRACT This paper describes results and reflects on the experience of engineering a secure web based system for the pre-employment screening domain. In particular, the paper presents results from a Knowledge Transfer Partnership KTP project between the School of Computing, IT and Engineering at the University of East London and the London-based award winning pre-employment company Powerchex Ltd. The Secure Tropos methodology, which is based on the principle of secure by design, has been applied to the project to guide the development of a web based system to support employment reference and background checking specifically for the financial services industry. Findings indicate the potential of the methodology for the development of secure web based systems, and support the argument of incorporating security considerations from the early stages of the software development process, i.e., the idea of secure by design. The developed system was tested by a third, independent to the project, party using a well known method of security testing, i.e., penetration testing, and the results provided did not indicate the presence of any major security problems. The experience and lessons learned by the application of the methodology to an industrial setting are also discussed in the paper.
... Edited by Professor Stephen J. Dodds Dr Wada Hosny Dr Hamid Jahankhani Dr Haralambos Mouratid... more ... Edited by Professor Stephen J. Dodds Dr Wada Hosny Dr Hamid Jahankhani Dr Haralambos Mouratidis Professor Dominic Palmer-Brown Professor Roy Perryman Professor D. Chitral Wijeyesekera Printed in London, England Published by ICGES ISBN 0-9550008-3-1. ...
... AN EVALUATION OF CURRENT APPROACHES FOR MODELLING MOBILITY OF AGENTS Divina Melomey, Haralamb... more ... AN EVALUATION OF CURRENT APPROACHES FOR MODELLING MOBILITY OF AGENTS Divina Melomey, Haralambos Mouratidis, Chris Imafidon Innovative ... School of Computing and Technology 2nd Annual Conference, 2007 72 Agent Systems Engineering (MASE)(Self & ...
Contribution for the AOSE TFG meeting, February 28 th , Ljubljana, Slovenia, collocated with the ... more Contribution for the AOSE TFG meeting, February 28 th , Ljubljana, Slovenia, collocated with the Second AgentLink III Technical Forum (AL3-TF2) http://www.agentlink.org/activities/al3-tf/tf2/ Premise. One of the two objectives of the AOSE TGF meeting to be held in Ljubljana, on February 28th is that of collecting, refining and possibly merging Agent-Oriented (AO) modeling languages meta-models. Our aim in this paper is to contribute to the achievement of this objective by describing the Tropos modeling language meta-model that we have implemented in a Tool for AO Modeling (http://sra.itc.it/tools/taom/).This meta-model follows the specification given in [Bre04] and in a master thesis [San01]. Moreover, we describe our approach in its implementation in the Eclipse [ECLIPSE] development platform. In this work we refer to the Model Driven Initiative (MDA) recommendations and standards, in particular the Tropos meta-model specification here described is compliant to the Meta Object Faci...
This paper describes several prototypical applications of neural network technology to engineerin... more This paper describes several prototypical applications of neural network technology to engineering problems. The applications were developed by the authors as part of a graduate-level course taught at the University of Illinois at Urbana-Champaign by the first author (now at ...
This paper is made available online in accordance with publisher policies. Please scroll down to ... more This paper is made available online in accordance with publisher policies. Please scroll down to view the document itself. Please refer to the repository record for this item and our policy information available from the repository home page for further information.
It has been argued in recent research that trust is an important issue for modern information sys... more It has been argued in recent research that trust is an important issue for modern information systems and that it should be considered from the early stages of the development process. Nevertheless, little effort has been put into understanding how trust can be modelled and reasoned when developing information systems. Equally little effort has been put into developing modelling languages
In this chapter we review a number of works related to trust modelling and we identify some impor... more In this chapter we review a number of works related to trust modelling and we identify some important limitations. In particular, we first argue that an ontology for trust modelling should include a number of concepts related to trust such as reputation, privacy and security. ...
One of the most important challenges for software engineers is the design and implementation of t... more One of the most important challenges for software engineers is the design and implementation of trustworthy cloud services. Information system designers face an important issue, the design of cloud forensic-enabled systems that could assist investigators solving cloud-based cyber-crimes. Although digital forensics assists on this direction, limited evidence of cloud-based forensic approaches exist. These approaches don’t support information systems developers as they focus on the investigation only and also they don’t support modelling potential cases of forensics investigations. This paper aims to fill this gap by introducing a modelling language, presented in terms of a meta-model. Since most respective efforts focus on the investigation part a thorough analysis and a suggestion of a generic cloud forensic process is included as the main input for designing the proposed language.
International Journal of Secure Software Engineering, 2011
ABSTRACT This paper describes results and reflects on the experience of engineering a secure web ... more ABSTRACT This paper describes results and reflects on the experience of engineering a secure web based system for the pre-employment screening domain. In particular, the paper presents results from a Knowledge Transfer Partnership KTP project between the School of Computing, IT and Engineering at the University of East London and the London-based award winning pre-employment company Powerchex Ltd. The Secure Tropos methodology, which is based on the principle of secure by design, has been applied to the project to guide the development of a web based system to support employment reference and background checking specifically for the financial services industry. Findings indicate the potential of the methodology for the development of secure web based systems, and support the argument of incorporating security considerations from the early stages of the software development process, i.e., the idea of secure by design. The developed system was tested by a third, independent to the project, party using a well known method of security testing, i.e., penetration testing, and the results provided did not indicate the presence of any major security problems. The experience and lessons learned by the application of the methodology to an industrial setting are also discussed in the paper.
... Edited by Professor Stephen J. Dodds Dr Wada Hosny Dr Hamid Jahankhani Dr Haralambos Mouratid... more ... Edited by Professor Stephen J. Dodds Dr Wada Hosny Dr Hamid Jahankhani Dr Haralambos Mouratidis Professor Dominic Palmer-Brown Professor Roy Perryman Professor D. Chitral Wijeyesekera Printed in London, England Published by ICGES ISBN 0-9550008-3-1. ...
... AN EVALUATION OF CURRENT APPROACHES FOR MODELLING MOBILITY OF AGENTS Divina Melomey, Haralamb... more ... AN EVALUATION OF CURRENT APPROACHES FOR MODELLING MOBILITY OF AGENTS Divina Melomey, Haralambos Mouratidis, Chris Imafidon Innovative ... School of Computing and Technology 2nd Annual Conference, 2007 72 Agent Systems Engineering (MASE)(Self & ...
Contribution for the AOSE TFG meeting, February 28 th , Ljubljana, Slovenia, collocated with the ... more Contribution for the AOSE TFG meeting, February 28 th , Ljubljana, Slovenia, collocated with the Second AgentLink III Technical Forum (AL3-TF2) http://www.agentlink.org/activities/al3-tf/tf2/ Premise. One of the two objectives of the AOSE TGF meeting to be held in Ljubljana, on February 28th is that of collecting, refining and possibly merging Agent-Oriented (AO) modeling languages meta-models. Our aim in this paper is to contribute to the achievement of this objective by describing the Tropos modeling language meta-model that we have implemented in a Tool for AO Modeling (http://sra.itc.it/tools/taom/).This meta-model follows the specification given in [Bre04] and in a master thesis [San01]. Moreover, we describe our approach in its implementation in the Eclipse [ECLIPSE] development platform. In this work we refer to the Model Driven Initiative (MDA) recommendations and standards, in particular the Tropos meta-model specification here described is compliant to the Meta Object Faci...
This paper describes several prototypical applications of neural network technology to engineerin... more This paper describes several prototypical applications of neural network technology to engineering problems. The applications were developed by the authors as part of a graduate-level course taught at the University of Illinois at Urbana-Champaign by the first author (now at ...
This paper is made available online in accordance with publisher policies. Please scroll down to ... more This paper is made available online in accordance with publisher policies. Please scroll down to view the document itself. Please refer to the repository record for this item and our policy information available from the repository home page for further information.
It has been argued in recent research that trust is an important issue for modern information sys... more It has been argued in recent research that trust is an important issue for modern information systems and that it should be considered from the early stages of the development process. Nevertheless, little effort has been put into understanding how trust can be modelled and reasoned when developing information systems. Equally little effort has been put into developing modelling languages
In this chapter we review a number of works related to trust modelling and we identify some impor... more In this chapter we review a number of works related to trust modelling and we identify some important limitations. In particular, we first argue that an ontology for trust modelling should include a number of concepts related to trust such as reputation, privacy and security. ...
Uploads
Papers by Haris Mouratidis