University of Limerick Institutional Repository

Browsing by Author "Nuseibeh, Bashar"

DSpace/Manakin Repository

Browsing by Author "Nuseibeh, Bashar"

Sort by: Order: Results:

  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Nuseibeh, Bashar (2012)
    Despite the benefits offered by smart grids, energy producers, distributors and consumers are increasingly concerned about possible security and privacy threats. These threats typically manifest themselves at runtime ...
  • Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Nuseibeh, Bashar (Association for Computing Machinery, 2011)
    Many requirements documents are written in natural language (NL). However, with the flexibility of NL comes the risk of introducing unwanted ambiguities in the requirements and misunderstandings between stakeholders. In ...
  • Salifu, Mohammed; Yu, Yijun; Bandara, Arosha K.; Nuseibeh, Bashar (Elsevier, 2012)
    In the field of pervasive and ubiquitous computing, context-aware adaptive systems need to monitor changes in their environment in order to detect violations of requirements and switch their behaviour in order to continue ...
  • Yang, Hui; Willis, Alistair; De Roeck, Anne; Nuseibeh, Bashar (Association for Computing Machinery, 2010)
    Natural language is prevalent in requirements documents. However, ambiguity is an intrinsic phenomenon of natural language, and is therefore present in all such documents. Ambiguity occurs when a sentence can be interpreted ...
  • Omoronyia, Inah; Pasquale, Liliana; Salehie, Mazeiar; Cavallaro, Luca; Doherty, Gavin; Nuseibeh, Bashar (Association for Computing Machinery, 2012)
    In a dynamic environment where context changes frequently, users’ privacy requirements can also change. To satisfy such changing requirements, there is a need for continuous analysis to discover new threats and possible ...
  • Chen, Lianping; Babar, Muhmmad Ali; Nuseibeh, Bashar (IEEE Computer Society, 2013)
    At the heart of any engineering discipline is the interplay between problem and solution development. In software engineering, the effectiveness of a software solution is determined with respect to a problem, yet the nature ...
  • Price, Blaine A.; Mancini, Clara; Rogers, Yvonne; Bandara, Arosha K.; Coe, Tony; Joinson, Adam N.; Lay, Jeffrey; Nuseibeh, Bashar (Association for Computing Machinery, 2010)
    How can we best explore the range of users’ reactions when developing future technologies that may be controversial, such as personal healthcare systems? Our approach in ContraVision uses futuristic videos, or other narrative ...
  • Omoronyia, Inah; Cavallaro, Luca; Salehie, Mazeiar; Pasquale, Liliana; Nuseibeh, Bashar (Association for Computing Machinery, 2013)
    Applications that continuously gather and disclose personal information about users are increasingly common. While disclosing this information may be essential for these applications to function, it may also raise privacy ...
  • Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair; Nuseibeh, Bashar (IEEE Computer Society, 2010)
    This paper presents an approach to automatically identify potentially nocuous ambiguities, which occur when text is interpreted differently by different readers of requirements written in natural language. We extract a set ...
  • Mancini, Clara; Thomas, Keerthi; Rogers, Yvonne; Price, Blaine A.; Jedrzejczyk, Lukasz; Bandara, Arosha K.; Joinson, Adam N.; Nuseibeh, Bashar (Association for Computing Machinery, 2009)
    Mobile privacy concerns are central to Ubicomp and yet remain poorly understood. We advocate a diversified approach, enabling the cross-interpretation of data from complementary methods. However, mobility imposes a number ...
  • Lopez, Tamara; Petre, Marian; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Software rarely works as intended when it is initially written. Things go wrong, and developers are commonly understood to form theories and strategies to deal with them. Much of this knowledge relates to ephemeral flaws ...
  • Yang, Hui; Willis, Alistair; De Roeck, Anne; Nuseibeh, Bashar (Libertas Academica, 2012)
    We describe the Open University team’s submission to the 2011 i2b2/VA/Cincinnati Medical Natural Language Processing Challenge, Track 2 Shared Task for sentiment analysis in suicide notes. This Shared Task focused on the ...
  • Mancini, Clara; Rogers, Yvonne; Thomas, Keerthi; Joinson, Adam N.; Price, Blaine A.; Bandara, Arosha K.; Jedrzejczyk, Lukasz; Nuseibeh, Bashar (Association for Computing Machinery, 2011)
    A growing body of research has been exploring the use of control mechanisms to address the privacy concerns raised by location-tracking technology. We report on a qualitative study of two family groups who used a custom-built ...
  • Yang, Hui; De Roeck, Anne; Willis, Alistair; Nuseibeh, Bashar (The Association for Computational Linguistics, 2010)
    Nocuous ambiguity occurs when a linguistic expression is interpreted differently by different readers in a given context. We present an approach to automatically identify nocuous ambiguity that is likely to lead to ...
  • Omoronyia, Inah; Salehie, Mazeiar; Ali, Raian; Kaiya, Haruhiko; Nuseibeh, Bashar (2011)
  • Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha K.; Nuseibeh, Bashar (2010)
    Effective privacy management requires that mobile systems' users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work has shown that making such privacy decisions ...
  • Pasquale, Liliana; Mazeiar, Salehie; Ali, Raian; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Adaptive security aims to protect valuable assets managed by a system, by applying a varying set of security controls. Engineering adaptive security is not an easy task. A set of effective security countermeasures should ...
  • Yu, Yijun; Tun, Thein Than; Tedeschi, Alessandra; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    When software systems are verified against security requirements, formal and informal arguments provide a structure for organizing the software artifacts. Our recent work on the evolution of security-critical software ...
  • Benats, Guillaume; Bandara, Arosha K.; Yu, Yijun; Colin, Jean-Noel; Nuseibeh, Bashar (IEEE Computer Society, 2011)
    The rapid growth of mobile applications has imposed new threats to privacy: users often nd it challenging to ensure that their privacy policies are consistent with the requirements of a diverse range of of mobile ...
  • Tun, Thein Than; Bandara, Arosha K.; Price, Blaine A.; Yu, Yijun; Haley, Charles; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Privacy requirements for mobile applications offer a distinct set of challenges for requirements engineering. First, they are highly dynamic, changing over time and locations, and across the different roles of ...

Search DSpace

Browse

My Account