University of Limerick Institutional Repository

Browsing by Author "Pasquale, Liliana"

DSpace Repository

Browsing by Author "Pasquale, Liliana"

Sort by: Order: Results:

  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Nuseibeh, Bashar (2012)
    Despite the benefits offered by smart grids, energy producers, distributors and consumers are increasingly concerned about possible security and privacy threats. These threats typically manifest themselves at runtime ...
  • Omoronyia, Inah; Pasquale, Liliana; Salehie, Mazeiar; Cavallaro, Luca; Doherty, Gavin; Nuseibeh, Bashar (Association for Computing Machinery, 2012)
    In a dynamic environment where context changes frequently, users’ privacy requirements can also change. To satisfy such changing requirements, there is a need for continuous analysis to discover new threats and possible ...
  • Baresi, Luciano; Pasquale, Liliana (2011)
    Requirements elicitation is an important phase of the software life-cycle, since it helps to reduce the software development time and costs. Unfortunately, existing tools for software design are mainly focused on building ...
  • Omoronyia, Inah; Cavallaro, Luca; Salehie, Mazeiar; Pasquale, Liliana; Nuseibeh, Bashar (Association for Computing Machinery, 2013)
    Applications that continuously gather and disclose personal information about users are increasingly common. While disclosing this information may be essential for these applications to function, it may also raise privacy ...
  • Baresi, Luciano; Ripa, Gianluca; Pasquale, Liliana (2013)
    This paper describes IRENE (Indenica Requirements ElicitatioN mEthod), a methodology to elicit and model the requirements of service platforms, and IRET (IREne Tool), the Eclipse-based modeling framework we developed for IRENE
  • Pasquale, Liliana; Spoletini, Paola (IEEE Computer Society, 2011)
    Service compositions are an important family of self-adaptive systems, which need to cope with the variability of the environment (e.g., heterogeneous devices, changing context), and react to unexpected events (e.g., ...
  • Pasquale, Liliana; Mazeiar, Salehie; Ali, Raian; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Adaptive security aims to protect valuable assets managed by a system, by applying a varying set of security controls. Engineering adaptive security is not an easy task. A set of effective security countermeasures should ...
  • Pasquale, Liliana; Spoletini, Paola; Pometto, Dario; Blasi, Francesco; Redaelli, Tiziana (Springer, 2013)
    [Context and motivation] In the last years motion-based games have achieved an increasing success. These games have great potential to support physiotherapeutic programs, as they can guide the patients in performing the ...
  • Pasquale, Liliana; Yu, Yijun; Mazeiar, Salehie; Cavallaro, Luca; Tun, Thein Than; Nuseibeh, Bashar (IEEE Computer Society, 2013)
    We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activities, ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian; Nuseibeh, Bashar (2012)
    Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets are therefore key activities in any security engineering process – from modeling threats and attacks, discovering ...
  • Pasquale, Liliana; Menghi, Claudio; Salehie, Mazeiar; Cavallaro, Luca; Omoronyia, Inah; Nuseibeh, Bashar (Association for Computing Machinery, 2012)
    This paper presents SecuriTAS, a tool to engineer adap- tive security. It allows software designers to model security concerns together with the requirements of a system. This model is then used at runtime to analyze ...
  • Pasquale, Liliana; Ghezzi, Carlo; Menghi, Claudio; Tsigkanos, Christos; Nuseibeh, Bashar (Association for Computing Machinery, 2014)
    Adaptive security systems aim to protect valuable assets in the face of changes in their operational environment. They do so by monitoring and analysing this environment, and deploying security functions that satisfy ...
  • Bonfè, Marcello; Boriero, Fabrizio; Dodi, Ricardo; Fiorini, Paolo; Morandi, Angelica; Muradore, Riccardo; Pasquale, Liliana; Sanna, Alberto; Secchi, Cristian (IEEE Computer Society, 2012)
    The paper describes a design specification process for the development of novel and intelligent surgical robots. Nowadays, surgical robots are usually controlled by the surgeons manually by using teleoperation. The ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Smart grids are increasingly proliferating all over the world to leverage electricity infrastructures with information technology. Smart metering, particularly Advanced Metering Infrastructure (AMI), is an enabling ...
  • García-Galán, Jesús; Pasquale, Liliana; Trinidad, Pablo; Ruiz-Cortés, Antonio (Association for Computing Machinery, 2014)
    Multi-tenancy is a key pillar of cloud services. It allows dif- ferent tenants to share computing resources transparently and, at the same time, guarantees substantial cost savings for the providers. However, from a ...

Search DSpace

Browse

My Account

Statistics