University of Limerick Institutional Repository

Browsing LERO - UL authors by Author "Omoronyia, Inah"

DSpace Repository

Browsing LERO - UL authors by Author "Omoronyia, Inah"

Sort by: Order: Results:

  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Nuseibeh, Bashar (2012)
    Despite the benefits offered by smart grids, energy producers, distributors and consumers are increasingly concerned about possible security and privacy threats. These threats typically manifest themselves at runtime ...
  • Omoronyia, Inah; Pasquale, Liliana; Salehie, Mazeiar; Cavallaro, Luca; Doherty, Gavin; Nuseibeh, Bashar (Association for Computing Machinery, 2012)
    In a dynamic environment where context changes frequently, users’ privacy requirements can also change. To satisfy such changing requirements, there is a need for continuous analysis to discover new threats and possible ...
  • Omoronyia, Inah; Cavallaro, Luca; Salehie, Mazeiar; Pasquale, Liliana; Nuseibeh, Bashar (Association for Computing Machinery, 2013)
    Applications that continuously gather and disclose personal information about users are increasingly common. While disclosing this information may be essential for these applications to function, it may also raise privacy ...
  • Omoronyia, Inah; Sindre, Guttorm; Stalhane, Tor (Association for Computing Machinery, 2011)
    For large software projects it is important to have some traceability between artefacts from di erent phases (e.g., requirements, designs, code), and be- tween artefacts and the involved developers. This is especially ...
  • Omoronyia, Inah; Salehie, Mazeiar; Ali, Raian; Kaiya, Haruhiko; Nuseibeh, Bashar (2011)
  • Pasquale, Liliana; Mazeiar, Salehie; Ali, Raian; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Adaptive security aims to protect valuable assets managed by a system, by applying a varying set of security controls. Engineering adaptive security is not an easy task. A set of effective security countermeasures should ...
  • Farfeleder, Stefan; Moser, Thomas; Krall, Andreas; Stalhane, Tor; Omoronyia, Inah; Zojer, Herbert (Association for Computing Machinery, 2011)
    Requirements managers aim at keeping their sets of requirements well-defined, consistent and up to date throughout a project’s life cycle. Semantic web technologies have found many valuable applications in the field of ...
  • Tun, Thein Than; Bandara, Arosha K.; Price, Blaine A.; Yu, Yijun; Haley, Charles; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Privacy requirements for mobile applications offer a distinct set of challenges for requirements engineering. First, they are highly dynamic, changing over time and locations, and across the different roles of ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian; Nuseibeh, Bashar (2012)
    Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets are therefore key activities in any security engineering process – from modeling threats and attacks, discovering ...
  • Pasquale, Liliana; Menghi, Claudio; Salehie, Mazeiar; Cavallaro, Luca; Omoronyia, Inah; Nuseibeh, Bashar (Association for Computing Machinery, 2012)
    This paper presents SecuriTAS, a tool to engineer adap- tive security. It allows software designers to model security concerns together with the requirements of a system. This model is then used at runtime to analyze ...
  • Ali, Raian; Solis, Carlos; Omoronyia, Inah; Salehie, Mazeiar; Nuseibeh, Bashar (2012)
    Adaptive systems are characterized by the ability to monitor changes in their volatile world and react to monitored changes when needed. The ultimate goal of adaptation is that users’ requirements are always met correctly ...
  • Ali, Raian; Solis, Carlos; Salehie, Mazeiar; Omoronyia, Inah; Nuseibeh, Bashar; Maalej, Walid (Association for Computing Machinery, 2011)
    Adaptation requires a system to monitor its operational context to ensure that when changes occur, a suitable adaptation action is planned and taken at runtime. The ultimate goal of adaptation is that users get their dynamic ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Smart grids are increasingly proliferating all over the world to leverage electricity infrastructures with information technology. Smart metering, particularly Advanced Metering Infrastructure (AMI), is an enabling ...

Search DSpace


Browse

My Account

Statistics