University of Limerick Institutional Repository

Browsing LERO - UL authors by Author "Pasquale, Liliana"

DSpace Repository

Browsing LERO - UL authors by Author "Pasquale, Liliana"

Sort by: Order: Results:

  • Pasquale, Liliana; Hanvey, Sorren; Mcgloin, Mark; Nuseibeh, Bashar (Elsevier, 2016)
    The increase in crimes targeting the cloud is increasing the amount of data that must be analysed during a digital forensic investigation, exacerbating the problem of processing such data in a timely manner. Since collecting ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Nuseibeh, Bashar (2012)
    Despite the benefits offered by smart grids, energy producers, distributors and consumers are increasingly concerned about possible security and privacy threats. These threats typically manifest themselves at runtime ...
  • Grispos, George; Garcia-Galan, Jesus; Pasquale, Liliana; Nuseibeh, Bashar (IEEE Computer Society, 2017)
    As security incidents continue to impact organisations, there is a growing demand for systems to be 'forensic-ready’ – to maximise the potential use of evidence whilst minimising the costs of an investigation. Researchers ...
  • Tsigkanos, Christos; Pasquale, Liliana; Ghezzi, Carlo; Nuseibeh, Bashar (IEEE Computer Society, 2015)
    This paper presents Ariadne, a tool for engineering topology aware adaptive security for cyber-physical systems. It allows security software engineers to model security requirements together with the topology of the ...
  • Omoronyia, Inah; Pasquale, Liliana; Salehie, Mazeiar; Cavallaro, Luca; Doherty, Gavin; Nuseibeh, Bashar (Association for Computing Machinery, 2012)
    In a dynamic environment where context changes frequently, users’ privacy requirements can also change. To satisfy such changing requirements, there is a need for continuous analysis to discover new threats and possible ...
  • Borda, Aimee; Pasquale, Liliana; Koutavas, Vasileios; Nuseibeh, Bashar (Assocation for Computing Machinery, 2018)
    Cyber-Physical Systems (CPSs) must often self-adapt to respond to changes in their operating environment. However, using formal verification techniques to provide assurances that critical requirements are satisfied can ...
  • Baresi, Luciano; Pasquale, Liliana (2011)
    Requirements elicitation is an important phase of the software life-cycle, since it helps to reduce the software development time and costs. Unfortunately, existing tools for software design are mainly focused on building ...
  • Omoronyia, Inah; Cavallaro, Luca; Salehie, Mazeiar; Pasquale, Liliana; Nuseibeh, Bashar (Association for Computing Machinery, 2013)
    Applications that continuously gather and disclose personal information about users are increasingly common. While disclosing this information may be essential for these applications to function, it may also raise privacy ...
  • Baresi, Luciano; Ripa, Gianluca; Pasquale, Liliana (2013)
    This paper describes IRENE (Indenica Requirements ElicitatioN mEthod), a methodology to elicit and model the requirements of service platforms, and IRET (IREne Tool), the Eclipse-based modeling framework we developed for IRENE
  • Alrimawi, Faeq; Pasquale, Liliana; Mehta, Deepak; Nuseibeh, Bashar (Association for Computing Machinery, 2018)
    An increasing number of security incidents in cyber-physical systems (CPSs) arise from the exploitation of cyber and physical components of such systems. Knowledge about how such incidents arose is rarely captured and used ...
  • Pasquale, Liliana; Spoletini, Paola (IEEE Computer Society, 2011)
    Service compositions are an important family of self-adaptive systems, which need to cope with the variability of the environment (e.g., heterogeneous devices, changing context), and react to unexpected events (e.g., ...
  • Tsigkanos, Christos; Pasquale, Liliana; Ghezzi, Carlo; Nuseibeh, Bashar (IEEE Computer Society, 2018)
    Ubiquitous computing is resulting in a proliferation of cyber-physical systems that host or manage valuable physical and digital assets. These assets can be harmed by malicious agents through both cyber-enabled or ...
  • Pasquale, Liliana; Mazeiar, Salehie; Ali, Raian; Omoronyia, Inah; Nuseibeh, Bashar (IEEE Computer Society, 2012)
    Adaptive security aims to protect valuable assets managed by a system, by applying a varying set of security controls. Engineering adaptive security is not an easy task. A set of effective security countermeasures should ...
  • Pasquale, Liliana; Spoletini, Paola; Pometto, Dario; Blasi, Francesco; Redaelli, Tiziana (Springer, 2013)
    [Context and motivation] In the last years motion-based games have achieved an increasing success. These games have great potential to support physiotherapeutic programs, as they can guide the patients in performing the ...
  • Pasquale, Liliana; Yu, Yijun; Mazeiar, Salehie; Cavallaro, Luca; Tun, Thein Than; Nuseibeh, Bashar (IEEE Computer Society, 2013)
    We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activities, ...
  • Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian; Nuseibeh, Bashar (2012)
    Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets are therefore key activities in any security engineering process – from modeling threats and attacks, discovering ...
  • Pasquale, Liliana; Menghi, Claudio; Salehie, Mazeiar; Cavallaro, Luca; Omoronyia, Inah; Nuseibeh, Bashar (Association for Computing Machinery, 2012)
    This paper presents SecuriTAS, a tool to engineer adaptive security. It allows software designers to model security concerns together with the requirements of a system. This model is then used at runtime to analyze changes ...
  • Pasquale, Liliana; Ghezzi, Carlo; Pasi, Edoardo; Tsigkanos, Christos; Boubekeur, Menouer; Florentino-Liano, Blanca; Hadzic, Tarik; Nuseibeh, Bashar (IEEE Computer Society, 2017)
    Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities. A representation of the spaces' topology can reveal security-relevant contextual characteristics, and a visualization ...
  • Pasquale, Liliana; Ghezzi, Carlo; Menghi, Claudio; Tsigkanos, Christos; Nuseibeh, Bashar (Association for Computing Machinery, 2014)
    Adaptive security systems aim to protect valuable assets in the face of changes in their operational environment. They do so by monitoring and analysing this environment, and deploying security functions that satisfy ...
  • García-Galán, Jesús; Pasquale, Liliana; Grispos, George; Nuseibeh, Bashar (Association for Computer Machinery, 2016)
    Mission critical software is often required to comply with multiple regulations, standards or policies. Recent paradigms, such as cloud computing, also require software to operate in heterogeneous, highly distributed, ...

Search ULIR


Browse

My Account

Statistics