Follow
Nazila Gol Mohammadi
Nazila Gol Mohammadi
paluno - The Ruhr Institute for Software Technology
Verified email at paluno.uni-due.de
Title
Cited by
Cited by
Year
A Tool for Monitoring and Maintaining System Trustworthiness at Runtime
A Goldsteen, M Moffie, T Bandyszak, NG Mohammadi, X Chen, ...
Proceedings of the 1st International Workshop on Requirements Engineering …, 2015
1102015
Trustworthiness attributes and metrics for engineering trusted internet-based software systems
NG Mohammadi, S Paulus, M Bishr, A Metzger, H Könnecke, ...
International Conference on Cloud Computing and Services Science, 19-35, 2013
682013
An Analysis of Software Quality Attributes and Their Contribution to Trustworthiness.
NG Mohammadi, S Paulus, M Bishr, A Metzger, H Koennecke, ...
CLOSER, 542-552, 2013
422013
Nazila Gol Mohammadi, and Thorsten Weyer. Trustworthy software development
S Paulus
Proceedings of The IFIP International Conference on Communications and …, 0
26*
Trustworthy software development
S Paulus, NG Mohammadi, T Weyer
IFIP International Conference on Communications and Multimedia Security, 233-247, 2013
242013
A framework for combining problem frames and goal models to support context analysis during requirements engineering
NG Mohammadi, A Alebrahim, T Weyer, M Heisel, K Pohl
International Conference on Availability, Reliability, and Security, 272-288, 2013
212013
Privacy Policy Specification Framework for Addressing End-Users’ Privacy Requirements
NG Mohammadi, J Leicht, N Ulfat-Bunyadi, M Heisel
International Conference on Trust and Privacy in Digital Business, 46-62, 2019
172019
A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN
NG Mohammadi, M Heisel
International Conference on Trust and Privacy in Digital Business, 3-18, 2016
162016
Trustworthy Cyber-Physical Systems
G Mohammadi
Springer Fachmedien Wiesbaden, 2019
152019
Patterns for identification of trust concerns and specification of trustworthiness requirements
NG Mohammadi, M Heisel
Proceedings of the 21st European Conference on Pattern Languages of Programs …, 2016
152016
Maintaining trustworthiness of socio-technical systems at run-time
NG Mohammadi, T Bandyszak, M Moffie, X Chen, T Weyer, C Kalogiros, ...
International Conference on Trust, Privacy and Security in Digital Business …, 2014
152014
Enhancing Business Process Models with Trustworthiness Requirements
NG Mohammadi, M Heisel
IFIP International Conference on Trust Management, 33-51, 2016
132016
A Framework for Systematic Refinement of Trustworthiness Requirements
NG Mohammadi, M Heisel
Information 8 (2), 46, 2017
122017
Extending Software Development Methodologies to Support Trustworthiness-by-Design.
NG Mohammadi, T Bandyszak, S Paulus, PH Meland, T Weyer, K Pohl
CAiSE Forum, 213-220, 2015
112015
Towards trustworthiness assurance in the cloud
F Di Cerbo, P Bisson, A Hartman, S Keller, PH Meland, M Moffie, ...
Cyber Security and Privacy Forum, 3-15, 2013
112013
Towards an End-to-End Architecture for Run-Time Data Protection in the Cloud
NG Mohammadi, ZÁ Mann, A Metzger, M Heisel, J Greig
2018 44th Euromicro Conference on Software Engineering and Advanced …, 2018
102018
Combining Risk-Management and Computational Approaches for Trustworthiness Evaluation of Socio-Technical Systems.
NG Mohammadi, T Bandyszak, A Goldsteen, C Kalogiros, T Weyer, ...
CAiSE Forum, 237-244, 2015
102015
A framework for evaluating the end-to-end trustworthiness
NG Mohammadi, T Bandyszak, C Kalogiros, M Kanakakis, T Weyer
2015 IEEE Trustcom/BigDataSE/ISPA 1, 638-645, 2015
72015
Extending development methodologies with trustworthiness-by-design for socio-technical systems
NG Mohammadi, T Bandyszak, S Paulus, PH Meland, T Weyer, K Pohl
Trust, 206-207, 2014
72014
Pattern-based incorporation of privacy preferences into privacy policies: negotiating the conflicting needs of service providers and end-users
NG Mohammadi, J Pampus, M Heisel
Proceedings of the 24th European Conference on Pattern Languages of Programs …, 2019
62019
The system can't perform the operation now. Try again later.
Articles 1–20