Project Publications
The publication list below needs updating. In the meantime, most of the project publications are available on ORO.
Adaptation
- Bennaceur, Amel; Mccormick, Ciaran; García Galán, Jesús; Naranwala Gonaduwage, Charith; Smith, Andrew; Zisman, Andrea and Nuseibeh, Bashar (2016). Feed me, Feed me: An Exemplar for Engineering Adaptive Software. In: 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 16-17 May 2016.
- Bennaceur, Amel and Nuseibeh, Bashar (2016). The Many Facets of Mediation: A Requirements-driven Approach for Trading-off Mediation Solutions. In: Mistrík, Ivan; Ali, Nour; Grundy, John; Kazman, Rick and Schmerl, Bradley eds. Managing trade-offs in adaptable software architectures. Elsevier.
- Bennaceur, Amel; Andriescu , Emil; Speicys Cardoso, Roberto and Issarny, Valérie (2015). A unifying perspective on protocol mediation: interoperability in the Future Internet. Journal of Internet Services and Applications, 6(1): 12:1-12:15, 2015
- García-Galán, Jesús; Pasquale, Liliana; Trinidad, Pablo and Ruiz-Cortés, Antonio, User-centric Adaptation Analysis of Multi-tenant Services, ACM Transactions on Autonomous and Adaptive Systems (to appear, 2015).
- Bennaceur, Amel and Issarny, Valérie (2015). Automated synthesis of mediators to support component interoperability.. IEEE Transactions on Software Engineering, 41(3): 221-240.
- Bennaceur, Amel and Issarny, Valérie (2014). Layered connectors: revisiting the formal basis of architectural connection for complex distributed systems. In: ECSA'14 - The 8th European Conference on Software Architecture, 25-29 August 2014, Vienna, Austria.
- Jesús García Galán, Liliana Pasquale, Pablo Trinidad and Antonio Ruiz-Cortés, User-centric Adaptation of Multi-tenant Services: Preference-based Analysis for Service Reconfiguration, In Proceedings of 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2014), Hyderabad, India, 2-3 June 2014 (Best Paper Award).
- Chen, Bihuan; Peng, Xin; Yu, Yijun; and Zhao, Wenyun (2014). Requirements-Driven Self-Optimization of Composite Services using Feedback Control. In: IEEE Trans. on Services Computing, to appear.
- Chen, Bihuan; Peng, Xin; Yu, Yijun; Nuseibeh, Bashar; and Zhao, Wenyun (2014). "Self-Adaptation through Incremental Generative Model Transformations at Runtime", in Proc. of International Conference on Software Engineering (ICSE), pp. 676-687.
- Akiki, Pierre A.; Bandara, Arosha K. and Yu, Yijun (2014). "Integrating Adaptive User Interface Capabilities in Enterprise Applications". in Proc. of International Conference on Software Engineering (ICSE), pp. 712-723.
- Yijun Yu, Thein Than Tun, Arosha K. Bandara, Tian Zhang, Bashar Nuseibeh. "From Model-Driven Software Development Processes to Problem Diagnoses at Runtime". In: Models@Run.Time. Nelly Bencome et al Eds, LNCS 8378, p.188-207, 2014. Springer.
- Fu, Lingxiao; Peng, Xin; Yu, Yijun; Mylopoulos, John and Zhao, Wenyun (2012). Stateful requirements monitoring for self-repairing socio-technical systems. In: 20th IEEE International Requirements Engineering Conference, 24-28 September 2012 , Chicago, Illinois.
- Salifu, Mohammed; Yu, Yijun; Bandara, Arosha K. and Nuseibeh, Bashar (2012). Analysing monitoring and switching problems for adaptive systems. Journal of Systems and Software, 85(12):2829-2839.
- Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair and Nuseibeh, Bashar (2012). Speculative requirements: automatic detection of uncertainty in natural language requirements. In: The 20th IEEE International Requirements Engineering Conference , 24-28 September 2012, Chicago, ILL, USA.
Security
- Yu, Yijun; Franqueira, Virginia N. L.; Tun, Thein; Wieringa, Roel J. and Nuseibeh, Bashar (2015). Automated analysis of security requirements through risk-based argumentation. Journal of Systems and Software, 106: 102-116.
- Yu, Yijun; Piwek, Paul; Tun, Thein Than and Nuseibeh, Bashar (2014), Towards explaining rebuttals in security arguments, In: 14th Workshop on Computational Models of Natural Argument, 10 December 2014, Krakow, Poland.
- Christos Tsigkanos, Liliana Pasquale, Carlo Ghezzi, and Bashar Nuseibeh, Ariadne: Topology Aware Adaptive Security for Cyber-Physical Systems, In Proceedings of International Conference on Software Engineering (ICSE), May 2015: 729-732.
- ChristosTsigkanos, Liliana Pasquale, Claudio Menghi, Carlo Ghezzi, and Bashar Nuseibeh, Engineering topology aware adaptive security: preventing requirements violations at runtime, In Proceedings of 22nd IEEE International Requirements Engineering Conference (RE' 2014), Karlskrona, Sweden, pp. 203–212, 25-29 August 2014.
- Liliana Pasquale, Carlo Ghezzi, Claudio Menghi, Christos Tsigkanos and Bashar Nuseibeh. Topology Aware Adaptive Security, In Proceedings of 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2014), Hyderabad, India, 2-3 June 2014.
- Amel Bennaceur, Arosha Bandara, Michael Jackson, Wei Liu, Lionel Montrieux, Thein Than Tun, Yijun Yu and Bashar Nuseibeh. Requirements-Driven Mediation for Collaborative Security, In Proceedings of 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2014), Hyderabad, India, 2-3 June 2014.
- Christopher Bailey, Lionel Montrieux, Rogério de Lemos, Yijun Yu, Michel Wermelinger (2014). "Run-time generation, transformation, and verification of access control models for self-protection". In Proceedings of 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2014), Hyderabad, India, 2-3 June 2014.
- Pasquale, Liliana; Yu, Yijun; Salehie, Mazeiar; Cavallaro, Luca; Tun, Thein Than and Nuseibeh, Bashar (2013), Requirements-driven adaptive digital forensics. In: 21st IEEE Requirements Engineering Conference, 15-19 July, 2013, Rio de Janeiro, Brazil (Best Poster Award.
- Taubenberger, Stefan; Jurjens, Jan; Yu, Yijun and Nuseibeh, Bashar (2013). Resolving vulnerability identification errors using security requirements on business process models. Information Management and Computer Security, 21(3) pp. 202–223.
- Saleem, Saad Bin; Montrieux, Lionel; Yu, Yijun; Tun, Thein and Nuseibeh, Bashar (2013).Maintaining security requirements of software systems using evolving crosscutting dependencies. In:Chitchyan, Ruzanna; Moreira, Ana; Araujo, Joao and Rashid, Awais eds. Aspect Oriented Requirements Engineering. Springer.
- Alebrahim, Azadeh; Tun, Thein Than; Yu, Yijun; Heisel, Maritta and Nuseibeh, Bashar (2012). An aspect-oriented approach to relating security requirements and access control. In: CAiSE'12 Forum, 28 June 2012, Gdansk, Poland.
- Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian and Nuseibeh, Bashar (2012). Requirements-driven adaptive security: protecting variable assets at runtime. In: 20th International Requirements Engineering Conference (RE'12), 24-28 September 2012, Chicago, USA.
- Liliana Pasquale, Claudio Menghi, Mazeiar Salehie, Luca Cavallaro, Inah Omoronyia, Bashar Nuseibeh, "SecuriTAS: a tool for engineering adaptive security", ACM SIGSOFT 20th International Symposium on Foundations of Software Engineering (FSE 2012), North Carolina, USA, p19.
Privacy
- Mehta, V., Bandara, A.K., Price, B.A. and Nuseibeh, B., Privacy Itch and Scratch: On Body Privacy Warnings and Controls, In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (pp. 2417-2424), May 2016, ACM.
- Mehta, V., Bandara, A.K., Price, B.A. and Nuseibeh, B., Wearables for physical privacy, In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct (pp. 942-945), September 2016, ACM.
- Barhamgi, Mahmoud; Bandara, Arosha K.; Yu, Yijun, Belhajjame, Khalid; Nuseibeh, Bashar, Protecting Privacy in the Cloud: Current Practices, Future Directions, In: IEEE Computer, 49(2): 68-72 (2016).
- Yang, Mu; Yu, Yijun; Bandara, Arosha and Nuseibeh, Bashar (2014). Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit. In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), 24-26 September 2014, Beijing, China. (Best Paper Award)
- Keerthi Thomas, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh (2014), Distilling privacy requirements for mobile applications, In: Proceedings of International Conference on Software Engineering (ICSE 2014), pp. 871-882, May 2014, India.
- Inah Omoronyia, Luca Cavallaro, Mazeiar Salehie, Liliana Pasquale, and Bashar Nuseibeh, "Engineering Adaptive Privacy: on the role of privacy awareness requirements", In: 35th International Conference on Software Engineering (ICSE 2013), San Francisco, USA, May 2013.
- Omoronyia, Inah; Pasquale, Liliana; Salehie, Mazeiar; Cavallaro, Luca; Doherty, Gavin and Nuseibeh, Bashar (2012). Caprice: a tool for engineering adaptive privacy. In: 27th IEEE/ACM International Conference on Automated Software Engineering (ASE 2012), 3-7 September 2012, Essen, Germany.
- Tun, Thein Than; Bandara, Arosha K.; Price, Blaine A.; Yu, Yijun; Haley, Charles; Omoronyia, Inah and Nuseibeh, Bashar (2012). Privacy arguments: analysing selective disclosure requirements for mobile applications. In: 20th IEEE International Requirements Engineering Conference, 24-28 September 2012 , Chicago, Illinois.
Interaction
- Ahmed, N., Rahman, S.A.U., Rony, R.J., Mushfique, T. and Mehta, V., Protibadi next: sensor support to handle sexual harassment, In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct (pp. 918-921), September 2016, ACM.
- Bourgeois, Jacky; Foell, Stefan; Kortuem, Gerd; Price, Blaine A.; van der Linden,Janet; Elbanhawy,Eiman Y.; and Rimmer, Christopher. 2015. Harvesting green miles from my roof: an investigation into self-sufficient mobility with electric vehicles. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '15). ACM, New York, NY, USA, 1065-1076. DOI=http://dx.doi.org/10.1145/2750858.2807546
- Bourgeois, Jacky; van der Linden, Janet; Kortuem, Gerd; Price, Blaine A. and Rimmer, Christopher. Conversations with my washing machine: an in-the-wild study of demand shifting with self-generated energy. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '14). ACM, New York, NY, USA, 459-470. DOI=http://dx.doi.org/10.1145/2632048.2632106
- Akiki, Pierre; Bandara, Arosha K. and Yu, Yijun (2013). RBUIS: simplifying enterprise application user interfaces through engineering role-based adaptive behavior. In: The Fifth ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2013), 24–27 June 2013, London, UK (Best Paper Award).
- Akiki, Pierre A.; Bandara, Arosha K. and Yu, Yijun (2013). Crowdsourcing user interface adaptations for minimizing the bloat in enterprise applications. In: The Fifth ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2013), 24–27 June 2013, London, UK
- Akiki, Pierre; Bandara, Arosha and Yu, Yijun (2013). Preserving designer input on concrete user interfaces using constraints while maintaining adaptive behavior. In: 2nd Workshop on Context-Aware Adaptation of Service Front-Ends (CASFE 2013), 24 June 2013, London, UK.
- Akiki, Pierre A.; Bandara, Arosha K. and Yu, Yijun (2013). Cedar Studio: an IDE supporting adaptive model-driven user interfaces for enterprise applications. In: The Fifth ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2013), 24–27 June 2013, London, UK.
Related Publications
Adaptation
- Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah and Nuseibeh, Bashar (2012). Adaptive security and privacy in smart grids: A software engineering vision. In: Software Engineering for the Smart Grid (SE4SG), 2012 International Workshop, 3 June 2012 , University of Zurich.
- Yu, Yijun; Lin, Yu; Hu, Zhenjiang; Hidaka, Soichiro; Hiroyuki, Kato and Montrieux, Lionel (2012). Maintaining invariant traceability through bidirectional transformations. In: 34th International Conference on Software Engineering, 02-09 June 2012, Zurich. pp. 540-550.
- Ali, Raian; Solis, Carlos; Omoronyia, Inah; Salehie, Mazeiar and Nuseibeh, Bashar (2012). Social adaptation: when software gives users a voice. In: ENASE 2012: 7th International Conference Evaluation of Novel Approaches to Software Engineering , 28-30 June 2012, Wroclaw, Poland.
- Ali, Raian; Solís, Carlos; Salehie, Mazeiar; Omoronyia, Inah; Nuseibeh, Bashar and Maalej, Walid(2011). Social sensing: when users become monitors. In: 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering (ESEC/FSE 2011), 5-9 September 2011, Szeged, Hungary.
- Borges, Rafael V.; Garcez, Artur D'Avila; Lamb, Luís C. and Nuseibeh, Bashar (2011). Learning to adapt requirements specifications of evolving systems (NIER Track). In: 33rd International Conference on Software Engineering (ICSE 2011), 21-28 May 2011, Honolulu, Hawaii, USA.
Security
- Pasquale, Liliana; Salehie, Mazeiar; Ali, Raian; Omoronyia, Inah and Nuseibeh, Bashar (2012). On the role of primary and secondary assets in adaptive security: An application in smart grids. In: Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2012 ICSE Workshop , 4-5 June 2012, Switzerland.
- Franqueira, Virginia Nunes Leas; Tun, Thein Than; Yu, Yijun; Wieringa, Roel and Nuseibeh, Bashar (2011).Risk and argument: a risk-based argumentation method for practical security. In: 19th IEEE International Conference on Requirements Engineering, 29 Aug - 2 Sep 2011, Trento, Italy.
- Yu, Yijun; Tun, Thein; Tedeschi, Alessandra; Franqueira, Virginia N. L. and Nuseibeh, Bashar (2011).OpenArgue: supporting argumentation to evolve secure software systems. In: 19th IEEE International Requirements Engineering Conference, 29 Aug - 02 Sep 2011 .
- Bandara, Arosha; Shinpei, Hayashi; Jurjens, Jan; Kaiya, Haruhiko; Kubo, Atsuto; Laney, Robin;Mouratidis, Haris; Nhlabatsi, Armstrong; Nuseibeh, Bashar; Tahara, Yasuyuki; Tun, Thein; Washizaki, Hironori; Yoshioka, Nobukazi and Yu, Yijun (2010). Security patterns: comparing modeling approaches. In: Mouratidis, Haris ed. Software Engineering for Secure Systems: Industrial and Research Perspectives. Hershey, PA: IGI Global, pp. 75–111.
- Tun, Thein Than; Yu, Yijun; Haley, C. and Nuseibeh, B. (2010). Model-Based argument analysis for evolving security requirements. In: Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, 9-11 September 2010, Singapore.
- Nhlabatsi, Armstrong; Nuseibeh, Bashar and Yu, Yijun (2010). Security requirements engineering for evolving software systems: a survey. International Journal of Secure Software Engineering (IJSSE), 1(1), pp. 54–73.
- Nuseibeh, Bashar; Haley, Charles B. and Foster, Craig (2009). Securing the skies: In requirements we trust. Computer, 42(9), pp. 64–72.
- Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar (2008). Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Transactions on Software Engineering, 34(1), pp. 133–153.
- Richards, Mike; Price, Blaine A. and Nuseibeh, Bashar (2008). Placing computer security at the heart of learning. Progress in Informatics, 5(2008), pp. 91–98.
Privacy
- Benats, Guillaume; Bandara, Arosha; Yu, Yijun; Colin, Jean-Noel and Nuseibeh, Bashar (2011).PrimAndroid: privacy policy modelling and analysis for Android applications. In: IEEE International Symposium on Policies for Distributed Systems and Networks, 6-8 June 2011, Pisa, Italy.
- Mancini, Clara; Rogers, Yvonne; Thomas, Keerthi; Joinson, Adam; Price, Blaine; Bandara, Arosha;Jedrzejczyk, Lukasz and Nuseibeh, Bashar (2011). In the best families: tracking and relationships. In:29th International ACM Conference on Human Factors in Computing Systems, ACM CHI 2011, 07-12 May 2011, Vancouver, Canada.
- Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha K. and Nuseibeh, Bashar (2010). On the impact of real-time feedback on users' behaviour in mobile location-sharing applications. In: SOUPS '10: Proceedings of the Sixth Symposium on Usable Privacy and Security, 14-16 July 2010.
- Mancini, Clara; Thomas, Keerthi; Rogers, Yvonne; Price, Blaine A.; Jedrzejczyk, Lukazs; Bandara, Arosha K.; Joinson, Adam N. and Nuseibeh, Bashar (2009). From spaces to places: Emerging contexts in mobile privacy. In: Proceedings of the 11th International conference on Ubiquitous computing, 30 Sept - 3 Oct 2009, Orlando, Florida, USA.
- Price, Blaine A.; Mancini, Clara; Rogers, Yvonne; Bandara, Arosha K.; Coe, Tony; Joinson, Adam N.; Lay, Jeffery A. and Nuseibeh, Bashar (2010). ContraVision: presenting contrasting visions of future technology.In: 28th International Conference on Human Factors in Computing Systems, 10-15 Apr 2010, Atlanta, GA, USA.
- Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha and Nuseibeh, Bashar (2010). "Privacy-shake": a haptic interface for managing privacy settings in mobile location sharing applications. In: MobileHCI '10: Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services, 7-10 September 2010, Libon, Portugal.
- Mancini, Clara; Rogers, Yvonne; Bandara, Arosha; Coe, Tony; Jedrzejczyk, Lukasz; Joinson, Adam;Price, Blaine; Thomas, Keerthi and Nuseibeh, Bashar (2010). Contravision: Exploring users' reactions to futuristic technology. In: Proceedings of the 28th International Conference on Human factors in computing systems, 10-15 April 2010, Atlanta Georgia, USA.