default search action
Nazila Gol Mohammadi
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c28]Nazila Gol Mohammadi, Jens Leicht, Ludger Goeke, Maritta Heisel:
Assisted Generation of Privacy Policies using Textual Patterns. ENASE 2020: 347-358 - [c27]Nazila Gol Mohammadi, Ludger Goeke, Maritta Heisel, Mike Surridge:
Systematic Risk Assessment of Cloud Computing Systems using a Combined Model-based Approach. ICEIS (2) 2020: 53-66
2010 – 2019
- 2019
- [b1]Nazila Gol Mohammadi:
Trustworthy Cyber-Physical Systems - A Systematic Framework towards Design and Evaluation of Trust and Trustworthiness. University of Duisburg-Essen, Germany, Springer Vieweg 2019, ISBN 978-3-658-27487-0, pp. 1-320 - [c26]Nazila Gol Mohammadi, Roman Wirtz, Maritta Heisel:
Systematic Asset Identification and Modeling During Requirements Engineering. CRiSIS 2019: 50-66 - [c25]Nazila Gol Mohammadi, Julia Pampus, Maritta Heisel:
Pattern-based incorporation of privacy preferences into privacy policies: negotiating the conflicting needs of service providers and end-users. EuroPLoP 2019: 5:1-5:12 - [c24]Nazila Gol Mohammadi, Angela Borchert, Julia Pampus, Maritta Heisel:
A generic conceptual data model of social media services. EuroPLoP 2019: 22:1-22:12 - [c23]Nazila Gol Mohammadi, Jens Leicht, Nelufar Ulfat-Bunyadi, Maritta Heisel:
Privacy Policy Specification Framework for Addressing End-Users' Privacy Requirements. TrustBus 2019: 46-62 - 2018
- [j2]Ludger Goeke, Nazila Gol Mohammadi, Maritta Heisel:
Context Analysis of Cloud Computing Systems Using a Pattern-Based Approach. Future Internet 10(8): 72 (2018) - [c22]Nazila Gol Mohammadi, Zoltán Ádám Mann, Andreas Metzger, Maritta Heisel, James Greig:
Towards an End-to-End Architecture for Run-Time Data Protection in the Cloud. SEAA 2018: 514-518 - [c21]Nelufar Ulfat-Bunyadi, Nazila Gol Mohammadi, Maritta Heisel:
Supporting the Systematic Goal Refinement in KAOS using the Six-Variable Model. ICSOFT 2018: 136-145 - [c20]Nelufar Ulfat-Bunyadi, Nazila Gol Mohammadi, Roman Wirtz, Maritta Heisel:
Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem Diagrams. ICSOFT (Selected Papers) 2018: 150-172 - [c19]Nazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel:
Problem-based Derivation of Trustworthiness Requirements from Users' Trust Concerns. PST 2018: 1-10 - [c18]Nazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel:
Trustworthiness Cases - Toward Preparation for the Trustworthiness Certification. TrustBus 2018: 244-259 - 2017
- [j1]Nazila Gol Mohammadi, Maritta Heisel:
A Framework for Systematic Refinement of Trustworthiness Requirements. Inf. 8(2): 46 (2017) - 2016
- [c17]Nazila Gol Mohammadi, Maritta Heisel:
Patterns for identification of trust concerns and specification of trustworthiness requirements. EuroPLoP 2016: 31 - [c16]Nelufar Ulfat-Bunyadi, Rene Meis, Nazila Gol Mohammadi, Maritta Heisel:
Introducing Product Line Engineering in a Bottom-up Approach. ICSOFT-PT 2016: 146-153 - [c15]Nazila Gol Mohammadi, Maritta Heisel:
Enhancing Business Process Models with Trustworthiness Requirements. IFIPTM 2016: 33-51 - [c14]Nazila Gol Mohammadi, Maritta Heisel:
A Framework for Systematic Analysis and Modeling of Trustworthiness Requirements Using i* and BPMN. TrustBus 2016: 3-18 - 2015
- [c13]Nazila Gol Mohammadi, Torsten Bandyszak, Sachar Paulus, Per Håkon Meland, Thorsten Weyer, Klaus Pohl:
Extending Software Development Methodologies to Support Trustworthiness-by-Design. CAiSE Forum 2015: 213-220 - [c12]Nazila Gol Mohammadi, Torsten Bandyszak, Abigail Goldsteen, Costas Kalogiros, Thorsten Weyer, Micha Moffie, Bassem I. Nasser, Mike Surridge:
Combining Risk-Management and Computational Approaches for Trustworthiness Evaluation of Socio-Technical Systems. CAiSE Forum 2015: 237-244 - [c11]Francesco Di Cerbo, Nazila Gol Mohammadi, Sachar Paulus:
Evidence-Based Trustworthiness of Internet-Based Services Through Controlled Software Development. CSP Forum 2015: 91-102 - [c10]Abigail Goldsteen, Micha Moffie, Torsten Bandyszak, Nazila Gol Mohammadi, Xiaoyu Chen, Symeon Meichanetzoglou, Sotiris Ioannidis, Panos Chatziadam:
A Tool for Monitoring and Maintaining System Thrustworthiness at Runtime. REFSQ Workshops 2015: 142-147 - [c9]Torsten Bandyszak, Nazila Gol Mohammadi, Mohamed Bishr, Abigail Goldsteen, Micha Moffie, Bassem I. Nasser, Sandro Hartenstein, Symeon Meichanetzoglou:
Cyber-Physical Systems Design for Runtime Thrustworthiness Maintenance Supported by Tools. REFSQ Workshops 2015: 148-155 - [c8]Azadeh Alebrahim, Nazila Gol Mohammadi, Maritta Heisel:
Challenges in Rendering and Maintaining Trustworthiness for Long-Living Software Systems. Software Engineering (Workshops) 2015: 103-105 - [c7]Nazila Gol Mohammadi, Torsten Bandyszak, Costas Kalogiros, Michalis Kanakakis, Thorsten Weyer:
A Framework for Evaluating the End-to-End Trustworthiness. TrustCom/BigDataSE/ISPA (1) 2015: 638-645 - 2014
- [c6]Nazila Gol Mohammadi, Torsten Bandyszak, Sachar Paulus, Per Håkon Meland, Thorsten Weyer, Klaus Pohl:
Extending Development Methodologies with Trustworthiness-By-Design for Socio-Technical Systems - (Extended Abstract). TRUST 2014: 206-207 - [c5]Nazila Gol Mohammadi, Torsten Bandyszak, Micha Moffie, Xiaoyu Chen, Thorsten Weyer, Costas Kalogiros, Bassem I. Nasser, Mike Surridge:
Maintaining Trustworthiness of Socio-Technical Systems at Run-Time. TrustBus 2014: 1-12 - 2013
- [c4]Nazila Gol Mohammadi, Azadeh Alebrahim, Thorsten Weyer, Maritta Heisel, Klaus Pohl:
A Framework for Combining Problem Frames and Goal Models to Support Context Analysis during Requirements Engineering. CD-ARES 2013: 272-288 - [c3]Nazila Gol Mohammadi, Sachar Paulus, Mohamed Bishr, Andreas Metzger, Holger Könnecke, Sandro Hartenstein, Thorsten Weyer, Klaus Pohl:
Trustworthiness Attributes and Metrics for Engineering Trusted Internet-Based Software Systems. CLOSER (Selected Papers) 2013: 19-35 - [c2]Nazila Gol Mohammadi, Sachar Paulus, Mohamed Bishr, Andreas Metzger, Holger Koennecke, Sandro Hartenstein, Klaus Pohl:
An Analysis of Software Quality Attributes and Their Contribution to Trustworthiness. CLOSER 2013: 542-552 - [c1]Sachar Paulus, Nazila Gol Mohammadi, Thorsten Weyer:
Trustworthy Software Development. Communications and Multimedia Security 2013: 233-247
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 01:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint