Back
Return
Biography


Dr. Shareeful Islam

University of East London, UK

Email: shareeful@uel.ac.uk


Qualifications

2010 Ph.D., Software Development Risk Management Model-a goal-driven approac, Technische Universität München (TUM), Germany

2005 M.Sc., Information Communication System Security, Royal Institute of Technology (KTH), Sweden

2000 M.Sc.,Computer Science, University of Dhaka, Bangladesh (1st class, 1st position)

1997 B.Sc., Applied Physics & Electronics, University of Dhaka, Bangladesh


Publications (Selected)

  1. UM Ismail, S Islam , A unified framework for cloud security transparency and audit, Journal of Information Security and Applications, Elsevier , Volume 54, October 2020. (Impact factor 2.327 )
  2. M. Uddin, S. Islam, A dynamic access control model using authorising workflow and task-role based access control, IEEE Access, 2019 , Accepted. (Impact factor 4.098)
  3. H. I. Kure, S. Islam, Cyber threat intelligence for improving cybersecurity and risk management in the critical infrastructure organisation, Journal of Universal Computer Science (J.UC Special Issue on Cyberattack Detection and Response. I 2019 (Impact factor 0.91)
  4. A Yeboah-Ofori, S.Islam , Cyber Security Threat Modeling for Supply Chain Organizational Environments , Special Issue 10th Anniversary Feature Paper , Future Internet 11 (3), 63,2019.
  5. H. I. Kure, S. Islam, M.A. Razzaque, An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System, SI: Security and Privacy for Cyber Physical Systems, Journal of Applied Science, 2018, 8(6), (Impact factor 1.67)
  6. P. R. Joshi, S. Islam, E-Government Maturity Model for Sustainable E-Government Services from the Perspective of Developing Countries, Special Issue Information and Communications Technologies (ICT) for Sustainability)Sustainability 2018, 10(6), (impact factor 1.789)
  7. S.Islam, M . Ouedraogo , C. Kalloniatis, H. Mouratidis, S. Gritzalis, Assurance of Security and Privacy Requirements for Cloud Deployment Model, SI: security and privacy protection on cloud, IEEE transaction on cloud computing, Vol 6, Issue 2, 2018(impact factor 7.92)
  8. AAL Abdul Rahman, S Islam, C Kalloniatis, S Gritzalis , A Risk Management Approach for a Sustainable Cloud Migration, Journal of Risk and Financial Management 10 (4), 2017
  9. PR Joshi, S Islam, A Framework for Cloud Based E-Government from the Perspective of Developing Countries, Future Internet 9 (4), 80,2017
  10. S Islam, S. Fenz, E Weippl , H. Mouratidis, Risk Management Framework for the Cloud Migration Decision Support,SI: Risk Management Based on Intelligent Information Processing, Journal of Risk and Financial Management,MDPI,2017
  11. S Islam, S. Fenz, E Weippl,C. Kalloniatis , Migration Goals and Risk Management in Cloud Computing: A Review of State of the Art and Survey Results on Practitioners, International Journal of Secure Software Engineering (IJSSE) 7(3), 2016
  12. UM Ismail, S Islam, M Ouedraogo, E Weippl , A Framework for Security Transparency in Cloud Computing, Journal of Future Internet 8 (1), 2016
  13. R. Alavi, S. Islam, H. Mouratidis, An Information Security Risk-driven Investment Model for Analysing Human Factors, Information and Computer Security , 24(2), 2016, Emerald
  14. C. Kalloniatis , H. Mouratidis, M. Vassilisc, S. Islam, S. Gritzalis, E. Kavaklif, Towards the design of secure and privacy-oriented Information Systems in the Cloud: Identifying the major concepts, Computer Standards & Interfaces , Vol 36, Issue 4, june 2014, Elsevier, (Impact factor 1.42).
  15. S.Islam, H. Mouratidis, E. Weippl, An Empirical Study on the Implementation and Evaluation of a Goal-driven Software Development Risk Management Model, Journal of Information and Software Technology, Vol 56, Issue 2, February, 2014, Elsevier, (Impact factor 1.522).
  16. C. Kalloniatis,H.Mouratidis, S. Islam, Evaluating Cloud Deployment Scenarios Based on Security and Privacy Requirements, Requirements Engineering Journal (REJ), Springer-Verlag, Vol 18, Issue 4, November 2013, http://dx.doi.org /10.1007/s00766-013-0166-7 (impact factor 0.971).
  17. H. Mouratidis, S. Islam, C. Kalloniatis, S. Gritzalis, A framework to support selection of cloud providers based on security and privacy requirements. Journal of Systems and Software, Vol 86, issue 9, 2013 Elsevier, (impact factor 1.117).
  18. M. Pavlidis, S. Islam, H. Mouratidis, P. Kearney, Modeling Trust Relationships for Developing Trustworthy Information Systems. International Journal of Information Systems Modelling and Design, 2013 .
  19. B. Aziz, C. Blackwell, S. Islam, A Framework for Digital Forensics and Investigations: The Goal-Driven Approach, International Journal of Digital Crime and Forensics (IJDCF), IGI Global publication, 2013).
  20. R. Alavi, S. Islam, H. Jahankhani, A. Al-Nermat, Analyzing Human Factors for an Effective Information Security Management System, International Journal of Secure Software Engineering (IJSSE), Special Issue on cyber security validation , Vol 4, No 1, 2013, pp 50-74, IGI Global publication.
  21. A.Hudic , S. Islam, P. Kieseberg, S. Rennert, and E. R. Weippl, Data Confidentiality using Fragmentation in Cloud Computing, International Journal of Pervasive Computing and Communications, Emerald publisher, vol 9, no 1, 2013.
  22. A.J. Stoica and S. Islam, Integrative Educational Approach Oriented Towards Software and System Development , International Journal of Engineering Pedagogy (iJEP), Vol 3, No 1, 2013.
  23. H. Mouratidis , C. Kalloniatis , S. Islam , M. Philippe Huget , and S. Gritzalis, Aligning Security and Privacy to Support the Development of Secure Information Systems, special issue Security in Information Systems, Journal of Universal Computer Science(J.UCS) , vol. 18, no. 12, 2012(impact factor 0.788) .
  24. S. Islam, H. Mouratidis and C. Kalloniatis, A.hudic, and L.Zechner, Model based Process to Support Security and Privacy Requirements Engineering, International Journal of Secure Software Engineering (IJSSE), Vol. 3, issue 3, September 2012, IGI Global publication.
  25. M. Pavlidis, H. Mouratidis, and S. Islam , Modelling Security Using Trust based Concepts, International Journal of Secure Software Engineering (IJSSE), Special issue on security modelling, Vol 3, Issue 2, 2012, IGI Global publication.
  26. K. Schneider, E. Knauss, S. H. Houmb, S. Islam, and J. Jürjens, Enhancing Security Requirements Engineering by Organisational Learning, Requirements Engineering Journal (REJ), Vol 17, No 1, 35-36, March 2012, Special Issue on REFSQ 2011, Springer-Verlag. (impact factor 0.971).
  27. S. Islam, H. Mouratidis and J. Jürjens, A Framework to Support Alignment of Secure Software Engineering with Legal Regulations, Journal of Software and Systems Modeling (SoSyM), Theme Section on Non-Functional System Properties in Domain-Specific Modeling Languages (NFPinDSML), Vol 10, No 3, page 369-394, 2011, Springer-Verlag. (impact factor 1.061)
  28. S. Islam and S. H. Houmb, Towards a Framework for Offshore Outsource Software Development Risk Management Model, Vol 6, No 1 (2011), 38-47, Jan 2011, Journal of Software (JSW), Special Issue on ICCIT 09, Academy Publisher, DOI:10.4304/jsw.6.1.38-47
  29. S. H. Houmb, S. Islam, E. Knauss, J. Jürjens and K. Schneider, Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec, Requirements Engineering Journal (REJ), Vol 15, No 1, 2010, PP 63-93., March 2010, (impact factor 0.971).


Profile Details

https://www.uel.ac.uk/Staff/i/shareeful-islam