Golnaz Elahi


   
 
 
 

I recieved my PhD from Department of Computer Science, University of Toronto in 2012. I was a member of the Software Engineering Group, working under the supervision of Professor Eric Yu.

I received Master of Science from University of Toronto, Department of Computer Science, in 2007.

 

Research

My expertise is generally in the area of Requirements Engineering and particularly, Requirements Decision Analysis, Security Requirements Engineering, and Risk Analysis. My PhD was focused on trade-offs when dealing with security issues, primarily at the level of system requirements or service design, but also in system architecture. I have been looking for multi-criteria decision analysis methods which can be applied to security requirements trade-off analysis. I have been looking into using the knowledge collected in vulnerability databases.

 

Selected Publications:

Journals

1. Golnaz Elahi, Eric Yu, Comparing Alternatives for Analyzing Requirements Trade-offs- In the Absence of Numerical Data, To appear in the journal of Information and Software Technology, Elsevier.

2. Golnaz Elahi, Eric Yu, Nicola Zannone, A Vulnerability-Centric Requirements Engineering Framework: Analyzing Security Attacks, Countermeasures, and Requirements Based on Vulnerabilities, Requirements Engineering Journal, 2009, (pdf)

3. Golnaz Elahi, Eric Yu, Modeling and Analysis of Security Trade-Offs: A Goal Oriented Approach, Data & Knowledge Engineering, Volume 68, Issue 7, July 2009, pp 579-598 (Special Issue: 26th International Conference on Conceptual Modeling (ER 2007) Six selected and extended papers ) (pdf)

 

Conferences

1. Golnaz Elahi, Eric Yu, A Semi-Automated Decision Support Tool for Requirements Trade-off Analysis, In the proceeding of COMPSAC'11 (pdf)

2. Golnaz Elahi, Tong Li, Lin Liu and Eric Yu, Security Requirements Engineering in the Wild: A Survey of Common Practices, In the proceeding of COMPSAC'11 (pdf)

3. Golnaz Elahi, Eric Yu, Requirements Trade-offs Analysis in the Absence of Quantitative Measures: A Heuristic Method, In the RE track, 26th Symposium On Applied Computing (SAC'11), Taiwan, March 2011 (pdf)

4. Golnaz Elahi, Eric Yu, Trust trade-off analysis for security requirements engineering, In the proceeding of the International Requirements Engineering Conference (RE'09), Atlanta, Georgia, USA, August 31st- September 4th, 2009 (pdf)

5. Golnaz Elahi, Eric Yu, Nicola Zannone, A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations. To appear in the proceeding of 28th International Conference of Conceptual Modeling (ER'09), Gramado, Brazil, November 9-12 2009 (pdf)

6. Golnaz Elahi, Eric Yu, A goal-oriented approach for modeling and analyzing security trade-offs. In the proceeding of 26th International Conference of Conceptual Modeling (ER'07), pp 375-390 (2007) (pdf)

 

Tool and Demo papers

1. Golnaz Elahi, Eric Yu, A Semi-Automated Tool for Requirements Trade-off Analysis, in CAiSE Forum, 2011 (pdf)

 

Workshops and Working Conferences

1. Golnaz Elahi , Eric Yu and Nicola Zannone . Security Risk Management by Qualitative Vulnerability Analysis, in 7th International Workshop on Security Measurement and Metrics, September 2011, (pdf)

2. Tong Li, Lin Liu, Golnaz Elahi, Eric Yu, Barrett R. Bryant, Service Security Analysis Based on i*: An Approach from the Attacker Viewpoint, In the proceeding of 5th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2010) In onjuction with COMPSAC 2010, Seoul, Korea, July 2010 (link to publisher)

3. Golnaz Elahi, Eric Yu, Maria Carmela Annosi, Modeling Knowledge Transfer in a Software Maintenance Organization - An Experience Report and Critical Analysis, In the proceeding of the IFIP WG 8.1 Working Conference on Practice of Enterprise Modeling (PoEM'08), in Stockholm, Sweden, November 12-13, 2008 (pdf)

4. Jennifer Horkoff, Golnaz Elahi, Eric Yu, Samer Abdulhadi, Reflective Analysis of the Syntax and Semantics of the i* Framework, In the proceeding of second Workshop on Requirements, Intentions and Goals in Conceptual Modeling (RIGiM 08), Spain , October 2008 (pdf)

5. Golnaz Elahi, Zeev Lieber, Eric Yu, Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider, In the proceeding of 3rd IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2008), Turku, Finland, July 28-31(pdf)

 

 


Contact Information

gelahi @sign cs dot toronto dot edu, or

gelahi @sign gmail dot com

University of Toronto

Department of Computer Science, Bahen Center for Information Technology

40 St. George St. Toronto, Ontario, M5S 2E4, CANADA, Room # 3270

 


 

 

 

 

 

 

News :

Defending my thesis at the departmental level, December 13th, 2011.

I visited Tsinghua University in Beijing, Feb 24rd - Apr 20th, School of Software. I have been working with Prof Lin Liu.

 

 

 

 

 

 

 
           
University of TorontoDCS Home