![]() | 2010 | |
---|---|---|
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Fabio Massacci, Dan S. Wallach, Nicola Zannone: Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings Springer 2010 |
2009 | ||
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Fabio Massacci, Samuel T. Redwine Jr., Nicola Zannone: Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings Springer 2009 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Daniel Trivellato, Fred Spiessens, Nicola Zannone, Sandro Etalle: Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control. CSE (3) 2009: 252-258 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Golnaz Elahi, Eric S. K. Yu, Nicola Zannone: A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations. ER 2009: 99-114 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Daniel Trivellato, Fred Spiessens, Nicola Zannone, Sandro Etalle: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy. POLICY 2009: 110-113 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Luca Compagna, Paul El Khoury, Alzbeta Krausová, Fabio Massacci, Nicola Zannone: How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artif. Intell. Law 17(1): 1-30 (2009) |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Pierre Busnel, Paul El Khoury, Keqin Li, Ayda Saïdane, Nicola Zannone: S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System. Electr. Notes Theor. Comput. Sci. 244: 27-39 (2009) |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Paolo Guarda, Nicola Zannone: Towards the development of privacy-aware systems. Information & Software Technology 51(2): 337-350 (2009) |
2008 | ||
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Yudistira Asnar, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone: Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach. ARES 2008: 1240-1247 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Davide Prandi, Paola Quaglia, Nicola Zannone: Formal Analysis of BPMN Via a Translation into COWS. COORDINATION 2008: 249-263 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Fabio Massacci, Nicola Zannone: A Model-Driven Approach for the Specification and Analysis of Access Control Policies. OTM Conferences (2) 2008: 1087-1103 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Yudistira Asnar, Nicola Zannone: Perceived risk assessment. QoP 2008: 59-64 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Nadzeya Kiyavitskaya, Nicola Zannone: Requirements model generation to support requirements elicitation: the Secure Tropos experience. Autom. Softw. Eng. 15(2): 149-173 (2008) |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Yudistira Asnar, Paolo Giorgini, Paolo Ciancarini, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone: An evaluation of business solutions in manufacturing enterprises. IJBIDM 3(3): 305-329 (2008) |
2007 | ||
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Yudistira Asnar, Paolo Giorgini, Nicola Zannone: Reasoning About Risk in Agent's Deliberation Process: A Jadex Implementation. AOSE 2007: 118-131 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Yudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone: From Trust to Dependability through Risk Analysis. ARES 2007: 19-26 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Volha Bryl, Paola Mello, Marco Montali, Paolo Torroni, Nicola Zannone: -Tropos. CLIMA VIII 2007: 157-176 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Luca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone: How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ICAIL 2007: 149-153 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Hugo A. López, Fabio Massacci, Nicola Zannone: Goal-Equivalent Secure Business Process Re-engineering. ICSOC Workshops 2007: 212-223 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Fabio Massacci, John Mylopoulos, Nicola Zannone: Computer-aided Support for Secure Tropos. Autom. Softw. Eng. 14(3): 341-364 (2007) |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Fabio Massacci, John Mylopoulos, Nicola Zannone: From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach. International Journal of Software Engineering and Knowledge Engineering 17(2): 265-284 (2007) |
2006 | ||
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Volha Bryl, Fabio Massacci, John Mylopoulos, Nicola Zannone: Designing Security Requirements Models Through Planning. CAiSE 2006: 33-47 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Nicola Zannone, Sushil Jajodia, Duminda Wijesekera: Creating Objects in the Flexible Authorization Framework. DBSec 2006: 1-14 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Detecting Conflicts of Interest. RE 2006: 308-311 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements engineering for trust management: model, methodology, and reasoning. Int. J. Inf. Sec. 5(4): 257-274 (2006) |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Fabio Massacci, John Mylopoulos, Nicola Zannone: Hierarchical hippocratic databases with minimal disclosure for virtual organizations. VLDB J. 15(4): 370-387 (2006) |
2005 | ||
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Fabio Massacci, John Mylopoulos, Nicola Zannone: Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. ESORICS 2005: 438-454 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Paolo Giorgini, Fabio Massacci, Nicola Zannone: Security and Trust Requirements Engineering. FOSAD 2005: 237-272 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. RE 2005: 167-176 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: ST-Tool: A CASE Tool for Security Requirements Engineering. RE 2005: 451-452 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. iTrust 2005: 161-176 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Alberto Siena, Nicola Zannone: ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. iTrust 2005: 415-419 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Fabio Massacci, Marco Prest, Nicola Zannone: Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. Computer Standards & Interfaces 27(5): 445-455 (2005) |
2004 | ||
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. EuroPKI 2004: 98-111 |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Fabio Massacci, Nicola Zannone: Privacy Is Linking Permission to Purpose. Security Protocols Workshop 2004: 179-191 |
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning. iTrust 2004: 176-190 |