2010 | ||
---|---|---|
37 | Fabio Massacci, Dan S. Wallach, Nicola Zannone: Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings Springer 2010 | |
2009 | ||
36 | Fabio Massacci, Samuel T. Redwine Jr., Nicola Zannone: Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings Springer 2009 | |
35 | Daniel Trivellato, Fred Spiessens, Nicola Zannone, Sandro Etalle: Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control. CSE (3) 2009: 252-258 | |
34 | Golnaz Elahi, Eric S. K. Yu, Nicola Zannone: A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations. ER 2009: 99-114 | |
33 | Daniel Trivellato, Fred Spiessens, Nicola Zannone, Sandro Etalle: POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy. POLICY 2009: 110-113 | |
32 | Luca Compagna, Paul El Khoury, Alzbeta Krausová, Fabio Massacci, Nicola Zannone: How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artif. Intell. Law 17(1): 1-30 (2009) | |
31 | Pierre Busnel, Paul El Khoury, Keqin Li, Ayda Saïdane, Nicola Zannone: S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System. Electr. Notes Theor. Comput. Sci. 244: 27-39 (2009) | |
30 | Paolo Guarda, Nicola Zannone: Towards the development of privacy-aware systems. Information & Software Technology 51(2): 337-350 (2009) | |
2008 | ||
29 | Yudistira Asnar, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone: Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach. ARES 2008: 1240-1247 | |
28 | Davide Prandi, Paola Quaglia, Nicola Zannone: Formal Analysis of BPMN Via a Translation into COWS. COORDINATION 2008: 249-263 | |
27 | Fabio Massacci, Nicola Zannone: A Model-Driven Approach for the Specification and Analysis of Access Control Policies. OTM Conferences (2) 2008: 1087-1103 | |
26 | Yudistira Asnar, Nicola Zannone: Perceived risk assessment. QoP 2008: 59-64 | |
25 | Nadzeya Kiyavitskaya, Nicola Zannone: Requirements model generation to support requirements elicitation: the Secure Tropos experience. Autom. Softw. Eng. 15(2): 149-173 (2008) | |
24 | Yudistira Asnar, Paolo Giorgini, Paolo Ciancarini, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone: An evaluation of business solutions in manufacturing enterprises. IJBIDM 3(3): 305-329 (2008) | |
2007 | ||
23 | Yudistira Asnar, Paolo Giorgini, Nicola Zannone: Reasoning About Risk in Agent's Deliberation Process: A Jadex Implementation. AOSE 2007: 118-131 | |
22 | Yudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone: From Trust to Dependability through Risk Analysis. ARES 2007: 19-26 | |
21 | Volha Bryl, Paola Mello, Marco Montali, Paolo Torroni, Nicola Zannone: -Tropos. CLIMA VIII 2007: 157-176 | |
20 | Luca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone: How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ICAIL 2007: 149-153 | |
19 | Hugo A. López, Fabio Massacci, Nicola Zannone: Goal-Equivalent Secure Business Process Re-engineering. ICSOC Workshops 2007: 212-223 | |
18 | Fabio Massacci, John Mylopoulos, Nicola Zannone: Computer-aided Support for Secure Tropos. Autom. Softw. Eng. 14(3): 341-364 (2007) | |
17 | Fabio Massacci, John Mylopoulos, Nicola Zannone: From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach. International Journal of Software Engineering and Knowledge Engineering 17(2): 265-284 (2007) | |
2006 | ||
16 | Volha Bryl, Fabio Massacci, John Mylopoulos, Nicola Zannone: Designing Security Requirements Models Through Planning. CAiSE 2006: 33-47 | |
15 | Nicola Zannone, Sushil Jajodia, Duminda Wijesekera: Creating Objects in the Flexible Authorization Framework. DBSec 2006: 1-14 | |
14 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Detecting Conflicts of Interest. RE 2006: 308-311 | |
13 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements engineering for trust management: model, methodology, and reasoning. Int. J. Inf. Sec. 5(4): 257-274 (2006) | |
12 | Fabio Massacci, John Mylopoulos, Nicola Zannone: Hierarchical hippocratic databases with minimal disclosure for virtual organizations. VLDB J. 15(4): 370-387 (2006) | |
2005 | ||
11 | Fabio Massacci, John Mylopoulos, Nicola Zannone: Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. ESORICS 2005: 438-454 | |
10 | Paolo Giorgini, Fabio Massacci, Nicola Zannone: Security and Trust Requirements Engineering. FOSAD 2005: 237-272 | |
9 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. RE 2005: 167-176 | |
8 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: ST-Tool: A CASE Tool for Security Requirements Engineering. RE 2005: 451-452 | |
7 | Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19 | |
6 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. iTrust 2005: 161-176 | |
5 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Alberto Siena, Nicola Zannone: ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. iTrust 2005: 415-419 | |
4 | Fabio Massacci, Marco Prest, Nicola Zannone: Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. Computer Standards & Interfaces 27(5): 445-455 (2005) | |
2004 | ||
3 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. EuroPKI 2004: 98-111 | |
2 | Fabio Massacci, Nicola Zannone: Privacy Is Linking Permission to Purpose. Security Protocols Workshop 2004: 179-191 | |
1 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning. iTrust 2004: 176-190 |