dblp.uni-trier.dewww.uni-trier.de

Nicola Zannone

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
29EEFabio Massacci, Samuel T. Redwine Jr., Nicola Zannone: Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings Springer 2009
2008
28EEYudistira Asnar, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone: Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach. ARES 2008: 1240-1247
27EEDavide Prandi, Paola Quaglia, Nicola Zannone: Formal Analysis of BPMN Via a Translation into COWS. COORDINATION 2008: 249-263
26EEFabio Massacci, Nicola Zannone: A Model-Driven Approach for the Specification and Analysis of Access Control Policies. OTM Conferences (2) 2008: 1087-1103
25EEYudistira Asnar, Nicola Zannone: Perceived risk assessment. QoP 2008: 59-64
24EENadzeya Kiyavitskaya, Nicola Zannone: Requirements model generation to support requirements elicitation: the Secure Tropos experience. Autom. Softw. Eng. 15(2): 149-173 (2008)
23EEYudistira Asnar, Paolo Giorgini, Paolo Ciancarini, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone: An evaluation of business solutions in manufacturing enterprises. IJBIDM 3(3): 305-329 (2008)
2007
22EEYudistira Asnar, Paolo Giorgini, Nicola Zannone: Reasoning About Risk in Agent's Deliberation Process: A Jadex Implementation. AOSE 2007: 118-131
21EEYudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone: From Trust to Dependability through Risk Analysis. ARES 2007: 19-26
20EEVolha Bryl, Paola Mello, Marco Montali, Paolo Torroni, Nicola Zannone: -Tropos. CLIMA VIII 2007: 157-176
19EELuca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone: How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ICAIL 2007: 149-153
18EEHugo A. López, Fabio Massacci, Nicola Zannone: Goal-Equivalent Secure Business Process Re-engineering. ICSOC Workshops 2007: 212-223
17EEFabio Massacci, John Mylopoulos, Nicola Zannone: Computer-aided Support for Secure Tropos. Autom. Softw. Eng. 14(3): 341-364 (2007)
16EEFabio Massacci, John Mylopoulos, Nicola Zannone: From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach. International Journal of Software Engineering and Knowledge Engineering 17(2): 265-284 (2007)
2006
15EEVolha Bryl, Fabio Massacci, John Mylopoulos, Nicola Zannone: Designing Security Requirements Models Through Planning. CAiSE 2006: 33-47
14EENicola Zannone, Sushil Jajodia, Duminda Wijesekera: Creating Objects in the Flexible Authorization Framework. DBSec 2006: 1-14
13EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Detecting Conflicts of Interest. RE 2006: 308-311
12EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements engineering for trust management: model, methodology, and reasoning. Int. J. Inf. Sec. 5(4): 257-274 (2006)
11EEFabio Massacci, John Mylopoulos, Nicola Zannone: Hierarchical hippocratic databases with minimal disclosure for virtual organizations. VLDB J. 15(4): 370-387 (2006)
2005
10EEFabio Massacci, John Mylopoulos, Nicola Zannone: Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. ESORICS 2005: 438-454
9EEPaolo Giorgini, Fabio Massacci, Nicola Zannone: Security and Trust Requirements Engineering. FOSAD 2005: 237-272
8EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. RE 2005: 167-176
7EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: ST-Tool: A CASE Tool for Security Requirements Engineering. RE 2005: 451-452
6EENicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19
5EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. iTrust 2005: 161-176
4EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Alberto Siena, Nicola Zannone: ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. iTrust 2005: 415-419
2004
3EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. EuroPKI 2004: 98-111
2EEFabio Massacci, Nicola Zannone: Privacy Is Linking Permission to Purpose. Security Protocols Workshop 2004: 179-191
1EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning. iTrust 2004: 176-190

Coauthor Index

1Yudistira Asnar [21] [22] [23] [25] [28]
2Volha Bryl [15] [20]
3Paolo Ciancarini [23]
4Luca Compagna [19]
5Paolo Giorgini [1] [3] [4] [5] [7] [8] [9] [12] [13] [21] [22] [23]
6Sushil Jajodia [6] [14]
7Paul El Khoury [19]
8Nadzeya Kiyavitskaya [24]
9Hugo A. López [18]
10Fabio Massacci [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [15] [16] [17] [18] [19] [21] [26] [29]
11Paola Mello [20]
12Marco Montali [20]
13Rocco Moretti [23] [28]
14John Mylopoulos [1] [3] [4] [5] [7] [8] [10] [11] [12] [13] [15] [16] [17]
15Davide Prandi [27]
16Paola Quaglia [27]
17Samuel T. Redwine Jr. [29]
18Maurizio Sebastianis [23] [28]
19Alberto Siena [4]
20Reshma Thomas [19]
21Paolo Torroni [20]
22Duminda Wijesekera [6] [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)