2009 |
29 | EE | Fabio Massacci,
Samuel T. Redwine Jr.,
Nicola Zannone:
Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings
Springer 2009 |
2008 |
28 | EE | Yudistira Asnar,
Rocco Moretti,
Maurizio Sebastianis,
Nicola Zannone:
Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach.
ARES 2008: 1240-1247 |
27 | EE | Davide Prandi,
Paola Quaglia,
Nicola Zannone:
Formal Analysis of BPMN Via a Translation into COWS.
COORDINATION 2008: 249-263 |
26 | EE | Fabio Massacci,
Nicola Zannone:
A Model-Driven Approach for the Specification and Analysis of Access Control Policies.
OTM Conferences (2) 2008: 1087-1103 |
25 | EE | Yudistira Asnar,
Nicola Zannone:
Perceived risk assessment.
QoP 2008: 59-64 |
24 | EE | Nadzeya Kiyavitskaya,
Nicola Zannone:
Requirements model generation to support requirements elicitation: the Secure Tropos experience.
Autom. Softw. Eng. 15(2): 149-173 (2008) |
23 | EE | Yudistira Asnar,
Paolo Giorgini,
Paolo Ciancarini,
Rocco Moretti,
Maurizio Sebastianis,
Nicola Zannone:
An evaluation of business solutions in manufacturing enterprises.
IJBIDM 3(3): 305-329 (2008) |
2007 |
22 | EE | Yudistira Asnar,
Paolo Giorgini,
Nicola Zannone:
Reasoning About Risk in Agent's Deliberation Process: A Jadex Implementation.
AOSE 2007: 118-131 |
21 | EE | Yudistira Asnar,
Paolo Giorgini,
Fabio Massacci,
Nicola Zannone:
From Trust to Dependability through Risk Analysis.
ARES 2007: 19-26 |
20 | EE | Volha Bryl,
Paola Mello,
Marco Montali,
Paolo Torroni,
Nicola Zannone:
-Tropos.
CLIMA VIII 2007: 157-176 |
19 | EE | Luca Compagna,
Paul El Khoury,
Fabio Massacci,
Reshma Thomas,
Nicola Zannone:
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach.
ICAIL 2007: 149-153 |
18 | EE | Hugo A. López,
Fabio Massacci,
Nicola Zannone:
Goal-Equivalent Secure Business Process Re-engineering.
ICSOC Workshops 2007: 212-223 |
17 | EE | Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Computer-aided Support for Secure Tropos.
Autom. Softw. Eng. 14(3): 341-364 (2007) |
16 | EE | Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach.
International Journal of Software Engineering and Knowledge Engineering 17(2): 265-284 (2007) |
2006 |
15 | EE | Volha Bryl,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Designing Security Requirements Models Through Planning.
CAiSE 2006: 33-47 |
14 | EE | Nicola Zannone,
Sushil Jajodia,
Duminda Wijesekera:
Creating Objects in the Flexible Authorization Framework.
DBSec 2006: 1-14 |
13 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Detecting Conflicts of Interest.
RE 2006: 308-311 |
12 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Requirements engineering for trust management: model, methodology, and reasoning.
Int. J. Inf. Sec. 5(4): 257-274 (2006) |
11 | EE | Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Hierarchical hippocratic databases with minimal disclosure for virtual organizations.
VLDB J. 15(4): 370-387 (2006) |
2005 |
10 | EE | Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation.
ESORICS 2005: 438-454 |
9 | EE | Paolo Giorgini,
Fabio Massacci,
Nicola Zannone:
Security and Trust Requirements Engineering.
FOSAD 2005: 237-272 |
8 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Modeling Security Requirements Through Ownership, Permission and Delegation.
RE 2005: 167-176 |
7 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
ST-Tool: A CASE Tool for Security Requirements Engineering.
RE 2005: 451-452 |
6 | EE | Nicola Zannone,
Sushil Jajodia,
Fabio Massacci,
Duminda Wijesekera:
Maintaining privacy on derived objects.
WPES 2005: 10-19 |
5 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Modeling Social and Individual Trust in Requirements Engineering Methodologies.
iTrust 2005: 161-176 |
4 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Alberto Siena,
Nicola Zannone:
ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements.
iTrust 2005: 415-419 |
2004 |
3 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures.
EuroPKI 2004: 98-111 |
2 | EE | Fabio Massacci,
Nicola Zannone:
Privacy Is Linking Permission to Purpose.
Security Protocols Workshop 2004: 179-191 |
1 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning.
iTrust 2004: 176-190 |