dblp.uni-trier.dewww.uni-trier.de

Nicola Zannone Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
31EEFabio Massacci, Samuel T. Redwine Jr., Nicola Zannone: Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings Springer 2009
30EELuca Compagna, Paul El Khoury, Alzbeta Krausová, Fabio Massacci, Nicola Zannone: How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artif. Intell. Law 17(1): 1-30 (2009)
2008
29EEYudistira Asnar, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone: Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach. ARES 2008: 1240-1247
28EEDavide Prandi, Paola Quaglia, Nicola Zannone: Formal Analysis of BPMN Via a Translation into COWS. COORDINATION 2008: 249-263
27EEFabio Massacci, Nicola Zannone: A Model-Driven Approach for the Specification and Analysis of Access Control Policies. OTM Conferences (2) 2008: 1087-1103
26EEYudistira Asnar, Nicola Zannone: Perceived risk assessment. QoP 2008: 59-64
25EENadzeya Kiyavitskaya, Nicola Zannone: Requirements model generation to support requirements elicitation: the Secure Tropos experience. Autom. Softw. Eng. 15(2): 149-173 (2008)
24EEYudistira Asnar, Paolo Giorgini, Paolo Ciancarini, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone: An evaluation of business solutions in manufacturing enterprises. IJBIDM 3(3): 305-329 (2008)
2007
23EEYudistira Asnar, Paolo Giorgini, Nicola Zannone: Reasoning About Risk in Agent's Deliberation Process: A Jadex Implementation. AOSE 2007: 118-131
22EEYudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone: From Trust to Dependability through Risk Analysis. ARES 2007: 19-26
21EEVolha Bryl, Paola Mello, Marco Montali, Paolo Torroni, Nicola Zannone: -Tropos. CLIMA VIII 2007: 157-176
20EELuca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone: How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ICAIL 2007: 149-153
19EEHugo A. López, Fabio Massacci, Nicola Zannone: Goal-Equivalent Secure Business Process Re-engineering. ICSOC Workshops 2007: 212-223
18EEFabio Massacci, John Mylopoulos, Nicola Zannone: Computer-aided Support for Secure Tropos. Autom. Softw. Eng. 14(3): 341-364 (2007)
17EEFabio Massacci, John Mylopoulos, Nicola Zannone: From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach. International Journal of Software Engineering and Knowledge Engineering 17(2): 265-284 (2007)
2006
16EEVolha Bryl, Fabio Massacci, John Mylopoulos, Nicola Zannone: Designing Security Requirements Models Through Planning. CAiSE 2006: 33-47
15EENicola Zannone, Sushil Jajodia, Duminda Wijesekera: Creating Objects in the Flexible Authorization Framework. DBSec 2006: 1-14
14EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Detecting Conflicts of Interest. RE 2006: 308-311
13EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements engineering for trust management: model, methodology, and reasoning. Int. J. Inf. Sec. 5(4): 257-274 (2006)
12EEFabio Massacci, John Mylopoulos, Nicola Zannone: Hierarchical hippocratic databases with minimal disclosure for virtual organizations. VLDB J. 15(4): 370-387 (2006)
2005
11EEFabio Massacci, John Mylopoulos, Nicola Zannone: Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. ESORICS 2005: 438-454
10EEPaolo Giorgini, Fabio Massacci, Nicola Zannone: Security and Trust Requirements Engineering. FOSAD 2005: 237-272
9EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. RE 2005: 167-176
8EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: ST-Tool: A CASE Tool for Security Requirements Engineering. RE 2005: 451-452
7EENicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19
6EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. iTrust 2005: 161-176
5EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Alberto Siena, Nicola Zannone: ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. iTrust 2005: 415-419
4EEFabio Massacci, Marco Prest, Nicola Zannone: Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. Computer Standards & Interfaces 27(5): 445-455 (2005)
2004
3EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. EuroPKI 2004: 98-111
2EEFabio Massacci, Nicola Zannone: Privacy Is Linking Permission to Purpose. Security Protocols Workshop 2004: 179-191
1EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning. iTrust 2004: 176-190

Coauthor Index

1Yudistira Asnar [22] [23] [24] [26] [29]
2Volha Bryl [16] [21]
3Paolo Ciancarini [24]
4Luca Compagna [20] [30]
5Paolo Giorgini [1] [3] [5] [6] [8] [9] [10] [13] [14] [22] [23] [24]
6Sushil Jajodia [7] [15]
7Paul El Khoury [20] [30]
8Nadzeya Kiyavitskaya [25]
9Alzbeta Krausová [30]
10Hugo A. López [19]
11Fabio Massacci [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [16] [17] [18] [19] [20] [22] [27] [30] [31]
12Paola Mello [21]
13Marco Montali [21]
14Rocco Moretti [24] [29]
15John Mylopoulos [1] [3] [5] [6] [8] [9] [11] [12] [13] [14] [16] [17] [18]
16Davide Prandi [28]
17Marco Prest [4]
18Paola Quaglia [28]
19Samuel T. Redwine Jr. [31]
20Maurizio Sebastianis [24] [29]
21Alberto Siena [5]
22Reshma Thomas [20]
23Paolo Torroni [21]
24Duminda Wijesekera [7] [15]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)