Nicola Zannone
Title
Cited by
Cited by
Year
Modeling security requirements through ownership, permission and delegation
P Giorgini, F Massacci, J Mylopoulos, N Zannone
13th IEEE International Conference on Requirements Engineering (RE'05), 167-176, 2005
2592005
Towards the development of privacy-aware systems
P Guarda, N Zannone
Information and Software Technology 51 (2), 337-350, 2009
1512009
Requirements engineering meets trust management
P Giorgini, F Massacci, J Mylopoulos, N Zannone
Trust Management, 176-190, 2004
1322004
A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
G Elahi, E Yu, N Zannone
Requirements engineering 15 (1), 41-62, 2010
1222010
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
F Massacci, M Prest, N Zannone
Computer Standards & Interfaces 27 (5), 445-455, 2005
1122005
Requirements engineering for trust management: model, methodology, and reasoning
P Giorgini, F Massacci, J Mylopoulos, N Zannone
International Journal of Information Security 5 (4), 257-274, 2006
1072006
Security and trust requirements engineering,
P Giorgini, F Massacci, N Zannone
Foundations of Security Analysis and Design III: FOSAD 2004/2005 tutorial …, 2005
942005
From trust to dependability through risk analysis
Y Asnar, P Giorgini, F Massacci, N Zannone
The Second International Conference on Availability, Reliability and …, 2007
812007
Modelling security and trust with secure tropos
P Giorgini, H Mouratidis, N Zannone
Integrating Security and Software Engineering: Advances and Future Visions …, 2007
792007
A reference model for reputation systems
S Vavilis, M Petković, N Zannone
Decision Support Systems 61, 147-154, 2014
702014
A modeling ontology for integrating vulnerabilities into security requirements conceptual foundations
G Elahi, E Yu, N Zannone
International Conference on Conceptual Modeling, 99-114, 2009
682009
Formal analysis of BPMN via a translation into COWS
D Prandi, P Quaglia, N Zannone
International Conference on Coordination Languages and Models, 249-263, 2008
632008
Security requirements engineering: the SI* modeling language and the secure tropos methodology
F Massacci, J Mylopoulos, N Zannone
Advances in Intelligent Information Systems, 147-174, 2010
572010
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
L Compagna, P El Khoury, A Krausová, F Massacci, N Zannone
Artificial Intelligence and Law 17 (1), 1-30, 2009
572009
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
F Massacci, J Mylopoulos, N Zannone
The VLDB journal 15 (4), 370-387, 2006
572006
An ontology for secure socio-technical systems
F Massacci, J Mylopoulos, N Zannone
Handbook of Ontologies for Business Interaction. The IDEA Group, 2007
562007
Computer-aided support for secure tropos
F Massacci, J Mylopoulos, N Zannone
Automated Software Engineering 14 (3), 341-364, 2007
502007
Privacy-aware web service composition and ranking
E Costante, F Paci, N Zannone
2013 IEEE 20th International Conference on Web Services, 131-138, 2013
492013
Modeling social and individual trust in requirements engineering methodologies
P Giorgini, F Massacci, J Mylopoulos, N Zannone
International Conference on Trust Management, 161-176, 2005
492005
Analysis of XACML policies with SMT
F Turkmen, J den Hartog, S Ranise, N Zannone
International Conference on Principles of Security and Trust, 115-134, 2015
472015
The system can't perform the operation now. Try again later.
Articles 1–20