Search the dblp DataBase
Nicola Zannone :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Volha Bryl , Fabio Massacci , John Mylopoulos , Nicola Zannone Designing Security Requirements Models Through Planning. [Citation Graph (0, 0)][DBLP ] CAiSE, 2006, pp:33-47 [Conf ] Nicola Zannone , Sushil Jajodia , Duminda Wijesekera Creating Objects in the Flexible Authorization Framework. [Citation Graph (0, 0)][DBLP ] DBSec, 2006, pp:1-14 [Conf ] Fabio Massacci , John Mylopoulos , Nicola Zannone Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:438-454 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , Nicola Zannone Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2004, pp:98-111 [Conf ] Paolo Giorgini , Fabio Massacci , Nicola Zannone Security and Trust Requirements Engineering. [Citation Graph (0, 0)][DBLP ] FOSAD, 2005, pp:237-272 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , A. Siena , Nicola Zannone ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. [Citation Graph (0, 0)][DBLP ] iTrust, 2005, pp:415-419 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , Nicola Zannone Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning. [Citation Graph (0, 0)][DBLP ] iTrust, 2004, pp:176-190 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , Nicola Zannone Modeling Social and Individual Trust in Requirements Engineering Methodologies. [Citation Graph (0, 0)][DBLP ] iTrust, 2005, pp:161-176 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , Nicola Zannone Modeling Security Requirements Through Ownership, Permission and Delegation. [Citation Graph (0, 0)][DBLP ] RE, 2005, pp:167-176 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , Nicola Zannone ST-Tool: A CASE Tool for Security Requirements Engineering. [Citation Graph (0, 0)][DBLP ] RE, 2005, pp:451-452 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , Nicola Zannone Detecting Conflicts of Interest. [Citation Graph (0, 0)][DBLP ] RE, 2006, pp:308-311 [Conf ] Fabio Massacci , Nicola Zannone Privacy Is Linking Permission to Purpose. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:179-191 [Conf ] Nicola Zannone , Sushil Jajodia , Fabio Massacci , Duminda Wijesekera Maintaining privacy on derived objects. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:10-19 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , Nicola Zannone Requirements engineering for trust management: model, methodology, and reasoning. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2006, v:5, n:4, pp:257-274 [Journal ] Fabio Massacci , John Mylopoulos , Nicola Zannone Hierarchical hippocratic databases with minimal disclosure for virtual organizations. [Citation Graph (0, 0)][DBLP ] VLDB J., 2006, v:15, n:4, pp:370-387 [Journal ] Luca Compagna , Paul El Khoury , Fabio Massacci , Reshma Thomas , Nicola Zannone How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. [Citation Graph (0, 0)][DBLP ] ICAIL, 2007, pp:149-153 [Conf ] From Trust to Dependability through Risk Analysis. [Citation Graph (, )][DBLP ] Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach. [Citation Graph (, )][DBLP ] Reasoning About Risk in Agent's Deliberation Process: A Jadex Implementation. [Citation Graph (, )][DBLP ] Perceived risk assessment. [Citation Graph (, )][DBLP ] -Tropos. [Citation Graph (, )][DBLP ] Formal Analysis of BPMN Via a Translation into COWS. [Citation Graph (, )][DBLP ] A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations. [Citation Graph (, )][DBLP ] Goal-Equivalent Secure Business Process Re-engineering. [Citation Graph (, )][DBLP ] A Model-Driven Approach for the Specification and Analysis of Access Control Policies. [Citation Graph (, )][DBLP ] POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy. [Citation Graph (, )][DBLP ] Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control. [Citation Graph (, )][DBLP ] How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. [Citation Graph (, )][DBLP ] Computer-aided Support for Secure Tropos. [Citation Graph (, )][DBLP ] Requirements model generation to support requirements elicitation: the Secure Tropos experience. [Citation Graph (, )][DBLP ] S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System. [Citation Graph (, )][DBLP ] Search in 0.014secs, Finished in 0.016secs