The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nicola Zannone: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Volha Bryl, Fabio Massacci, John Mylopoulos, Nicola Zannone
    Designing Security Requirements Models Through Planning. [Citation Graph (0, 0)][DBLP]
    CAiSE, 2006, pp:33-47 [Conf]
  2. Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
    Creating Objects in the Flexible Authorization Framework. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:1-14 [Conf]
  3. Fabio Massacci, John Mylopoulos, Nicola Zannone
    Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:438-454 [Conf]
  4. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone
    Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:98-111 [Conf]
  5. Paolo Giorgini, Fabio Massacci, Nicola Zannone
    Security and Trust Requirements Engineering. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2005, pp:237-272 [Conf]
  6. Paolo Giorgini, Fabio Massacci, John Mylopoulos, A. Siena, Nicola Zannone
    ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:415-419 [Conf]
  7. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone
    Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning. [Citation Graph (0, 0)][DBLP]
    iTrust, 2004, pp:176-190 [Conf]
  8. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone
    Modeling Social and Individual Trust in Requirements Engineering Methodologies. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:161-176 [Conf]
  9. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone
    Modeling Security Requirements Through Ownership, Permission and Delegation. [Citation Graph (0, 0)][DBLP]
    RE, 2005, pp:167-176 [Conf]
  10. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone
    ST-Tool: A CASE Tool for Security Requirements Engineering. [Citation Graph (0, 0)][DBLP]
    RE, 2005, pp:451-452 [Conf]
  11. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone
    Detecting Conflicts of Interest. [Citation Graph (0, 0)][DBLP]
    RE, 2006, pp:308-311 [Conf]
  12. Fabio Massacci, Nicola Zannone
    Privacy Is Linking Permission to Purpose. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:179-191 [Conf]
  13. Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera
    Maintaining privacy on derived objects. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:10-19 [Conf]
  14. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone
    Requirements engineering for trust management: model, methodology, and reasoning. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:4, pp:257-274 [Journal]
  15. Fabio Massacci, John Mylopoulos, Nicola Zannone
    Hierarchical hippocratic databases with minimal disclosure for virtual organizations. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2006, v:15, n:4, pp:370-387 [Journal]
  16. Luca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone
    How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. [Citation Graph (0, 0)][DBLP]
    ICAIL, 2007, pp:149-153 [Conf]

  17. From Trust to Dependability through Risk Analysis. [Citation Graph (, )][DBLP]


  18. Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach. [Citation Graph (, )][DBLP]


  19. Reasoning About Risk in Agent's Deliberation Process: A Jadex Implementation. [Citation Graph (, )][DBLP]


  20. Perceived risk assessment. [Citation Graph (, )][DBLP]


  21. -Tropos. [Citation Graph (, )][DBLP]


  22. Formal Analysis of BPMN Via a Translation into COWS. [Citation Graph (, )][DBLP]


  23. A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations. [Citation Graph (, )][DBLP]


  24. Goal-Equivalent Secure Business Process Re-engineering. [Citation Graph (, )][DBLP]


  25. A Model-Driven Approach for the Specification and Analysis of Access Control Policies. [Citation Graph (, )][DBLP]


  26. POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy. [Citation Graph (, )][DBLP]


  27. Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control. [Citation Graph (, )][DBLP]


  28. How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. [Citation Graph (, )][DBLP]


  29. Computer-aided Support for Secure Tropos. [Citation Graph (, )][DBLP]


  30. Requirements model generation to support requirements elicitation: the Secure Tropos experience. [Citation Graph (, )][DBLP]


  31. S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002