Folgen
Nicola Zannone
Titel
Zitiert von
Zitiert von
Jahr
Modeling security requirements through ownership, permission and delegation
P Giorgini, F Massacci, J Mylopoulos, N Zannone
13th IEEE International Conference on Requirements Engineering (RE'05), 167-176, 2005
2872005
Towards the development of privacy-aware systems
P Guarda, N Zannone
Information and Software Technology 51 (2), 337-350, 2009
1692009
Access control in Internet-of-Things: A survey
S Ravidas, A Lekidis, F Paci, N Zannone
Journal of Network and Computer Applications 144, 79-101, 2019
1592019
A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
G Elahi, E Yu, N Zannone
Requirements engineering 15, 41-62, 2010
1482010
Requirements engineering meets trust management
P Giorgini, F Massacci, J Mylopoulos, N Zannone
Trust Management, 176-190, 2004
148*2004
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
F Massacci, M Prest, N Zannone
Computer Standards & Interfaces 27 (5), 445-455, 2005
1262005
Requirements engineering for trust management: model, methodology, and reasoning
P Giorgini, F Massacci, J Mylopoulos, N Zannone
International Journal of Information Security 5, 257-274, 2006
1142006
Security and privacy for innovative automotive applications: A survey
VH Le, J den Hartog, N Zannone
Computer Communications 132, 17-41, 2018
1072018
Security and trust requirements engineering,
P Giorgini, F Massacci, N Zannone
Foundations of Security Analysis and Design III: FOSAD 2004/2005 tutorial …, 2005
1072005
A reference model for reputation systems
S Vavilis, M Petković, N Zannone
Decision Support Systems 61, 147-154, 2014
1012014
Survey on access control for community-centered collaborative systems
F Paci, A Squicciarini, N Zannone
ACM Computing Surveys (CSUR) 51 (1), 1-38, 2018
982018
From trust to dependability through risk analysis
Y Asnar, P Giorgini, F Massacci, N Zannone
The Second International Conference on Availability, Reliability and …, 2007
922007
Modelling security and trust with secure tropos
P Giorgini, H Mouratidis, N Zannone
Integrating Security and Software Engineering: Advances and Future Visions …, 2007
832007
A modeling ontology for integrating vulnerabilities into security requirements conceptual foundations
G Elahi, E Yu, N Zannone
International Conference on Conceptual Modeling, 99-114, 2009
762009
Analysis of XACML policies with SMT
F Turkmen, J Den Hartog, S Ranise, N Zannone
Principles of Security and Trust: 4th International Conference, POST 2015 …, 2015
732015
Formal analysis of BPMN via a translation into COWS
D Prandi, P Quaglia, N Zannone
International Conference on Coordination Languages and Models, 249-263, 2008
722008
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
L Compagna, P El Khoury, A Krausová, F Massacci, N Zannone
Artificial Intelligence and Law 17 (1), 1-30, 2009
702009
Linking data and process perspectives for conformance analysis
M Alizadeh, X Lu, D Fahland, N Zannone, WMP van der Aalst
Computers & Security 73, 172-193, 2018
662018
A survey on multi-factor authentication for online banking in the wild
F Sinigaglia, R Carbone, G Costa, N Zannone
Computers & Security 95, 101745, 2020
642020
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
F Massacci, J Mylopoulos, N Zannone
The VLDB journal 15, 370-387, 2006
642006
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20