Paper

From SI* Framework

Jump to: navigation, search

F. Massacci, John Mylopoulos, and N. Zannone. An Ontology for Secure Socio-Technical Systems. In [i]Handbook of Ontologies for Business Interaction[/i]. Idea Group, 2006.

F. Massacci and N. Zannone. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/mass-zann-06-MIT.pdf][u]Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank.[/u][/link]<cid:part1.03000808.04040708@dit.unitn.it> In [i]Social Modeling for Requirements Engineering[/i]. MIT Press, 2006.

P. Giorgini, F. Massacci and N. Zannone. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/gior-mass-zann-05-FOSAD.pdf][u]Security and Trust Requirements Engineering[/u][/link]. <cid:part2.08040509.00010002@dit.unitn.it> In [i]Foundations of Security Analysis and Design III - Tutorial Lectures[/i], LNCS 3655, pages 237-272. Springer-Verlag GmbH, 2005.

F. Massacci, J. Mylopoulos and N. Zannone. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/mass-mylo-zann-07-ASE.pdf][u]Computer-Aided Support for Secure Tropos[/u][/link]. <cid:part3.00030309.02000009@dit.unitn.it> [i]Automated Software Engineering[/i]. 2007.

P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/gior-mass-mylo-zann-06-IJIS.pdf][u]Requirements Engineering for Trust Management: Model, Methodology, and Reasoning[/u][/link]. <cid:part4.04030402.05090704@dit.unitn.it> [i]The International Journal of Information Security[/i], 5(4):257-274, 2006.

F. Massacci, M. Prest and N. Zannone. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/mass-pres-zann-05-CSI.pdf][u]Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation[/u][/link]. <cid:part5.05020300.08010508@dit.unitn.it>[i]Computer Standards & Interfaces[/i], 27(5):445-455, 2005.

P. Guarda, F. Massacci, and N. Zannone. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/guar-mass-zann-07-MeTTeg.pdf][u]E-Government and On-line Services: Security and Legal Patterns[/u][/link].<cid:part6.06000801.01040004@dit.unitn.it> In [i]Proceedings of the 1st International Conference on Methodologies, Technologies and Tools enabling e-Government (MeTTeG07)[/i], 2007.

L. Compagna, P. El Khoury, F. Massacci, R. Thomas, and N. Zannone. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/comp-elkh-mass-thom-zann-07-ICAIL.pdf][u]How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach[/u][/link]. <cid:part7.04000801.03080401@dit.unitn.it> In [i]Proceedings of the 11th International Conference on Artificial Intelligence and Law (ICAIL 2007)[/i], 2007.

P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/gior-mass-mylo-zann-06-RE.pdf][u]Detecting Conflicts of Interest[/u][/link]. <cid:part8.03080409.08070206@dit.unitn.it> In [i]Proceedings of the 14th IEEE International Requirements Engineering Conference (RE'06)[/i], pages 315-318. IEEE Computer Society Press, 2006.

P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/gior-mass-mylo-zann-05-REa.pdf][u]Modeling Security Requirements Through Ownership, Permission and Delegation[/u][/link]. <cid:part9.07040707.09090101@dit.unitn.it> In [i]Proceedings of the 13th IEEE International Requirements Engineering Conference (RE'05)[/i], pages 167-176. IEEE Computer Society Press, 2005.

P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/gior-mass-mylo-zann-05-REb.pdf][u]ST-Tool: A CASE Tool for Security Requirements Engineering[/u][/link]. <cid:part10.07080707.02010708@dit.unitn.it> In [i]Proceedings of the 13th IEEE International Requirements Engineering Conference (RE'05)[/i], pages 451-452. IEEE Computer Society Press, 2005.

P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/gior-mass-mylo-zann-05-iTrust.pdf][u]Modeling Social and Individual Trust in Requirements Engineering Methodologies[/u][/link]. <cid:part11.09040205.03060207@dit.unitn.it> In [i]Proceedings of the ThirdInternational Conference on Trust Management (iTrust 2005)[/i], LNCS 3477, pages 161-176. Springer-Verlag GmbH, 2005.

P. Giorgini, F. Massacci, J. Mylopoulos, A. Siena and N. Zannone. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/gior-mass-mylo-sien-zann-05-iTrust.pdf][u]ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements[/u][/link]. <cid:part12.01040800.05000309@dit.unitn.it> In P[i]roceedings of the Third International Conference on Trust Management (iTrust 2005)[/i], LNCS 3477, pages 415-419. Springer-Verlag GmbH, 2005.

P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/gior-mass-mylo-zann-04-EuroPKI.pdf][u]Filling the gap between Requirements Engineering and Public Key/Trust Management Infrastructures[/u].[/link] <cid:part13.00060107.00020807@dit.unitn.it> In [i]Proceedings of the 1st European PKI Workshop: Research and Applications (1st EuroPKI)[/i], LNCS 3093, pages 98-111. Springer-Verlag GmbH, 2004.

P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/gior-mass-mylo-zann-04-iTrust.pdf][u]Requirements Engineering meets Trust Management: Model, Methodology, and Reasoning[/u][/link]. <cid:part14.04080609.01040203@dit.unitn.it> In [i]Proceedings of the Second International Conference on Trust Management (iTrust 2004)[/i], LNCS 2995, pages 176-190. Springer-Verlag GmbH, 2004.

V. Bryl, F. Massacci, J. Mylopoulos and N. Zannone. [link=http://www.dit.unitn.it/~bryl/bryl-mass-mylo-zann-06-CAiSE.pdf][u]Designing Security Requirements Models through Planning[/u][/link]. In [i]Proceedings of the 18th Conference on Advanced Information Systems Engineering (CAiSE'06)[/i], Luxembourg, June 5-9, 2006 (Springer), pp. 33-47.

G. Frankova, F. Massacci, and M. Seguran. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/FRAN-MASS-SEGU-07-IFIPTM.pdf][u] From Early Requirements Analysis towards Secure Workflows[/u][/link]. In [i]Proceedings of the joint iTrust and PST Conferences on Privacy, Trust Management and Security[/i], Moncton, New Brunswick, Canada, July-August 2007.

G. Frankova and A. Yautsiukhin. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/FRAN-YAUT-07-YRSOC.pdf][u] Service and Protection Level Agreements for Business Processes[/u][/link]. In the [i]Second European Young Researchers Workshop on Service Oriented Computing[/i], Leicester, UK, June 2007, pages 38-43.

Y. Karabulut, F. Kerschbaum, P. Robinson, F. Massacci, and A. Yautsiukhin. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/KARA-06-STM.pdf][u] Security and trust in it business outsourcing: a manifesto[/u][/link]. In [i]Proceedings of the 2nd International Workshop on Security and Trust Management[/i], volume 179, pages 47–58, 2006.

A. Yautsiukhin. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/YAUT-07-WS-IQS.pdf][u] Quality of Protection determination for Web Services[/u][/link]. In [i]Proceedings of the Workshop on Web services interactions, quality and SLAs[/i], 2007.

S. Etale, F. Massacci, and A. Yautsiukhin. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/ETAL-07-TECHREP.pdf][u] The meaning of logs[/u][/link]. In [i]Proceedings of the 4th International Conference on Trust, Privacy & Security in Digital Business[/i], LCNS series, 4657, pp. 145-154, 2007.

G. Frankova and A. Yautsiukhin. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/FRAN-07-YR-SOC.pdf][u] Service and protection level agreements for business processes[/u][/link]. In [i]Proceedings of the 2nd Young Researchers Workshop on Service Oriented Computing[/i], Springer, 2007.

F. Massacci and A. Yautsiukhin. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/MASS-07-IAS.pdf][u] Modelling of quality of protection in outsourced business processes[/u][/link]. In [i]Proceedings of the The Third International Symposium on Information Assurance and Security[/i], IEEE Press, To appear., 2007.

F. Massacci and A. Yautsiukhin. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/MASS-07-QoP.pdf][u] An Algorithm for the Appraisal of Assurance Indicators for Complex Business Processes[/u][/link]. In [i]Proceedings of the The Third Workshop on Quality of Protection[/i], To appear., 2007.

Yudistira Asnar, Roberto Bonato, Paolo Giorgini, Fabio Massacci, Valentino Meduri, Carlo Riccucci, and Ayda Saidane. [u]Secure and Dependable Patterns in Organizations: An Empirical Approach[/u]. In [i]Proceedings of the 15th IEEE International Requirements Engineering Conference (RE ‘07)[/i], India Habitat Center, New Delhi, India, October 15-19th, 2007 (to appear).

Yudistira Asnar, Paolo Giorgini, Fabio Massacci, and Nicola Zannone. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/asnar-giorgini-massacci-zannone-ARES.pdf][u] From Trust to Dependability through Risk Analysis[/u][/link]. In [i]Proceedings of the Second International Conference on Availability, Reliability and Security (AReS 2007)[/i], Vienna, April 10th-13th, 2007.

Yudistira Asnar, Paolo Giorgini, and John Mylopoulos. [link=http://sesa.dit.unitn.it/sistar_tool/e107_files/public/papers/QualitativeGR-tech-rep.pdf][u] Risk Analysis as part of the Requirements Engineering Process[/u][/link]. Technical Report DIT-07-014, DIT - University of Trento, March 2007.