User Tools

Site Tools


security_requirements_engineering

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
security_requirements_engineering [2013/06/19 13:26]
leminhsang.tran@unitn.it [2013]
security_requirements_engineering [2021/01/29 10:58] (current)
Line 95: Line 95:
   * P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Detecting Conflicts of Interest. In Proc. of IEEE RE'06. pages 315-318. IEEE Press, 2006.   * P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Detecting Conflicts of Interest. In Proc. of IEEE RE'06. pages 315-318. IEEE Press, 2006.
   * Massacci F., Prest M., Zannone N., "Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation"​. //Computer Standards & Interfaces//,​ 2005, v. 27, n. 5, p. 445-455. {{:​research_activities:​security_requirements_engineering:​mass-pres-zann-05-csi.pdf|PDF}}. One of our earliest papers and the most cited journal one.   * Massacci F., Prest M., Zannone N., "Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation"​. //Computer Standards & Interfaces//,​ 2005, v. 27, n. 5, p. 445-455. {{:​research_activities:​security_requirements_engineering:​mass-pres-zann-05-csi.pdf|PDF}}. One of our earliest papers and the most cited journal one.
-  * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of IEEE RE'05, IEEE Press 2005. The most cited paper of the conference.+  ​* //**P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of IEEE RE'05, IEEE Press 2005. (Ten Years Most Influential Paper IEEE RE 2015). {{:​research_activities:​security_requirements_engineering:​gior-mass-mylo-zann-05-rea.pdf|PDF}}**//​
   * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'​05 LNCS Springer 2005. PDF   * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'​05 LNCS Springer 2005. PDF
  
security_requirements_engineering.txt ยท Last modified: 2021/01/29 10:58 (external edit)