This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
security_requirements_engineering [2013/06/19 13:22] leminhsang.tran@unitn.it [2013] |
security_requirements_engineering [2021/01/29 10:58] (current) |
||
---|---|---|---|
Line 65: | Line 65: | ||
==== 2013 ==== | ==== 2013 ==== | ||
- | * Tran L.M.S and Massacci F.: UNICORN: A Tool for Modeling and Reasoning on the Uncertainty of Requirements Evolutions. In: //CAiSE 2013 - Forum// {{:research_activities:security_requirements_engineering:tran-caiseforum13.pdf}} | + | * Tran L.M.S and Massacci F.: UNICORN: A Tool for Modeling and Reasoning on the Uncertainty of Requirements Evolutions. In: //CAiSE 2013 - Forum// {{:research_activities:security_requirements_engineering:tran-caiseforum13.pdf|PDF}} {{:research_activities:security_requirements_engineering:poster-tran-massacci-caiseforum.pdf|Poster}} |
* Tran L.M.S.: Early Dealing with Evolving Risks in Software Systems. In: //The 3rd International Workshop on Information Systems Security Engineering (WISSE'13)//, co-located with CAiSE 2013, 17-21 June 2013, Valencia, Spain. {{:research_activities:security_requirements_engineering:tran-wisse13.pdf|PDF}} | * Tran L.M.S.: Early Dealing with Evolving Risks in Software Systems. In: //The 3rd International Workshop on Information Systems Security Engineering (WISSE'13)//, co-located with CAiSE 2013, 17-21 June 2013, Valencia, Spain. {{:research_activities:security_requirements_engineering:tran-wisse13.pdf|PDF}} | ||
Line 95: | Line 95: | ||
* P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Detecting Conflicts of Interest. In Proc. of IEEE RE'06. pages 315-318. IEEE Press, 2006. | * P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Detecting Conflicts of Interest. In Proc. of IEEE RE'06. pages 315-318. IEEE Press, 2006. | ||
* Massacci F., Prest M., Zannone N., "Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation". //Computer Standards & Interfaces//, 2005, v. 27, n. 5, p. 445-455. {{:research_activities:security_requirements_engineering:mass-pres-zann-05-csi.pdf|PDF}}. One of our earliest papers and the most cited journal one. | * Massacci F., Prest M., Zannone N., "Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation". //Computer Standards & Interfaces//, 2005, v. 27, n. 5, p. 445-455. {{:research_activities:security_requirements_engineering:mass-pres-zann-05-csi.pdf|PDF}}. One of our earliest papers and the most cited journal one. | ||
- | * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of IEEE RE'05, IEEE Press 2005. The most cited paper of the conference. | + | * //**P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of IEEE RE'05, IEEE Press 2005. (Ten Years Most Influential Paper IEEE RE 2015). {{:research_activities:security_requirements_engineering:gior-mass-mylo-zann-05-rea.pdf|PDF}}**// |
* P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'05 LNCS Springer 2005. PDF | * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'05 LNCS Springer 2005. PDF | ||