User Tools

Site Tools


security_requirements_engineering

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
security_requirements_engineering [2013/04/02 17:34]
fabio.massacci@unitn.it [Talks and Tutorials]
security_requirements_engineering [2021/01/29 10:58] (current)
Line 63: Line 63:
  
 ===== Publications ===== ===== Publications =====
 +
 +==== 2013 ====
 +  * Tran L.M.S and Massacci F.: UNICORN: A Tool for Modeling and Reasoning on the Uncertainty of Requirements Evolutions. In: //CAiSE 2013 - Forum// {{:​research_activities:​security_requirements_engineering:​tran-caiseforum13.pdf|PDF}} {{:​research_activities:​security_requirements_engineering:​poster-tran-massacci-caiseforum.pdf|Poster}}
 +  * Tran L.M.S.: Early Dealing with Evolving Risks in Software Systems. In: //The 3rd International Workshop on Information Systems Security Engineering (WISSE'​13)//,​ co-located with CAiSE 2013, 17-21 June 2013, Valencia, Spain. {{:​research_activities:​security_requirements_engineering:​tran-wisse13.pdf|PDF}}
    
 ==== 2012 ==== ==== 2012 ====
Line 75: Line 79:
   * Bergmann, G., Massacci, F., Paci, F., Tun, T.T, Varro, D., Yu, Y. A Tool for ManagingEvolving Security Requirements. In Proceedings of CAISE'​11 FORUM, 110--125, 2011.{{bergmann-caise-forum.pdf|PDF}}   * Bergmann, G., Massacci, F., Paci, F., Tun, T.T, Varro, D., Yu, Y. A Tool for ManagingEvolving Security Requirements. In Proceedings of CAISE'​11 FORUM, 110--125, 2011.{{bergmann-caise-forum.pdf|PDF}}
   * Massacci, F., Mylopoulos, J., Paci, f.,Tun, T.T, Yu, Y. An extended Ontology for Security Requirements.In Proceedings of The First International Workshop on Information Systems Security Engineering (WISSE), 622--636, 2011.{{wisse-cameraready-paper7.pdf|PDF}}   * Massacci, F., Mylopoulos, J., Paci, f.,Tun, T.T, Yu, Y. An extended Ontology for Security Requirements.In Proceedings of The First International Workshop on Information Systems Security Engineering (WISSE), 622--636, 2011.{{wisse-cameraready-paper7.pdf|PDF}}
 +  * F. Massacci and N. Zannone. Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. In Social Modeling for Requirements Engineering. MIT Press. A very interesting case study.{{:​research_activities:​security_requirements_engineering:​mass-zann-08-mitbook.pdf|PDF}}
   * L.M.S.Tran and F.Massacci. //Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution//​. In Proceeding of the 23rd International Conference on Advanced Information Systems Engineering (CAiSE'​11) London, June 2011.{{:​research_activities:​security_requirements_engineering:​forcaise-camera.pdf|PDF}}   * L.M.S.Tran and F.Massacci. //Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution//​. In Proceeding of the 23rd International Conference on Advanced Information Systems Engineering (CAiSE'​11) London, June 2011.{{:​research_activities:​security_requirements_engineering:​forcaise-camera.pdf|PDF}}
   * L.M.S.Tran. //​Requirement Evolution: Towards a Methodology and Framework//​. In the CAiSE Doctoral Consortium 2011. London, June 2011. {{:​research_activities:​security_requirements_engineering:​caise-dc-mst.pdf|PDF}}   * L.M.S.Tran. //​Requirement Evolution: Towards a Methodology and Framework//​. In the CAiSE Doctoral Consortium 2011. London, June 2011. {{:​research_activities:​security_requirements_engineering:​caise-dc-mst.pdf|PDF}}
Line 85: Line 90:
   * Massacci F., and Mylopoulos J., Zannone N. Computer-aided Support for Secure Tropos. //Automated Software Engineering.//​ 14(3): 341-364, 2007 {{:​research_activities:​security_requirements_engineering:​mass-mylo-zann-07-asej.pdf|PDF}}. A comprehensive tutorial on the tool.   * Massacci F., and Mylopoulos J., Zannone N. Computer-aided Support for Secure Tropos. //Automated Software Engineering.//​ 14(3): 341-364, 2007 {{:​research_activities:​security_requirements_engineering:​mass-mylo-zann-07-asej.pdf|PDF}}. A comprehensive tutorial on the tool.
   * Massacci F., Mylopoulos J., Zannone N., "From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach"​. //​International Journal of Software engineering and Knowledge Engineering//,​ 17(2):​265-284,​ 2007.   * Massacci F., Mylopoulos J., Zannone N., "From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach"​. //​International Journal of Software engineering and Knowledge Engineering//,​ 17(2):​265-284,​ 2007.
 +  * Y. Asnar, R. Bonato, P. Giorgini, F. Massacci, V. Meduri, C. Ricucci and A. Saidane. Secure and Dependable Patterns in Organizations:​ An Empirical Approach. In //Proc. of IEEE RE'07, Industry Paper Track// IEEE Press 2007
   * F. Massacci, J. Mylopoulos and N. Zannone. Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations. //The VLDB Journal//. 2006. {{:​research_activities:​security_requirements_engineering:​mass-mylo-zann-06-vldbj.pdf|PDF}}. AN application of the methodology based on goal model to extract schemas for hippocratic databases.   * F. Massacci, J. Mylopoulos and N. Zannone. Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations. //The VLDB Journal//. 2006. {{:​research_activities:​security_requirements_engineering:​mass-mylo-zann-06-vldbj.pdf|PDF}}. AN application of the methodology based on goal model to extract schemas for hippocratic databases.
   * Giorgini P., Massacci F., Mylopoulos J., Zannone N., "​Requirements Engineering for Trust Management: Model, Methodology,​ and Reasoning"​. //​International Journal of Information Security//, 5(4):​257-274,​ 2006. {{:​research_activities:​security_requirements_engineering:​gior-mass-mylo-zann-06-ijis.pdf|PDF}}. An introduction to the methodology.   * Giorgini P., Massacci F., Mylopoulos J., Zannone N., "​Requirements Engineering for Trust Management: Model, Methodology,​ and Reasoning"​. //​International Journal of Information Security//, 5(4):​257-274,​ 2006. {{:​research_activities:​security_requirements_engineering:​gior-mass-mylo-zann-06-ijis.pdf|PDF}}. An introduction to the methodology.
-  * Massacci F., Prest M., Zannone N., "Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation"​. //Computer Standards & Interfaces//,​ 2005, v. 27, n. 5, p. 445-455. {{:​research_activities:​security_requirements_engineering:​mass-pres-zann-05-csi.pdf|PDF}}. One of our earliest papers and the most cited one.+  ​* P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Detecting Conflicts of Interest. In Proc. of IEEE RE'06. pages 315-318. IEEE Press, 2006. 
 +  ​* Massacci F., Prest M., Zannone N., "Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation"​. //Computer Standards & Interfaces//,​ 2005, v. 27, n. 5, p. 445-455. {{:​research_activities:​security_requirements_engineering:​mass-pres-zann-05-csi.pdf|PDF}}. One of our earliest papers and the most cited journal ​one. 
 +  * //**P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of IEEE RE'05, IEEE Press 2005. (Ten Years Most Influential Paper IEEE RE 2015). {{:​research_activities:​security_requirements_engineering:​gior-mass-mylo-zann-05-rea.pdf|PDF}}**//​ 
 +  * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'​05 LNCS Springer 2005. PDF 
  
 ===== Talks and Tutorials ===== ===== Talks and Tutorials =====
Line 93: Line 103:
   * Y. Asnar and Fabio Massacci. //Managing Security in Services - a Goal & Process Approach//. Tutorial at the IEEE International Conference on Intelligence and Security Informatics. 2011 {{research_activities:​security_requirements_engineering:​tutorial-isi-2011.pdf|Tutorial Material}}.   * Y. Asnar and Fabio Massacci. //Managing Security in Services - a Goal & Process Approach//. Tutorial at the IEEE International Conference on Intelligence and Security Informatics. 2011 {{research_activities:​security_requirements_engineering:​tutorial-isi-2011.pdf|Tutorial Material}}.
   * Y. Asnar, H. W. Lim, F. Massacci, C. Worledge: Realizing Trustworthy Business Services by A New GRC. The //ISACA Journal// Online edition 2010. {{:​research_activities:​security_requirements_engineering:​asna-etal-09-isacaj.pdf|PDF}}   * Y. Asnar, H. W. Lim, F. Massacci, C. Worledge: Realizing Trustworthy Business Services by A New GRC. The //ISACA Journal// Online edition 2010. {{:​research_activities:​security_requirements_engineering:​asna-etal-09-isacaj.pdf|PDF}}
-==== Software ====+===== Software ====
 + 
 +  *[[http://​disi.unitn.it/​~tran/​pmwiki/​pmwiki.php/​Main/​Unicorn|UNICORN ]]: a tool for modeling and reasoning on the uncertainty of requirements evolutions. ​ This is an Eclipse-based tool that aims to supports the modeling and reasoning on the uncertainty of requirements evolution. The tool provides graphical constructs as well as different views of requirements evolution to assist users to model requirements evolution. The reasoning facilitates the selection of design alternatives.
  
 +  *A very old tool that we used in the first papers is here. http://​sesa.dit.unitn.it/​sistar_tool ​
security_requirements_engineering.1364916863.txt.gz · Last modified: 2021/01/29 10:58 (external edit)