User Tools

Site Tools


security_requirements_engineering

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

security_requirements_engineering [2013/06/19 13:26]
leminhsang.tran@unitn.it [2013]
security_requirements_engineering [2016/09/05 16:04] (current)
fabio.massacci@unitn.it [Earlier papers]
Line 95: Line 95:
   * P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Detecting Conflicts of Interest. In Proc. of IEEE RE'06. pages 315-318. IEEE Press, 2006.   * P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Detecting Conflicts of Interest. In Proc. of IEEE RE'06. pages 315-318. IEEE Press, 2006.
   * Massacci F., Prest M., Zannone N., "Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation". //Computer Standards & Interfaces//, 2005, v. 27, n. 5, p. 445-455. {{:research_activities:security_requirements_engineering:mass-pres-zann-05-csi.pdf|PDF}}. One of our earliest papers and the most cited journal one.   * Massacci F., Prest M., Zannone N., "Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation". //Computer Standards & Interfaces//, 2005, v. 27, n. 5, p. 445-455. {{:research_activities:security_requirements_engineering:mass-pres-zann-05-csi.pdf|PDF}}. One of our earliest papers and the most cited journal one.
-  * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of IEEE RE'05, IEEE Press 2005. The most cited paper of the conference.+  * //**P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of IEEE RE'05, IEEE Press 2005. (Ten Years Most Influential Paper IEEE RE 2015). {{:research_activities:security_requirements_engineering:gior-mass-mylo-zann-05-rea.pdf|PDF}}**//
   * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'05 LNCS Springer 2005. PDF   * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'05 LNCS Springer 2005. PDF
  
security_requirements_engineering.txt ยท Last modified: 2016/09/05 16:04 by fabio.massacci@unitn.it