security_requirements_engineering
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| security_requirements_engineering [2013/04/02 17:34] – [Talks and Tutorials] fabio.massacci@unitn.it | security_requirements_engineering [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 63: | Line 63: | ||
| ===== Publications ===== | ===== Publications ===== | ||
| + | |||
| + | ==== 2013 ==== | ||
| + | * Tran L.M.S and Massacci F.: UNICORN: A Tool for Modeling and Reasoning on the Uncertainty of Requirements Evolutions. In: //CAiSE 2013 - Forum// {{: | ||
| + | * Tran L.M.S.: Early Dealing with Evolving Risks in Software Systems. In: //The 3rd International Workshop on Information Systems Security Engineering (WISSE' | ||
| ==== 2012 ==== | ==== 2012 ==== | ||
| Line 75: | Line 79: | ||
| * Bergmann, G., Massacci, F., Paci, F., Tun, T.T, Varro, D., Yu, Y. A Tool for ManagingEvolving Security Requirements. In Proceedings of CAISE' | * Bergmann, G., Massacci, F., Paci, F., Tun, T.T, Varro, D., Yu, Y. A Tool for ManagingEvolving Security Requirements. In Proceedings of CAISE' | ||
| * Massacci, F., Mylopoulos, J., Paci, f.,Tun, T.T, Yu, Y. An extended Ontology for Security Requirements.In Proceedings of The First International Workshop on Information Systems Security Engineering (WISSE), 622--636, 2011.{{wisse-cameraready-paper7.pdf|PDF}} | * Massacci, F., Mylopoulos, J., Paci, f.,Tun, T.T, Yu, Y. An extended Ontology for Security Requirements.In Proceedings of The First International Workshop on Information Systems Security Engineering (WISSE), 622--636, 2011.{{wisse-cameraready-paper7.pdf|PDF}} | ||
| + | * F. Massacci and N. Zannone. Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. In Social Modeling for Requirements Engineering. MIT Press. A very interesting case study.{{: | ||
| * L.M.S.Tran and F.Massacci. //Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution// | * L.M.S.Tran and F.Massacci. //Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution// | ||
| * L.M.S.Tran. // | * L.M.S.Tran. // | ||
| Line 85: | Line 90: | ||
| * Massacci F., and Mylopoulos J., Zannone N. Computer-aided Support for Secure Tropos. //Automated Software Engineering.// | * Massacci F., and Mylopoulos J., Zannone N. Computer-aided Support for Secure Tropos. //Automated Software Engineering.// | ||
| * Massacci F., Mylopoulos J., Zannone N., "From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach" | * Massacci F., Mylopoulos J., Zannone N., "From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach" | ||
| + | * Y. Asnar, R. Bonato, P. Giorgini, F. Massacci, V. Meduri, C. Ricucci and A. Saidane. Secure and Dependable Patterns in Organizations: | ||
| * F. Massacci, J. Mylopoulos and N. Zannone. Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations. //The VLDB Journal//. 2006. {{: | * F. Massacci, J. Mylopoulos and N. Zannone. Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations. //The VLDB Journal//. 2006. {{: | ||
| * Giorgini P., Massacci F., Mylopoulos J., Zannone N., " | * Giorgini P., Massacci F., Mylopoulos J., Zannone N., " | ||
| - | * Massacci F., Prest M., Zannone N., "Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation" | + | |
| + | | ||
| + | * //**P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of IEEE RE'05, IEEE Press 2005. (Ten Years Most Influential Paper IEEE RE 2015). {{: | ||
| + | * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust' | ||
| ===== Talks and Tutorials ===== | ===== Talks and Tutorials ===== | ||
| Line 93: | Line 103: | ||
| * Y. Asnar and Fabio Massacci. //Managing Security in Services - a Goal & Process Approach//. Tutorial at the IEEE International Conference on Intelligence and Security Informatics. 2011 {{research_activities: | * Y. Asnar and Fabio Massacci. //Managing Security in Services - a Goal & Process Approach//. Tutorial at the IEEE International Conference on Intelligence and Security Informatics. 2011 {{research_activities: | ||
| * Y. Asnar, H. W. Lim, F. Massacci, C. Worledge: Realizing Trustworthy Business Services by A New GRC. The //ISACA Journal// Online edition 2010. {{: | * Y. Asnar, H. W. Lim, F. Massacci, C. Worledge: Realizing Trustworthy Business Services by A New GRC. The //ISACA Journal// Online edition 2010. {{: | ||
| - | ==== Software ==== | + | ===== Software ===== |
| + | |||
| + | *[[http:// | ||
| + | *A very old tool that we used in the first papers is here. http:// | ||
security_requirements_engineering.1364916863.txt.gz · Last modified: (external edit)
