User Tools

Site Tools


security_requirements_engineering

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
security_requirements_engineering [2013/04/16 15:25] – [2013] leminhsang.tran@unitn.itsecurity_requirements_engineering [2021/01/29 10:58] (current) – external edit 127.0.0.1
Line 65: Line 65:
  
 ==== 2013 ==== ==== 2013 ====
-  * Tran L.M.S and Massacci F.: UNICORN: A Tool for Modeling and Reasoning on the Uncertainty of Requirements Evolutions. In: //CAiSE'13 - Forum// (to appear) +  * Tran L.M.S and Massacci F.: UNICORN: A Tool for Modeling and Reasoning on the Uncertainty of Requirements Evolutions. In: //CAiSE 2013 - Forum// {{:research_activities:security_requirements_engineering:tran-caiseforum13.pdf|PDF}} {{:research_activities:security_requirements_engineering:poster-tran-massacci-caiseforum.pdf|Poster}} 
-  * Tran L.M.S.: Early Dealing with Evolving Risks in Software Systems. In: //The 3rd International Workshop on Information Systems Security Engineering (WISSE'13)//, co-located with CAiSE 2013. {{:research_activities:security_requirements_engineering:tran-wisse13.pdf|PDF}}+  * Tran L.M.S.: Early Dealing with Evolving Risks in Software Systems. In: //The 3rd International Workshop on Information Systems Security Engineering (WISSE'13)//, co-located with CAiSE 2013, 17-21 June 2013, Valencia, Spain. {{:research_activities:security_requirements_engineering:tran-wisse13.pdf|PDF}}
    
 ==== 2012 ==== ==== 2012 ====
Line 95: Line 95:
   * P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Detecting Conflicts of Interest. In Proc. of IEEE RE'06. pages 315-318. IEEE Press, 2006.   * P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Detecting Conflicts of Interest. In Proc. of IEEE RE'06. pages 315-318. IEEE Press, 2006.
   * Massacci F., Prest M., Zannone N., "Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation". //Computer Standards & Interfaces//, 2005, v. 27, n. 5, p. 445-455. {{:research_activities:security_requirements_engineering:mass-pres-zann-05-csi.pdf|PDF}}. One of our earliest papers and the most cited journal one.   * Massacci F., Prest M., Zannone N., "Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation". //Computer Standards & Interfaces//, 2005, v. 27, n. 5, p. 445-455. {{:research_activities:security_requirements_engineering:mass-pres-zann-05-csi.pdf|PDF}}. One of our earliest papers and the most cited journal one.
-  * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of IEEE RE'05, IEEE Press 2005. The most cited paper of the conference.+  * //**P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. In Proc. of IEEE RE'05, IEEE Press 2005. (Ten Years Most Influential Paper IEEE RE 2015). {{:research_activities:security_requirements_engineering:gior-mass-mylo-zann-05-rea.pdf|PDF}}**//
   * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'05 LNCS Springer 2005. PDF   * P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. In Proc. of iTrust'05 LNCS Springer 2005. PDF
  
security_requirements_engineering.1366118713.txt.gz · Last modified: (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki