default search action
Nicola Zannone
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j48]Federico Cunico, Stefano Aldegheri, Andrea Avogaro, Michele Boldo, Nicola Bombieri, Luigi Capogrosso, Ariel Caputo, Damiano Carra, Stefano Centomo, Dong Seon Cheng, Ettore Cinquetti, Marco Cristani, Mirco De Marchi, Florenc Demrozi, Marco Emporio, Franco Fummi, Luca Geretti, Samuele Germiniani, Andrea Giachetti, Federico Girella, Enrico Martini, Gloria Menegaz, Niek Muijs, Federica Paci, Marco Panato, Graziano Pravadelli, Elisa Quintarelli, Ilaria Siviero, Silvia Francesca Storti, Carlo Tadiello, Cristian Turetta, Tiziano Villa, Nicola Zannone, Davide Quaglia:
Enhancing Safety and Privacy in Industry 4.0: The ICE Laboratory Case Study. IEEE Access 12: 154570-154599 (2024) - [j47]R. J. van Geest, Giuseppe Cascavilla, Joris Hulstijn, Nicola Zannone:
The applicability of a hybrid framework for automated phishing detection. Comput. Secur. 139: 103736 (2024) - [j46]Claudia Diamantini, Laura Genga, Alex Mircoli, Domenico Potena, Nicola Zannone:
Understanding the stumbling blocks of Italian higher education system: A process mining approach. Expert Syst. Appl. 242: 122747 (2024) - [j45]Vittoria Cozza, Mila Dalla Preda, Ruggero Lanotte, Marco Lucchese, Massimo Merro, Nicola Zannone:
Obfuscation strategies for industrial control systems. Int. J. Crit. Infrastructure Prot. 47: 100717 (2024) - [j44]Pavlo Burda, Luca Allodi, Nicola Zannone:
Cognition in Social Engineering Empirical Research: A Systematic Literature Review. ACM Trans. Comput. Hum. Interact. 31(2): 19:1-19:55 (2024) - [c124]Pavlo Burda, Maria Eleni Kokkini, Luca Allodi, Nicola Zannone:
The (Relative) Impact of Email Cues on the Perceived Threat of Phishing Attacks: A User Perspective on Phishing Deceptiveness. EuroS&P Workshops 2024: 67-84 - [c123]Pavlo Burda, Luca Allodi, Alexander Serebrenik, Nicola Zannone:
'Protect and Fight Back': A Case Study on User Motivations to Report Phishing Emails. EuroUSEC 2024: 30-43 - [c122]Gelareh Hasel Mehri, Tien-Dung Le, Bram C. M. Cappers, Jerry den Hartog, Nicola Zannone:
WiP: Enhancing the Comprehension of XACML Policies. SACMAT 2024 - [c121]Gelareh Hasel Mehri, Benjamin Monmege, Clara Bertolissi, Nicola Zannone:
A Bargaining-Game Framework for Multi-Party Access Control. SACMAT 2024 - 2023
- [c120]Federica Paci, Jacopo Pizzoli, Nicola Zannone:
A Comprehensive Study on Third-Party User Tracking in Mobile Applications. ARES 2023: 97:1-97:8 - [c119]Marco Lucchese, Francesco Lupia, Massimo Merro, Federica Paci, Nicola Zannone, Angelo Furfaro:
HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems. ARES 2023: 113:1-113:10 - [c118]Vittoria Cozza, Mila Dalla Preda, Marco Lucchese, Massimo Merro, Nicola Zannone:
Towards Obfuscation of Programmable Logic Controllers. ARES 2023: 121:1-121:10 - [c117]Gelareh Hasel Mehri, Inez L. Wester, Federica Paci, Nicola Zannone:
Mitigating Privilege Misuse in Access Control through Anomaly Detection. ARES 2023: 139:1-139:10 - [c116]Francesco Lupia, Marco Lucchese, Massimo Merro, Nicola Zannone:
ICS Honeypot Interactions: A Latitudinal Study. IEEE Big Data 2023: 3025-3034 - [c115]Ioana Andreea Marin, Pavlo Burda, Nicola Zannone, Luca Allodi:
The Influence of Human Factors on the Intention to Report Phishing Emails. CHI 2023: 620:1-620:18 - [c114]Pavlo Burda, Abdul Malek Altawekji, Luca Allodi, Nicola Zannone:
The Peculiar Case of Tailored Phishing against SMEs: Detection and Collective DefenseMechanisms at a Small IT Company. EuroS&P Workshops 2023: 232-243 - [c113]Ruggero Lanotte, Massimo Merro, Nicola Zannone:
Impact Analysis of Coordinated Cyber-Physical Attacks via Statistical Model Checking: A Case Study. FORTE 2023: 75-94 - [c112]Hamid Mohayeji, Andrei Agaronian, Eleni Constantinou, Nicola Zannone, Alexander Serebrenik:
Investigating the Resolution of Vulnerable Dependencies with Dependabot Security Updates. MSR 2023: 234-246 - [c111]Marco Lucchese, Massimo Merro, Federica Paci, Nicola Zannone:
Towards A High-interaction Physics-aware Honeynet for Industrial Control Systems. SAC 2023: 76-79 - [c110]Dominik Roy George, Savio Sciancalepore, Nicola Zannone:
Privacy-Preserving Multi-Party Access Control for Third-Party UAV Services. SACMAT 2023: 19-30 - [c109]Clara Bertolissi, Alba Martinez Anton, Nicola Zannone:
Data Sharing in Social Networks. SACMAT 2023: 181-192 - [c108]Loredana Caruccio, Domenico Desiato, Giuseppe Polese, Genoveffa Tortora, Nicola Zannone:
An Approach to Trade-off Privacy and Classification Accuracy in Machine Learning Processes. SEBD 2023: 420-429 - [c107]Mina Alishahi, Wouter Leeuw, Nicola Zannone:
BC-FL k-means: A Blockchain-based Framework for Federated Clustering. TrustCom 2023: 1348-1354 - [d1]Pavlo Burda, Luca Allodi, Nicola Zannone:
Cognition in Social Engineering Empirical Research: a Systematic Literature Review. Zenodo, 2023 - 2022
- [j43]Paul Lukowicz, Anton Nijholt, Kaleem Siddiqi, Marcello Pelillo, Kristof Van Laerhoven, Luca Viganò, Nicola Zannone:
Editorial: 2021 editors' pick: Computer science. Frontiers Comput. Sci. 4 (2022) - [j42]Tahir Ahmad, Umberto Morelli, Silvio Ranise, Nicola Zannone:
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system. Int. J. Inf. Sec. 21(2): 379-408 (2022) - [j41]Loredana Caruccio, Domenico Desiato, Giuseppe Polese, Genoveffa Tortora, Nicola Zannone:
A decision-support framework for data anonymization with application to machine learning processes. Inf. Sci. 613: 1-32 (2022) - [j40]Laura Genga, Luca Allodi, Nicola Zannone:
Association Rule Mining Meets Regression Analysis: An Automated Approach to Unveil Systematic Biases in Decision-Making Processes. J. Cybersecur. Priv. 2(1): 191-219 (2022) - [c106]Stanley Clark, Nikolay Yakovets, George Fletcher, Nicola Zannone:
ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases. DBSec 2022: 303-315 - [c105]Leon Kersten, Pavlo Burda, Luca Allodi, Nicola Zannone:
Investigating the Effect of Phishing Believability on Phishing Reporting. EuroS&P Workshops 2022: 117-128 - [c104]Pavlo Burda, Luca Allodi, Nicola Zannone:
A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection. FPS 2022: 443-452 - [c103]Savio Sciancalepore, Nicola Zannone:
PICO: privacy-preserving access control in IoT scenarios through incomplete information. SAC 2022: 147-156 - [c102]Stanley Clark, Nikolay Yakovets, George H. L. Fletcher, Nicola Zannone:
Poster: A Flexible Relationship-Based Access Control Policy Generator. SACMAT 2022: 263-265 - 2021
- [j39]Mina Sheikhalishahi, Ischa Stork, Nicola Zannone:
Privacy-preserving policy evaluation in multi-party access control. J. Comput. Secur. 29(6): 613-650 (2021) - [c101]Bram van Dooremaal, Pavlo Burda, Luca Allodi, Nicola Zannone:
Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection. ARES 2021: 60:1-60:10 - [c100]Mina Alishahi, Nicola Zannone:
Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets. DBSec 2021: 237-258 - [c99]Pavlo Burda, Luca Allodi, Nicola Zannone:
Dissecting Social Engineering Attacks Through the Lenses of Cognition. EuroS&P Workshops 2021: 149-160 - [c98]Milan Lopuhaä-Zwakenberg, Mina Alishahi, Jeroen Kivits, Jordi Klarenbeek, Gert-Jan van der Velde, Nicola Zannone:
Comparing Classifiers' Performance under Differential Privacy. SECRYPT 2021: 50-61 - 2020
- [j38]Federico Sinigaglia, Roberto Carbone, Gabriele Costa, Nicola Zannone:
A survey on multi-factor authentication for online banking in the wild. Comput. Secur. 95: 101745 (2020) - [j37]Luca Allodi, Tzouliano Chotza, Ekaterina Panina, Nicola Zannone:
The Need for New Antiphishing Measures Against Spear-Phishing Attacks. IEEE Secur. Priv. 18(2): 23-34 (2020) - [c97]Pavlo Burda, Tzouliano Chotza, Luca Allodi, Nicola Zannone:
Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment. ARES 2020: 3:1-3:10 - [c96]Giovanni Maria Riva, Alexandr Vasenev, Nicola Zannone:
SoK: engineering privacy-aware high-tech systems. ARES 2020: 19:1-19:10 - [c95]Yoram J. Meijaard, Bram C. M. Cappers, Josh G. M. Mengerink, Nicola Zannone:
Predictive Analytics to Prevent Voice over IP International Revenue Sharing Fraud. DBSec 2020: 241-260 - [c94]Federica Paci, Davide Bianchin, Elisa Quintarelli, Nicola Zannone:
IFTTT Privacy Checker. ETAA@ESORICS 2020: 90-107 - [c93]Pavlo Burda, Luca Allodi, Nicola Zannone:
Don't Forget the Human: a Crowdsourced Approach to Automate Response and Containment Against Spear Phishing Attacks. EuroS&P Workshops 2020: 471-476 - [c92]Simone Pirocca, Luca Allodi, Nicola Zannone:
A Toolkit for Security Awareness Training Against Targeted Phishing. ICISS 2020: 137-159 - [c91]Sowmya Ravidas, Indrakshi Ray, Nicola Zannone:
Handling Incomplete Information in Policy Evaluation using Attribute Similarity. TPS-ISA 2020: 79-88 - [c90]Mina Sheikhalishahi, Nicola Zannone:
On the Comparison of Classifiers' Construction over Private Inputs. TrustCom 2020: 691-698 - [c89]Mina Sheikhalishahi, Nicola Zannone:
Privacy Preserving Statistical Detection of Adversarial Instances. WETICE 2020: 159-164 - [p4]Laura Genga, Domenico Potena, Andrea Chiorrini, Claudia Diamantini, Nicola Zannone:
A Latitudinal Study on the Use of Sequential and Concurrency Patterns in Deviance Mining. Complex Pattern Mining 2020: 103-119
2010 – 2019
- 2019
- [j36]Laura Genga, Nicola Zannone, Anna Cinzia Squicciarini:
Discovering reliable evidence of data misuse by exploiting rule redundancy. Comput. Secur. 87 (2019) - [j35]Charles Morisset, Tim A. C. Willemse, Nicola Zannone:
A framework for the extended evaluation of ABAC policies. Cybersecur. 2(1): 6 (2019) - [j34]Sowmya Ravidas, Alexios Lekidis, Federica Paci, Nicola Zannone:
Access control in Internet-of-Things: A survey. J. Netw. Comput. Appl. 144: 79-101 (2019) - [c88]Neda Nasiriani, Anna Cinzia Squicciarini, Zara Saldanha, Sanchit Goel, Nicola Zannone:
Hierarchical Clustering for Discrimination Discovery: A Top-Down Approach. AIKE 2019: 187-194 - [c87]Laura Genga, Chiara Di Francescomarino, Chiara Ghidini, Nicola Zannone:
Predicting Critical Behaviors in Business Process Executions: When Evidence Counts. BPM Forum 2019: 72-90 - [c86]Laura Genga, Luca Allodi, Nicola Zannone:
Unveiling Systematic Biases in Decisional Processes: An Application to Discrimination Discovery. AsiaCCS 2019: 67-72 - [c85]Sowmya Ravidas, Priyanka Karkhanis, Yanja Dajsuren, Nicola Zannone:
An Authorization Framework for Cooperative Intelligent Transport Systems. ETAA@ESORICS 2019: 16-34 - [c84]Charles Morisset, Sowmya Ravidas, Nicola Zannone:
On Attribute Retrieval in ABAC. FPS 2019: 225-241 - [c83]Clara Bertolissi, Jerry den Hartog, Nicola Zannone:
Using Provenance for Secure Data Fusion in Cooperative Systems. SACMAT 2019: 185-194 - [c82]Mina Sheikhalishahi, Gamze Tillem, Zekeriya Erkin, Nicola Zannone:
Privacy-Preserving Multi-Party Access Control. WPES@CCS 2019: 1-13 - 2018
- [j33]Van Huynh Le, Jerry den Hartog, Nicola Zannone:
Security and privacy for innovative automotive applications: A survey. Comput. Commun. 132: 17-41 (2018) - [j32]Mahdi Alizadeh, Xixi Lu, Dirk Fahland, Nicola Zannone, Wil M. P. van der Aalst:
Linking data and process perspectives for conformance analysis. Comput. Secur. 73: 172-193 (2018) - [j31]Federica Paci, Anna Cinzia Squicciarini, Nicola Zannone:
Survey on Access Control for Community-Centered Collaborative Systems. ACM Comput. Surv. 51(1): 6:1-6:38 (2018) - [j30]Laura Genga, Mahdi Alizadeh, Domenico Potena, Claudia Diamantini, Nicola Zannone:
Discovering anomalous frequent patterns from partially ordered event logs. J. Intell. Inf. Syst. 51(2): 257-300 (2018) - [c81]Mattia Salnitri, Mahdi Alizadeh, Daniele Giovanella, Nicola Zannone, Paolo Giorgini:
From Security-by-Design to the Identification of Security-Critical Deviations in Process Executions. CAiSE Forum 2018: 218-234 - [c80]Luciano Argento, Andrea Margheri, Federica Paci, Vladimiro Sassone, Nicola Zannone:
Towards Adaptive Access Control. DBSec 2018: 99-109 - [c79]Laura Genga, Nicola Zannone:
Towards a Systematic Process-aware Behavioral Analysis for Security. ICETE (1) 2018: 626-635 - [c78]Van Huynh Le, Jerry den Hartog, Nicola Zannone:
Feature Selection for Anomaly Detection in Vehicular Ad Hoc Networks. ICETE (1) 2018: 647-657 - [c77]Tho Le, Roland van Rijswijk-Deij, Luca Allodi, Nicola Zannone:
Economic incentives on DNSSEC deployment: Time to move from quantity to quality. NOMS 2018: 1-9 - [c76]Mahdi Alizadeh, Sander Peters, Sandro Etalle, Nicola Zannone:
Behavior analysis in the medical sector: theory and practice. SAC 2018: 1637-1646 - [c75]Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, Nicola Zannone:
Multi-Party Access Control: Requirements, State of the Art and Open Challenges. SACMAT 2018: 49 - [c74]Charles Morisset, Tim A. C. Willemse, Nicola Zannone:
Efficient Extended ABAC Evaluation. SACMAT 2018: 149-160 - [c73]Tahir Ahmad, Umberto Morelli, Silvio Ranise, Nicola Zannone:
A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An AWS Case Study. SACMAT 2018: 235-246 - 2017
- [j29]Fatih Turkmen, Jerry den Hartog, Silvio Ranise, Nicola Zannone:
Formal analysis of XACML policies using SMT. Comput. Secur. 66: 185-203 (2017) - [c72]Laura Genga, Mahdi Alizadeh, Domenico Potena, Claudia Diamantini, Nicola Zannone:
APD tool: Mining Anomalous Patterns from Event Logs. BPM (Demos) 2017 - [c71]Niek Tax, Laura Genga, Nicola Zannone:
On the Use of Hierarchical Subtrace Mining for Efficient Local Process Model Mining. SIMPDA 2017: 8-22 - [c70]Laura Genga, Niek Tax, Nicola Zannone:
Mining Local Process Models and Their Correlations. SIMPDA (Revised Selected Papers) 2017: 65-88 - 2016
- [j28]Boris Skoric, Sebastiaan J. A. de Hoogh, Nicola Zannone:
Flow-based reputation with uncertainty: evidence-based subjective logic. Int. J. Inf. Sec. 15(4): 381-402 (2016) - [j27]Sokratis Vavilis, Milan Petkovic, Nicola Zannone:
A severity-based quantification of data leakages in database systems. J. Comput. Secur. 24(3): 321-345 (2016) - [c69]Sokratis Vavilis, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone:
Role Mining with Missing Values. ARES 2016: 167-176 - [c68]Jerry den Hartog, Nicola Zannone:
A Policy Framework for Data Fusion and Derived Data Control. ABAC@CODASPY 2016: 47-57 - [c67]Mahdi Alizadeh, Nicola Zannone:
Risk-based Analysis of Business Process Executions. CODASPY 2016: 130-132 - [c66]Alexandru Ionut Egner, Duc Luu, Jerry den Hartog, Nicola Zannone:
An Authorization Service for Collaborative Situation Awareness. CODASPY 2016: 136-138 - [c65]Rauf Mahmudlu, Jerry den Hartog, Nicola Zannone:
Data Governance and Transparency for Collaborative Systems. DBSec 2016: 199-216 - [c64]Jerry den Hartog, Nicola Zannone:
Collaborative Access Decisions: Why Has My Decision Not Been Enforced? ICISS 2016: 109-130 - [c63]Laura Genga, Domenico Potena, Orazio Martino, Mahdi Alizadeh, Claudia Diamantini, Nicola Zannone:
Subgraph Mining for Anomalous Pattern Discovery in Event Logs. NFMCP@PKDD/ECML 2016: 181-197 - [c62]Elisa Costante, Davide Fauri, Sandro Etalle, Jerry den Hartog, Nicola Zannone:
A Hybrid Framework for Data Loss Prevention and Detection. IEEE Symposium on Security and Privacy Workshops 2016: 324-333 - 2015
- [j26]Sokratis Vavilis, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone:
An anomaly analysis framework for database systems. Comput. Secur. 53: 156-173 (2015) - [j25]Samuel Paul Kaluvuri, Alexandru Ionut Egner, Jerry den Hartog, Nicola Zannone:
SAFAX - An Extensible Authorization Service for Cloud Environments. Frontiers ICT 2: 9 (2015) - [j24]Donia El Kateb, Nicola Zannone, Assaad Moawad, Patrice Caire, Grégory Nain, Tejeddine Mouelhi, Yves Le Traon:
Conviviality-driven access control policy. Requir. Eng. 20(4): 363-382 (2015) - [c61]Fatih Turkmen, Jerry den Hartog, Silvio Ranise, Nicola Zannone:
Analysis of XACML Policies with SMT. POST 2015: 115-134 - [c60]Federica Paci, Nicola Zannone:
Preventing Information Inference in Access Control. SACMAT 2015: 87-97 - [c59]Jason Crampton, Charles Morisset, Nicola Zannone:
On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval. SACMAT 2015: 99-109 - [c58]Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone:
Constructing Probable Explanations of Nonconformity: A Data-Aware and History-Based Approach. SSCI 2015: 1358-1365 - [c57]Michael Feiri, Rolf Pielage, Jonathan Petit, Nicola Zannone, Frank Kargl:
Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET. VTC Spring 2015: 1-5 - 2014
- [j23]Sokratis Vavilis, Milan Petkovic, Nicola Zannone:
A reference model for reputation systems. Decis. Support Syst. 61: 147-154 (2014) - [j22]Sandro Etalle, Nicola Zannone:
Understanding Computer Security. Frontiers ICT 1: 3 (2014) - [j21]Meilof Veeningen, Benne de Weger, Nicola Zannone:
Data minimisation in communication protocols: a formal analysis framework and application to identity management. Int. J. Inf. Sec. 13(6): 529-569 (2014) - [j20]Daniel Trivellato, Nicola Zannone, Sandro Etalle:
GEM: A distributed goal evaluation algorithm for trust management. Theory Pract. Log. Program. 14(3): 293-337 (2014) - [c56]Fatih Turkmen, Jerry den Hartog, Nicola Zannone:
POSTER: Analyzing Access Control Policies with SMT. CCS 2014: 1508-1510 - [c55]Stan Damen, Jerry den Hartog, Nicola Zannone:
CollAC: Collaborative access control. CTS 2014: 142-149 - [c54]Sokratis Vavilis, Milan Petkovic, Nicola Zannone:
Data Leakage Quantification. DBSec 2014: 98-113 - [c53]Charles Morisset, Nicola Zannone:
Reduction of access control decisions. SACMAT 2014: 53-62 - [c52]Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone:
History-based Construction of Log-Process Alignments for Conformance Checking: Discovering What Really Went Wrong. SIMPDA 2014: 1-15 - [c51]Mahdi Alizadeh, Massimiliano de Leoni, Nicola Zannone:
History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation. SIMPDA (Revised Selected Papers) 2014: 58-78 - [i5]Boris Skoric, Sebastiaan de Hoogh, Nicola Zannone:
Flow-based reputation with uncertainty: Evidence-Based Subjective Logic. CoRR abs/1402.3319 (2014) - 2013
- [j19]Daniel Trivellato, Nicola Zannone, Maurice Glaundrup, Jacek Skowronek, Sandro Etalle:
A Semantic Security Framework for Systems of Systems. Int. J. Cooperative Inf. Syst. 22(1) (2013) - [j18]Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone:
Privacy Analysis of User Behavior Using Alignments. it Inf. Technol. 55(6): 255-260 (2013) - [j17]Elisa Costante, Federica Paci, Nicola Zannone:
Privacy-Aware Web Service Composition and Ranking. Int. J. Web Serv. Res. 10(3): 1-23 (2013) - [j16]Seda F. Gürses, Magali Seguran, Nicola Zannone:
Requirements engineering within a large-scale security-oriented research project: lessons learned. Requir. Eng. 18(1): 43-66 (2013) - [c50]Sokratis Vavilis, Nicola Zannone, Milan Petkovic:
Data reliability in home healthcare services. CBMS 2013: 377-380 - [c49]Meilof Veeningen, Mayla Brusò, Jerry den Hartog, Nicola Zannone:
TRIPLEX: verifying data minimisation in communication systems. CCS 2013: 1415-1418 - [c48]Meilof Veeningen, Antonio Piepoli, Nicola Zannone:
Are On-Line Personae Really Unlinkable? DPM/SETOP 2013: 369-379 - [c47]Elisa Costante, Federica Paci, Nicola Zannone:
Privacy-Aware Web Service Composition and Ranking. ICWS 2013: 131-138 - [c46]Meilof Veeningen, Benne de Weger, Nicola Zannone:
Symbolic Privacy Analysis through Linkability and Detectability. IFIPTM 2013: 1-16 - [c45]Marina Egea, Federica Paci, Marinella Petrocchi, Nicola Zannone:
PERSONA - A Personalized Data Protection Framework. IFIPTM 2013: 272-280 - [c44]Stan Damen, Nicola Zannone:
Privacy Implications of Privacy Settings and Tagging in Facebook. Secure Data Management 2013: 121-138 - [c43]Elisa Costante, Sokratis Vavilis, Sandro Etalle, Jerry den Hartog, Milan Petkovic, Nicola Zannone:
Database Anomalous Activities - Detection and Quantification. SECRYPT 2013: 603-608 - [c42]Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone:
Controlling Break-the-Glass through Alignment. SocialCom 2013: 606-611 - [p3]Daniel Trivellato, Sandro Etalle, Erik Luit, Nicola Zannone:
The POLIPO Security Framework. Situation Awareness with Systems of Systems 2013: 189-208 - 2012
- [j15]Antonino Simone, Boris Skoric, Nicola Zannone:
Flow-Based Reputation: More than Just Ranking. Int. J. Inf. Technol. Decis. Mak. 11(3): 551-578 (2012) - [c41]Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone:
Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption. ARES 2012: 212-217 - [c40]Sebastian Banescu, Milan Petkovic, Nicola Zannone:
Measuring Privacy Compliance Using Fitness Metrics. BPM 2012: 114-119 - [c39]Sandro Etalle, Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato, Nicola Zannone:
Policy Administration in Tag-Based Authorization. FPS 2012: 162-179 - [c38]Sokratis Vavilis, Milan Petkovic, Nicola Zannone:
Impact of ICT on Home Healthcare. HCC 2012: 111-122 - [c37]Meilof Veeningen, Benne de Weger, Nicola Zannone:
Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy. STM 2012: 145-160 - [i4]Antonino Simone, Boris Skoric, Nicola Zannone:
Flow-based reputation: more than just ranking. CoRR abs/1203.1820 (2012) - [i3]Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato, Nicola Zannone:
Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption. CoRR abs/1205.5757 (2012) - [i2]Meilof Veeningen, Benne de Weger, Nicola Zannone:
Data Minimisation in Communication Protocols: A Formal Analysis Framework and Application to Identity Management. CoRR abs/1206.7111 (2012) - [i1]Daniel Trivellato, Nicola Zannone, Sandro Etalle:
GEM: a Distributed Goal Evaluation Algorithm for Trust Management. CoRR abs/1210.0368 (2012) - 2011
- [j14]Marco Montali, Paolo Torroni, Nicola Zannone, Paola Mello, Volha Bryl:
Engineering and verifying agent-oriented requirements augmented by business constraints with B-Tropos. Auton. Agents Multi Agent Syst. 23(2): 193-223 (2011) - [j13]Yudistira Asnar, Fabio Massacci, Ayda Saïdane, Carlo Riccucci, Massimo Felici, Alessandra Tedeschi, Paul El Khoury, Keqin Li, Magali Seguran, Nicola Zannone:
Organizational Patterns for Security and Dependability: From Design to Application. Int. J. Secur. Softw. Eng. 2(3): 1-22 (2011) - [c36]Daniel Trivellato, Nicola Zannone, Sandro Etalle:
Poster: protecting information in systems of systems. CCS 2011: 865-868 - [c35]Golnaz Elahi, Eric S. K. Yu, Nicola Zannone:
Security Risk Management by Qualitative Vulnerability Analysis. Metrisec@ESEM 2011: 1-10 - [c34]Sebastian Banescu, Nicola Zannone:
Measuring Privacy Compliance with Process Specifications. Metrisec@ESEM 2011: 41-50 - [c33]Meilof Veeningen, Benne de Weger, Nicola Zannone:
Formal Privacy Analysis of Communication Protocols for Identity Management. ICISS 2011: 235-249 - [c32]Daniel Trivellato, Nicola Zannone, Sandro Etalle:
A Security Framework for Systems of Systems. POLICY 2011: 182-183 - [c31]Milan Petkovic, Davide Prandi, Nicola Zannone:
Purpose Control: Did You Process the Data for the Intended Purpose? Secure Data Management 2011: 145-168 - [p2]Fabio Massacci, Nicola Zannone:
Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. Social Modeling for Requirements Engineering 2011: 337-362 - [e3]Úlfar Erlingsson, Roel J. Wieringa, Nicola Zannone:
Engineering Secure Software and Systems - Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings. Lecture Notes in Computer Science 6542, Springer 2011, ISBN 978-3-642-19124-4 [contents] - 2010
- [j12]Klemens Böhm, Sandro Etalle, Jerry den Hartog, Christian Hütter, Slim Trabelsi, Daniel Trivellato, Nicola Zannone:
A Flexible Architecture for Privacy-Aware Trust Management. J. Theor. Appl. Electron. Commer. Res. 5(2): 77-96 (2010) - [j11]Golnaz Elahi, Eric S. K. Yu, Nicola Zannone:
A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities. Requir. Eng. 15(1): 41-62 (2010) - [c30]Meilof Veeningen, Benne de Weger, Nicola Zannone:
Modeling Identity-Related Properties and Their Privacy Strength. Formal Aspects in Security and Trust 2010: 126-140 - [c29]Nicola Zannone, Milan Petkovic, Sandro Etalle:
Towards Data Protection Compliance. SECRYPT 2010: 213-216 - [p1]Fabio Massacci, John Mylopoulos, Nicola Zannone:
Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology. Advances in Intelligent Information Systems 2010: 147-174 - [e2]Fabio Massacci, Dan S. Wallach, Nicola Zannone:
Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings. Lecture Notes in Computer Science 5965, Springer 2010, ISBN 978-3-642-11746-6 [contents]
2000 – 2009
- 2009
- [b1]Nicola Zannone:
Security Agent-Oriented Requirements Engineering - the SI* Modeling Language and the Secure Tropos Methodology. VDM 2009, ISBN 978-3-639-17654-4, pp. I-IV, 1-121 - [j10]Luca Compagna, Paul El Khoury, Alzbeta Krausová, Fabio Massacci, Nicola Zannone:
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artif. Intell. Law 17(1): 1-30 (2009) - [j9]Nicola Zannone:
The Si* Modeling Framework: Metamodel and Applications. Int. J. Softw. Eng. Knowl. Eng. 19(5): 727-746 (2009) - [j8]Paolo Guarda, Nicola Zannone:
Towards the development of privacy-aware systems. Inf. Softw. Technol. 51(2): 337-350 (2009) - [c28]Daniel Trivellato, Fred Spiessens, Nicola Zannone, Sandro Etalle:
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control. CSE (3) 2009: 252-258 - [c27]Golnaz Elahi, Eric S. K. Yu, Nicola Zannone:
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations. ER 2009: 99-114 - [c26]Daniel Trivellato, Fred Spiessens, Nicola Zannone, Sandro Etalle:
POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy. POLICY 2009: 110-113 - [e1]Fabio Massacci, Samuel T. Redwine Jr., Nicola Zannone:
Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings. Lecture Notes in Computer Science 5429, Springer 2009, ISBN 978-3-642-00198-7 [contents] - 2008
- [j7]Nadzeya Kiyavitskaya, Nicola Zannone:
Requirements model generation to support requirements elicitation: the Secure Tropos experience. Autom. Softw. Eng. 15(2): 149-173 (2008) - [j6]Yudistira Asnar, Paolo Giorgini, Paolo Ciancarini, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone:
An evaluation of business solutions in manufacturing enterprises. Int. J. Bus. Intell. Data Min. 3(3): 305-329 (2008) - [c25]Yudistira Asnar, Rocco Moretti, Maurizio Sebastianis, Nicola Zannone:
Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach. ARES 2008: 1240-1247 - [c24]Yudistira Asnar, Nicola Zannone:
Perceived risk assessment. QoP 2008: 59-64 - [c23]Davide Prandi, Paola Quaglia, Nicola Zannone:
Formal Analysis of BPMN Via a Translation into COWS. COORDINATION 2008: 249-263 - [c22]Jordi Cabot, Nicola Zannone:
Towards an Integrated Framework for Model-Driven Security Engineering. MODSEC@MoDELS 2008 - [c21]Fabio Massacci, Nicola Zannone:
A Model-Driven Approach for the Specification and Analysis of Access Control Policies. OTM Conferences (2) 2008: 1087-1103 - [c20]Nadzeya Kiyavitskaya, Alzbeta Krausová, Nicola Zannone:
Why Eliciting and Managing Legal Requirements Is Hard. RELAW 2008: 26-30 - [c19]Pierre Busnel, Paul El Khoury, Keqin Li, Ayda Saïdane, Nicola Zannone:
S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System. STM@IFIPTM 2008: 27-39 - 2007
- [j5]Fabio Massacci, John Mylopoulos, Nicola Zannone:
Computer-aided Support for Secure Tropos. Autom. Softw. Eng. 14(3): 341-364 (2007) - [j4]Fabio Massacci, John Mylopoulos, Nicola Zannone:
From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach. Int. J. Softw. Eng. Knowl. Eng. 17(2): 265-284 (2007) - [c18]Yudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone:
From Trust to Dependability through Risk Analysis. ARES 2007: 19-26 - [c17]Yudistira Asnar, Paolo Giorgini, Nicola Zannone:
Reasoning About Risk in Agent's Deliberation Process: A Jadex Implementation. AOSE 2007: 118-131 - [c16]Volha Bryl, Paola Mello, Marco Montali, Paolo Torroni, Nicola Zannone:
-Tropos. CLIMA 2007: 157-176 - [c15]Luca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone:
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ICAIL 2007: 149-153 - [c14]Hugo A. López, Fabio Massacci, Nicola Zannone:
Goal-Equivalent Secure Business Process Re-engineering. ICSOC Workshops 2007: 212-223 - 2006
- [j3]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone:
Requirements engineering for trust management: model, methodology, and reasoning. Int. J. Inf. Sec. 5(4): 257-274 (2006) - [j2]Fabio Massacci, John Mylopoulos, Nicola Zannone:
Hierarchical hippocratic databases with minimal disclosure for virtual organizations. VLDB J. 15(4): 370-387 (2006) - [c13]Volha Bryl, Fabio Massacci, John Mylopoulos, Nicola Zannone:
Designing Security Requirements Models Through Planning. CAiSE 2006: 33-47 - [c12]Nicola Zannone, Sushil Jajodia, Duminda Wijesekera:
Creating Objects in the Flexible Authorization Framework. DBSec 2006: 1-14 - [c11]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone:
Detecting Conflicts of Interest. RE 2006: 308-311 - 2005
- [j1]Fabio Massacci, Marco Prest, Nicola Zannone:
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. Comput. Stand. Interfaces 27(5): 445-455 (2005) - [c10]Fabio Massacci, John Mylopoulos, Nicola Zannone:
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. ESORICS 2005: 438-454 - [c9]Paolo Giorgini, Fabio Massacci, Nicola Zannone:
Security and Trust Requirements Engineering. FOSAD 2005: 237-272 - [c8]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone:
Modeling Social and Individual Trust in Requirements Engineering Methodologies. iTrust 2005: 161-176 - [c7]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Alberto Siena, Nicola Zannone:
ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. iTrust 2005: 415-419 - [c6]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone:
Modeling Security Requirements Through Ownership, Permission and Delegation. RE 2005: 167-176 - [c5]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone:
ST-Tool: A CASE Tool for Security Requirements Engineering. RE 2005: 451-452 - [c4]Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera:
Maintaining privacy on derived objects. WPES 2005: 10-19 - 2004
- [c3]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone:
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. EuroPKI 2004: 98-111 - [c2]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone:
Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning. iTrust 2004: 176-190 - [c1]Fabio Massacci, Nicola Zannone:
Privacy Is Linking Permission to Purpose. Security Protocols Workshop 2004: 179-191
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint