Author: Paolo Giorgini

Publications

Publication period start: 2003
Number of co-authors: 15

Co-authors

Number of publications with favourite co-authors
Fabio Massacci
3
John Mylopoulos
3
Nicola Zannone
3

Productive Colleagues

Most productive colleagues in number of publications
Haralambos Mouratidis
4
Paolo Massa
6
John Mylopoulos
42

Publications

Blanzieri, Enrico, Giorgini, Paolo, Massa, Paolo, Recla, Sabrina (2001): Information Access in Implicit Culture Framework. In: Proceedings of the 2001 ACM CIKM International Conference on Information and Knowledge Management November 5-10, 2001, Atlanta, Georgia, USA. pp. 565-567. https://

Dragoni, Aldo Franco, Giorgini, Paolo, Puliti, Paolo (1997): Distributed Knowledge Revision/Integration. In: Golshani, Forouzan, Makki, Kia (eds.) Proceedings of the Sixth International Conference on Information and Knowledge Management CIKM97 November 10-14, 1997, Las Vegas, Nevada. pp. 121-127. https://doi.acm.org/10.1145/266714.266879

Giorgini, Paolo, Massacci, Fabio, Mylopoulos, John, Zannone, Nicola (2005): Modeling Security Requirements Through Ownership, Permission and Delegation. In: 13th IEEE International Conference on Requirements Engineering RE 2005 29 August - 2 September, 2005, Paris, France. pp. 167-176. https://doi.ieeecomputersociety.org/10.1109/RE.2005.43

Giorgini, Paolo, Massacci, Fabio, Mylopoulos, John, Zannone, Nicola (2005): ST-Tool: A CASE Tool for Security Requirements Engineering. In: 13th IEEE International Conference on Requirements Engineering RE 2005 29 August - 2 September, 2005, Paris, France. pp. 451-452. https://doi.ieeecomputersociety.org/10.1109/RE.2005.67

Giorgini, Paolo, Massacci, Fabio, Mylopoulos, John, Zannone, Nicola (2006): Detecting Conflicts of Interest. In: 14th IEEE International Conference on Requirements Engineering RE 2006 11-15 September, 2006, Minneapolis/St.Paul, Minnesota, USA. pp. 308-311. https://doi.ieeecomputersociety.org/10.1109/RE.2006.16

Asnar, Yudistira, Giorgini, Paolo, Bonato, Roberto, Meduri, Valentino, Riccucci, Carlo (2007): Secure and Dependable Patterns in Organizations: An Empirical Approach. In: 15th IEEE International Requirements Engineering Conference RE 2007 October 15-19th, 2007, New Delhi, India. pp. 287-292. https://dx.doi.org/10.1109/RE.2007.19

Mouratidis, Haralambos, Giorgini, Paolo, Manson, Gordon A. (2004): Using Security Attack Scenarios to Analyse Security During Information Systems Design. In: ICEIS 2004 , 2004, . pp. 10-17.

Mouratidis, Haralambos, Manson, Gordon A., Gani, Abdullah, Giorgini, Paolo (2003): Analysing Security Requirements of Information Systems Using Tropos. In: ICEIS 2003 , 2003, . pp. 623-626.

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,781 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,781 designers enjoy our newsletter—sure you don’t want to receive it?