Author: Paolo Giorgini
Publications
Co-authors
Productive Colleagues
Publications
Blanzieri, Enrico, Giorgini, Paolo, Massa, Paolo, Recla, Sabrina (2001): Information Access in Implicit Culture Framework. In: Proceedings of the 2001 ACM CIKM International Conference on Information and Knowledge Management November 5-10, 2001, Atlanta, Georgia, USA. pp. 565-567. https://
Dragoni, Aldo Franco, Giorgini, Paolo, Puliti, Paolo (1997): Distributed Knowledge Revision/Integration. In: Golshani, Forouzan, Makki, Kia (eds.) Proceedings of the Sixth International Conference on Information and Knowledge Management CIKM97 November 10-14, 1997, Las Vegas, Nevada. pp. 121-127. https://doi.acm.org/10.1145/266714.266879
Giorgini, Paolo, Massacci, Fabio, Mylopoulos, John, Zannone, Nicola (2005): Modeling Security Requirements Through Ownership, Permission and Delegation. In: 13th IEEE International Conference on Requirements Engineering RE 2005 29 August - 2 September, 2005, Paris, France. pp. 167-176. https://doi.ieeecomputersociety.org/10.1109/RE.2005.43
Giorgini, Paolo, Massacci, Fabio, Mylopoulos, John, Zannone, Nicola (2005): ST-Tool: A CASE Tool for Security Requirements Engineering. In: 13th IEEE International Conference on Requirements Engineering RE 2005 29 August - 2 September, 2005, Paris, France. pp. 451-452. https://doi.ieeecomputersociety.org/10.1109/RE.2005.67
Giorgini, Paolo, Massacci, Fabio, Mylopoulos, John, Zannone, Nicola (2006): Detecting Conflicts of Interest. In: 14th IEEE International Conference on Requirements Engineering RE 2006 11-15 September, 2006, Minneapolis/St.Paul, Minnesota, USA. pp. 308-311. https://doi.ieeecomputersociety.org/10.1109/RE.2006.16
Asnar, Yudistira, Giorgini, Paolo, Bonato, Roberto, Meduri, Valentino, Riccucci, Carlo (2007): Secure and Dependable Patterns in Organizations: An Empirical Approach. In: 15th IEEE International Requirements Engineering Conference RE 2007 October 15-19th, 2007, New Delhi, India. pp. 287-292. https://dx.doi.org/10.1109/RE.2007.19
Mouratidis, Haralambos, Giorgini, Paolo, Manson, Gordon A. (2004): Using Security Attack Scenarios to Analyse Security During Information Systems Design. In: ICEIS 2004 , 2004, . pp. 10-17.
Mouratidis, Haralambos, Manson, Gordon A., Gani, Abdullah, Giorgini, Paolo (2003): Analysing Security Requirements of Information Systems Using Tropos. In: ICEIS 2003 , 2003, . pp. 623-626.