Modeling security requirements through ownership, permission and delegation P Giorgini, F Massacci, J Mylopoulos, N Zannone 13th IEEE International Conference on Requirements Engineering (RE'05), 167-176, 2005 | 288 | 2005 |
Access control in Internet-of-Things: A survey S Ravidas, A Lekidis, F Paci, N Zannone Journal of Network and Computer Applications 144, 79-101, 2019 | 170 | 2019 |
Towards the development of privacy-aware systems P Guarda, N Zannone Information and Software Technology 51 (2), 337-350, 2009 | 170 | 2009 |
A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities G Elahi, E Yu, N Zannone Requirements engineering 15, 41-62, 2010 | 147 | 2010 |
Requirements engineering meets trust management P Giorgini, F Massacci, J Mylopoulos, N Zannone Trust Management, 176-190, 2004 | 146* | 2004 |
Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation F Massacci, M Prest, N Zannone Computer Standards & Interfaces 27 (5), 445-455, 2005 | 126 | 2005 |
Requirements engineering for trust management: model, methodology, and reasoning P Giorgini, F Massacci, J Mylopoulos, N Zannone International Journal of Information Security 5, 257-274, 2006 | 116 | 2006 |
Security and privacy for innovative automotive applications: A survey VH Le, J den Hartog, N Zannone Computer Communications 132, 17-41, 2018 | 114 | 2018 |
A reference model for reputation systems S Vavilis, M Petković, N Zannone Decision Support Systems 61, 147-154, 2014 | 107 | 2014 |
Security and trust requirements engineering, P Giorgini, F Massacci, N Zannone Foundations of Security Analysis and Design III: FOSAD 2004/2005 tutorial …, 2005 | 107 | 2005 |
Survey on access control for community-centered collaborative systems F Paci, A Squicciarini, N Zannone ACM Computing Surveys (CSUR) 51 (1), 1-38, 2018 | 103 | 2018 |
From trust to dependability through risk analysis Y Asnar, P Giorgini, F Massacci, N Zannone The Second International Conference on Availability, Reliability and …, 2007 | 92 | 2007 |
Modelling security and trust with secure tropos P Giorgini, H Mouratidis, N Zannone Integrating Security and Software Engineering: Advances and Future Visions …, 2007 | 84 | 2007 |
A modeling ontology for integrating vulnerabilities into security requirements conceptual foundations G Elahi, E Yu, N Zannone International Conference on Conceptual Modeling, 99-114, 2009 | 76 | 2009 |
Analysis of XACML policies with SMT F Turkmen, J Den Hartog, S Ranise, N Zannone Principles of Security and Trust: 4th International Conference, POST 2015 …, 2015 | 74 | 2015 |
Formal analysis of BPMN via a translation into COWS D Prandi, P Quaglia, N Zannone International Conference on Coordination Languages and Models, 249-263, 2008 | 72 | 2008 |
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns L Compagna, P El Khoury, A Krausová, F Massacci, N Zannone Artificial Intelligence and Law 17 (1), 1-30, 2009 | 71 | 2009 |
A survey on multi-factor authentication for online banking in the wild F Sinigaglia, R Carbone, G Costa, N Zannone Computers & Security 95, 101745, 2020 | 70 | 2020 |
Linking data and process perspectives for conformance analysis M Alizadeh, X Lu, D Fahland, N Zannone, WMP van der Aalst Computers & Security 73, 172-193, 2018 | 65 | 2018 |
Privacy-aware web service composition and ranking E Costante, F Paci, N Zannone 2013 IEEE 20th International Conference on Web Services, 131-138, 2013 | 63 | 2013 |