If you made any changes in Pure these will be visible here soon.

Research Output 2003 2020

Filter
Article
2019
1 Citation (Scopus)

Access control in Internet-of-Things: a survey

Ravidas, S., Lekidis, A., Paci, F. & Zannone, N., 15 Oct 2019, In : Journal of Network and Computer Applications. 144, p. 79-101 23 p.

Research output: Contribution to journalArticleAcademicpeer-review

Access control
Internet of things
Ecosystems
Industry
7 Downloads (Pure)

A framework for the extended evaluation of ABAC policies

Morisset, C., Willemse, T. A. C. & Zannone, N., 2019, In : Cybersecurity. 2, 1, 21 p., 6.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Access control
Binary decision diagrams
Data structures
2 Downloads (Pure)

Discovering reliable evidence of data misuse by exploiting rule redundancy

Genga, L., Zannone, N. & Squicciarini, A., 1 Nov 2019, In : Computers and Security. 87, 17 p., 101577.

Research output: Contribution to journalArticleAcademicpeer-review

Association rules
redundancy
Transparency
Redundancy
Decision making
2018
4 Citations (Scopus)
31 Downloads (Pure)

Discovering anomalous frequent patterns from partially ordered event logs

Genga, L., Alizadeh, M., Potena, D., Diamantini, C. & Zannone, N., 1 Oct 2018, In : Journal of Intelligent Information Systems. 51, 2, p. 257–300 44 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Flow control
12 Citations (Scopus)

Linking data and process perspectives for conformance analysis

Alizadeh, M., Lu, X., Fahland, D., Zannone, N. & van der Aalst, W. M. P., Mar 2018, In : Computers and Security. 73, p. 172-193

Research output: Contribution to journalArticleAcademicpeer-review

Flow control
auditing
Industry
incident
Experiments
2017
14 Citations (Scopus)
2 Downloads (Pure)

Formal analysis of XACML policies using SMT

Turkmen, F., den Hartog, J., Ranise, S. & Zannone, N., 1 May 2017, In : Computers and Security. 66, p. 185-203 19 p.

Research output: Contribution to journalArticleAcademicpeer-review

Access control
Markup languages
Query languages
XML
Specifications
2016
2 Citations (Scopus)

A severity-based quantification of data leakages in database systems

Vavilis, S., Petkovic, M. & Zannone, N., 1 Jun 2016, In : Journal of Computer Security. 24, 3, p. 321-345 25 p.

Research output: Contribution to journalArticleAcademicpeer-review

Data structures
Leakage (fluid)
Specifications
8 Citations (Scopus)
77 Downloads (Pure)

Flow-based reputation with uncertainty: evidence-based subjective logic

Skoric, B., Hoogh, de, S. J. A. & Zannone, N., Aug 2016, In : International Journal of Information Security. 15, 4, p. 381-402 22 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Algebra
Uncertainty
Statistical Models
2015
7 Citations (Scopus)
5 Downloads (Pure)

An anomaly analysis framework for database systems

Vavilis, S., Egner, A. I., Petkovic, M. & Zannone, N., 2015, In : Computers and Security. 53, p. 156-173 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

incident
ranking
Risk assessment
Visualization
Monitoring
3 Citations (Scopus)

Conviviality-driven access control policy

El Kateb, D., Zannone, N., Moawad, A., Caire, P., Nain, G., Mouelhi, T. & Le Traon, Y., 22 Nov 2015, In : Requirements Engineering. 20, 4, p. 363-382 20 p.

Research output: Contribution to journalArticleAcademicpeer-review

Access control
Social sciences
Multi agent systems
13 Citations (Scopus)
13 Downloads (Pure)

SAFAX: an extensible authorization service for cloud environments

Kaluvuri, S. P., Egner, A. I., Den Hartog, J. I. & Zannone, N., 2015, In : Frontiers in ICT. 2, 15 p., 9.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Access control
2014
39 Citations (Scopus)
3 Downloads (Pure)

A reference model for reputation systems

Vavilis, S., Petkovic, M. & Zannone, N., 2014, In : Decision Support Systems. 61, 1, p. 147-154 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

Systems Analysis
Technology
Reference model
Reputation system
Surveys and Questionnaires
4 Citations (Scopus)
2 Downloads (Pure)

Data minimisation in communication protocols : a formal analysis framework and application to identity management

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2014, In : International Journal of Information Security. 13, 6, p. 529-569 41 p.

Research output: Contribution to journalArticleAcademicpeer-review

Network protocols
Data privacy
Reusability
Authentication
Internet
13 Citations (Scopus)
2 Downloads (Pure)

GEM : a distributed goal evaluation algorithm for trust management

Trivellato, D., Zannone, N. & Etalle, S., 2014, In : Theory and Practice of Logic Programming. 14, 3, p. 293-337 45 p.

Research output: Contribution to journalArticleAcademicpeer-review

Air cushion vehicles
Trust Management
Evaluation
Confidentiality
Termination
1 Citation (Scopus)
60 Downloads (Pure)

Understanding computer security

Etalle, S. & Zannone, N., 1 Jan 2014, In : Frontiers in ICT. 1, 3, p. 1-2 2 p., 3.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Monitoring
Accountability
Privacy
Economics
Computer security
2013
17 Citations (Scopus)
2 Downloads (Pure)

A semantic security framework for systems of systems

Trivellato, D., Zannone, N., Glaundrup, M., Skowronek, J. & Etalle, S., 2013, In : International Journal of Cooperative Information Systems. 22, 1, p. 1350004/1-35

Research output: Contribution to journalArticleAcademicpeer-review

Semantics
Interoperability
Ontology
Access control
Scalability
104 Downloads (Pure)

Controlling break-the-glass through alignment

Adriansyah, A., Dongen, van, B. F. & Zannone, N., 2013, In : Advanced Science Express. 2, 4, p. 198-212 15 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Glass
Specifications
68 Downloads (Pure)

Privacy analysis of user behavior using alignments

Adriansyah, A., Dongen, van, B. F. & Zannone, N., 2013, In : IT - Information Technology. 55, 6, p. 255-260 6 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Industry
Data privacy
Access control
Information systems
4 Citations (Scopus)

Privacy-aware web service composition and ranking

Costante, E., Paci, F. & Zannone, N., 1 Jul 2013, In : International Journal of Web Services Research. 10, 3, p. 1-23 23 p.

Research output: Contribution to journalArticleAcademicpeer-review

Web services
Chemical analysis
Quality of service
Throughput
Internet
5 Citations (Scopus)
89 Downloads (Pure)

Requirements engineering within a large-scale security-oriented research project : lessons learned

Gürses, S., Seguran, M. & Zannone, N., 2013, In : Requirements Engineering. 18, 1, p. 43-66

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Requirements engineering
Software engineering
2012
5 Citations (Scopus)
3 Downloads (Pure)

Flow-based reputation : more than just ranking

Simone, A., Skoric, B. & Zannone, N., 2012, In : International Journal of Information Technology and Decision Making. 11, 3, p. 551-578

Research output: Contribution to journalArticleAcademicpeer-review

2011
8 Citations (Scopus)
3 Downloads (Pure)

Engineering and verifying agent-oriented requirements augmented by business constraints with B-Tropos

Montali, M., Torroni, P., Zannone, N., Mello, P. & Bryl, V., 2011, In : Autonomous Agents and Multi-Agent Systems. 23, 2, p. 193-223 31 p.

Research output: Contribution to journalArticleAcademicpeer-review

Formal logic
Systems engineering
Industry
2 Downloads (Pure)

Organizational patterns for security and dependability : from design to application

Asnar, Y., Massacci, F., Saidane, A., Riccucci, C., Felici, M., Tedeschi, A., El Khoury, P., Li, K., Seguran, M. & Zannone, N., 2011, In : International Journal of Secure Software Engineering. 2, 3, p. 1-22

Research output: Contribution to journalArticleAcademicpeer-review

Social aspects
Industry
2010
17 Citations (Scopus)
184 Downloads (Pure)

A flexible architecture for privacy-aware trust management

Böhm, K., Etalle, S., Hartog, den, J. I., Hütter, C., Trabelsi, S., Trivellato, D. & Zannone, N., 2010, In : Journal of Theoretical and Applied Electronic Commerce Research. 5, 2, p. 77-96

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Privacy
Trust management
Management system
Factors
Authorization
63 Citations (Scopus)
2 Downloads (Pure)

A vulnerability-centric requirements engineering framework : Analyzing security attacks, countermeasures, and requirements based on vulnerabilities

Elahi, G., Yu, E. & Zannone, N., 2010, In : Requirements Engineering. 15, 1, p. 41-62

Research output: Contribution to journalArticleAcademicpeer-review

Requirements engineering
2009
33 Citations (Scopus)
2 Downloads (Pure)

How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns

Compagna, L., El Khoury, P., Krausová, A., Massacci, F. & Zannone, N., 2009, In : Artificial Intelligence and Law. 17, 1, p. 1-30

Research output: Contribution to journalArticleAcademicpeer-review

Requirements engineering
privacy
engineering
methodology
Health care
3 Citations (Scopus)
5 Downloads (Pure)

The SI* Modeling Framework: metamodel and applications

Zannone, N., 2009, In : International Journal of Software Engineering and Knowledge Engineering. 19, 5, p. 727-746

Research output: Contribution to journalArticleAcademicpeer-review

Requirements engineering
Modeling languages
Industry
79 Citations (Scopus)
2 Downloads (Pure)

Towards the development of privacy-aware systems

Guarda, P. & Zannone, N., 2009, In : Information and Software Technology. 51, 2, p. 337-350 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

Data privacy
Economics
Processing
2008
3 Citations (Scopus)

An evaluation of business solutions in manufacturing enterprises

Asnar, Y., Giorgini, P., Ciancarini, P., Moretti, R., Sebastianis, M. & Zannone, N., 2008, In : International Journal of Business Intelligence and Data Mining. 3, 3, p. 305-329

Research output: Contribution to journalArticleAcademicpeer-review

Manufacturing
Evaluation
Industry
Likelihood
Metric
12 Citations (Scopus)
2 Downloads (Pure)

Requirements model generation to support requirements elicitation: The Secure Tropos experience

Kiyavitskaya, N. & Zannone, N., 2008, In : Automated Software Engineering. 15, 2, p. 149-173

Research output: Contribution to journalArticleAcademicpeer-review

Specifications
Requirements engineering
Semantics
Industry
2007
28 Citations (Scopus)
2 Downloads (Pure)

Computer-aided support for Secure Tropos

Massacci, F., Mylopoulos, J. & Zannone, N., 2007, In : Automated Software Engineering. 14, 3, p. 341-364

Research output: Contribution to journalArticleAcademicpeer-review

Requirements engineering
Scalability
Specifications
Formal specification
7 Citations (Scopus)

From Hippocratic databases to secure tropos : a computer-aided re-engineering approach

Massacci, F., Mylopoulos, J. & Zannone, N., 2007, In : International Journal of Software Engineering and Knowledge Engineering. 17, 2, p. 265-284

Research output: Contribution to journalArticleAcademicpeer-review

Data privacy
Access control
2006
31 Citations (Scopus)
2 Downloads (Pure)

Hierarchical Hippocratic databases with minimal disclosure for virtual organizations

Massacci, F., Mylopoulos, J. & Zannone, N., 2006, In : The VLDB Journal. 15, 4, p. 370-387

Research output: Contribution to journalArticleAcademicpeer-review

Industry
Access control
Marketing
66 Citations (Scopus)
2 Downloads (Pure)

Requirements engineering for trust management: Model, methodology, and reasoning

Giorgini, P., Massacci, F., Mylopoulos, J. & Zannone, N., 2006, In : International Journal of Information Security. 5, 4, p. 257-274

Research output: Contribution to journalArticleAcademicpeer-review

Requirements engineering
Software engineering
Health care
Concretes
2005
61 Citations (Scopus)
2 Downloads (Pure)

Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation

Massacci, F., Prest, M. & Zannone, N., 2005, In : Computer Standards & Interfaces. 27, 5, p. 445-455

Research output: Contribution to journalArticleAcademicpeer-review

data protection
Data privacy
Requirements engineering
legislation
engineering