Author: Paolo Giorgini
Publication Overview
Publication period start: 2003
Number of co-authors: 15
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Blanzieri,
Enrico,
Giorgini,
Paolo,
Massa,
Paolo,
Recla,
Sabrina
(2001):
Information Access in Implicit Culture Framework.
In:
Proceedings of the 2001 ACM CIKM International Conference on Information and Knowledge Management
November 5-10,
2001,
Atlanta, Georgia, USA.
pp. 565-567.
https://
Dragoni,
Aldo Franco,
Giorgini,
Paolo,
Puliti,
Paolo
(1997):
Distributed Knowledge Revision/Integration.
In:
Golshani,
Forouzan,
Makki,
Kia
(eds.)
Proceedings of the Sixth International Conference on Information and Knowledge Management CIKM97
November 10-14,
1997,
Las Vegas, Nevada.
pp. 121-127.
https://doi.acm.org/10.1145/266714.266879
Giorgini,
Paolo,
Massacci,
Fabio,
Mylopoulos,
John,
Zannone,
Nicola
(2005):
Modeling Security Requirements Through Ownership, Permission and Delegation.
In:
13th IEEE International Conference on Requirements Engineering RE 2005
29 August - 2 September,
2005,
Paris, France.
pp. 167-176.
https://doi.ieeecomputersociety.org/10.1109/RE.2005.43
Giorgini,
Paolo,
Massacci,
Fabio,
Mylopoulos,
John,
Zannone,
Nicola
(2005):
ST-Tool: A CASE Tool for Security Requirements Engineering.
In:
13th IEEE International Conference on Requirements Engineering RE 2005
29 August - 2 September,
2005,
Paris, France.
pp. 451-452.
https://doi.ieeecomputersociety.org/10.1109/RE.2005.67
Giorgini,
Paolo,
Massacci,
Fabio,
Mylopoulos,
John,
Zannone,
Nicola
(2006):
Detecting Conflicts of Interest.
In:
14th IEEE International Conference on Requirements Engineering RE 2006
11-15 September,
2006,
Minneapolis/St.Paul, Minnesota, USA.
pp. 308-311.
https://doi.ieeecomputersociety.org/10.1109/RE.2006.16
Asnar,
Yudistira,
Giorgini,
Paolo,
Bonato,
Roberto,
Meduri,
Valentino,
Riccucci,
Carlo
(2007):
Secure and Dependable Patterns in Organizations: An Empirical Approach.
In:
15th IEEE International Requirements Engineering Conference RE 2007
October 15-19th,
2007,
New Delhi, India.
pp. 287-292.
https://dx.doi.org/10.1109/RE.2007.19
Mouratidis,
Haralambos,
Giorgini,
Paolo,
Manson,
Gordon A.
(2004):
Using Security Attack Scenarios to Analyse Security During Information Systems Design.
In:
ICEIS 2004
,
2004,
.
pp. 10-17.
Mouratidis,
Haralambos,
Manson,
Gordon A.,
Gani,
Abdullah,
Giorgini,
Paolo
(2003):
Analysing Security Requirements of Information Systems Using Tropos.
In:
ICEIS 2003
,
2003,
.
pp. 623-626.