Author: Paolo Giorgini

Publication Overview

Publication period start: 2003
Number of co-authors: 15

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Blanzieri, Enrico, Giorgini, Paolo, Massa, Paolo, Recla, Sabrina (2001): Information Access in Implicit Culture Framework. In: Proceedings of the 2001 ACM CIKM International Conference on Information and Knowledge Management November 5-10, 2001, Atlanta, Georgia, USA. pp. 565-567. https://
Dragoni, Aldo Franco, Giorgini, Paolo, Puliti, Paolo (1997): Distributed Knowledge Revision/Integration. In: Golshani, Forouzan, Makki, Kia (eds.) Proceedings of the Sixth International Conference on Information and Knowledge Management CIKM97 November 10-14, 1997, Las Vegas, Nevada. pp. 121-127. https://doi.acm.org/10.1145/266714.266879
Giorgini, Paolo, Massacci, Fabio, Mylopoulos, John, Zannone, Nicola (2005): Modeling Security Requirements Through Ownership, Permission and Delegation. In: 13th IEEE International Conference on Requirements Engineering RE 2005 29 August - 2 September, 2005, Paris, France. pp. 167-176. https://doi.ieeecomputersociety.org/10.1109/RE.2005.43
Giorgini, Paolo, Massacci, Fabio, Mylopoulos, John, Zannone, Nicola (2005): ST-Tool: A CASE Tool for Security Requirements Engineering. In: 13th IEEE International Conference on Requirements Engineering RE 2005 29 August - 2 September, 2005, Paris, France. pp. 451-452. https://doi.ieeecomputersociety.org/10.1109/RE.2005.67
Giorgini, Paolo, Massacci, Fabio, Mylopoulos, John, Zannone, Nicola (2006): Detecting Conflicts of Interest. In: 14th IEEE International Conference on Requirements Engineering RE 2006 11-15 September, 2006, Minneapolis/St.Paul, Minnesota, USA. pp. 308-311. https://doi.ieeecomputersociety.org/10.1109/RE.2006.16
Asnar, Yudistira, Giorgini, Paolo, Bonato, Roberto, Meduri, Valentino, Riccucci, Carlo (2007): Secure and Dependable Patterns in Organizations: An Empirical Approach. In: 15th IEEE International Requirements Engineering Conference RE 2007 October 15-19th, 2007, New Delhi, India. pp. 287-292. https://dx.doi.org/10.1109/RE.2007.19
Mouratidis, Haralambos, Giorgini, Paolo, Manson, Gordon A. (2004): Using Security Attack Scenarios to Analyse Security During Information Systems Design. In: ICEIS 2004 , 2004, . pp. 10-17.
Mouratidis, Haralambos, Manson, Gordon A., Gani, Abdullah, Giorgini, Paolo (2003): Analysing Security Requirements of Information Systems Using Tropos. In: ICEIS 2003 , 2003, . pp. 623-626.
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Get one powerful email each week, like 326,052 others.

Learn to design a life you love.

Next email in
6
days
10
hrs
30
mins
36
secs