Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Nicola Zannone
@article{DBLP:journals/tochi/BurdaAZ24, author = {Pavlo Burda and Luca Allodi and Nicola Zannone}, title = {Cognition in Social Engineering Empirical Research: {A} Systematic Literature Review}, journal = {{ACM} Trans. Comput. Hum. Interact.}, volume = {31}, number = {2}, pages = {19:1--19:55}, year = {2024}, url = {https://doi.org/10.1145/3635149}, doi = {10.1145/3635149}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tochi/BurdaAZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PaciPZ23, author = {Federica Paci and Jacopo Pizzoli and Nicola Zannone}, title = {A Comprehensive Study on Third-Party User Tracking in Mobile Applications}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {97:1--97:8}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605079}, doi = {10.1145/3600160.3605079}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PaciPZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LuccheseLMPZF23, author = {Marco Lucchese and Francesco Lupia and Massimo Merro and Federica Paci and Nicola Zannone and Angelo Furfaro}, title = {HoneyICS: {A} High-interaction Physics-aware Honeynet for Industrial Control Systems}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {113:1--113:10}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3604984}, doi = {10.1145/3600160.3604984}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/LuccheseLMPZF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CozzaPLMZ23, author = {Vittoria Cozza and Mila Dalla Preda and Marco Lucchese and Massimo Merro and Nicola Zannone}, title = {Towards Obfuscation of Programmable Logic Controllers}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {121:1--121:10}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605081}, doi = {10.1145/3600160.3605081}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CozzaPLMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MehriWPZ23, author = {Gelareh Hasel Mehri and Inez L. Wester and Federica Paci and Nicola Zannone}, title = {Mitigating Privilege Misuse in Access Control through Anomaly Detection}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {139:1--139:10}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3604988}, doi = {10.1145/3600160.3604988}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MehriWPZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/LupiaLMZ23, author = {Francesco Lupia and Marco Lucchese and Massimo Merro and Nicola Zannone}, editor = {Jingrui He and Themis Palpanas and Xiaohua Hu and Alfredo Cuzzocrea and Dejing Dou and Dominik Slezak and Wei Wang and Aleksandra Gruca and Jerry Chun{-}Wei Lin and Rakesh Agrawal}, title = {{ICS} Honeypot Interactions: {A} Latitudinal Study}, booktitle = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento, Italy, December 15-18, 2023}, pages = {3025--3034}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BigData59044.2023.10386497}, doi = {10.1109/BIGDATA59044.2023.10386497}, timestamp = {Fri, 02 Feb 2024 12:00:39 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/LupiaLMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/MarinBZA23, author = {Ioana Andreea Marin and Pavlo Burda and Nicola Zannone and Luca Allodi}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters and Stefanie Mueller and Julie R. Williamson and Max L. Wilson}, title = {The Influence of Human Factors on the Intention to Report Phishing Emails}, booktitle = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {620:1--620:18}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544548.3580985}, doi = {10.1145/3544548.3580985}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/MarinBZA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BurdaAAZ23, author = {Pavlo Burda and Abdul Malek Altawekji and Luca Allodi and Nicola Zannone}, title = {The Peculiar Case of Tailored Phishing against SMEs: Detection and Collective DefenseMechanisms at a Small {IT} Company}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023 - Workshops, Delft, Netherlands, July 3-7, 2023}, pages = {232--243}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSPW59978.2023.00031}, doi = {10.1109/EUROSPW59978.2023.00031}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/BurdaAAZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/LanotteMZ23, author = {Ruggero Lanotte and Massimo Merro and Nicola Zannone}, editor = {Marieke Huisman and Ant{\'{o}}nio Ravara}, title = {Impact Analysis of Coordinated Cyber-Physical Attacks via Statistical Model Checking: {A} Case Study}, booktitle = {Formal Techniques for Distributed Objects, Components, and Systems - 43rd {IFIP} {WG} 6.1 International Conference, {FORTE} 2023, Held as Part of the 18th International Federated Conference on Distributed Computing Techniques, DisCoTec 2023, Lisbon, Portugal, June 19-23, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13910}, pages = {75--94}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35355-0\_6}, doi = {10.1007/978-3-031-35355-0\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/forte/LanotteMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msr/MohayejiACZS23, author = {Hamid Mohayeji and Andrei Agaronian and Eleni Constantinou and Nicola Zannone and Alexander Serebrenik}, title = {Investigating the Resolution of Vulnerable Dependencies with Dependabot Security Updates}, booktitle = {20th {IEEE/ACM} International Conference on Mining Software Repositories, {MSR} 2023, Melbourne, Australia, May 15-16, 2023}, pages = {234--246}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MSR59073.2023.00042}, doi = {10.1109/MSR59073.2023.00042}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msr/MohayejiACZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/LuccheseMPZ23, author = {Marco Lucchese and Massimo Merro and Federica Paci and Nicola Zannone}, editor = {Jiman Hong and Maart Lanperne and Juw Won Park and Tom{\'{a}}s Cern{\'{y}} and Hossain Shahriar}, title = {Towards {A} High-interaction Physics-aware Honeynet for Industrial Control Systems}, booktitle = {Proceedings of the 38th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2023, Tallinn, Estonia, March 27-31, 2023}, pages = {76--79}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3555776.3577803}, doi = {10.1145/3555776.3577803}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/LuccheseMPZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/GeorgeSZ23, author = {Dominik Roy George and Savio Sciancalepore and Nicola Zannone}, editor = {Silvio Ranise and Roberto Carbone and Daniel Takabi}, title = {Privacy-Preserving Multi-Party Access Control for Third-Party {UAV} Services}, booktitle = {Proceedings of the 28th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023}, pages = {19--30}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3589608.3593837}, doi = {10.1145/3589608.3593837}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/GeorgeSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BertolissiAZ23, author = {Clara Bertolissi and Alba Martinez Anton and Nicola Zannone}, editor = {Silvio Ranise and Roberto Carbone and Daniel Takabi}, title = {Data Sharing in Social Networks}, booktitle = {Proceedings of the 28th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023}, pages = {181--192}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3589608.3593833}, doi = {10.1145/3589608.3593833}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/BertolissiAZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sebd/CaruccioDPTZ23, author = {Loredana Caruccio and Domenico Desiato and Giuseppe Polese and Genoveffa Tortora and Nicola Zannone}, editor = {Diego Calvanese and Claudia Diamantini and Guglielmo Faggioli and Nicola Ferro and Stefano Marchesin and Gianmaria Silvello and Letizia Tanca}, title = {An Approach to Trade-off Privacy and Classification Accuracy in Machine Learning Processes}, booktitle = {Proceedings of the 31st Symposium of Advanced Database Systems, Galzingano Terme, Italy, July 2nd to 5th, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3478}, pages = {420--429}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3478/paper72.pdf}, timestamp = {Wed, 13 Sep 2023 16:08:43 +0200}, biburl = {https://dblp.org/rec/conf/sebd/CaruccioDPTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcomp/LukowiczNSPLVZ22, author = {Paul Lukowicz and Anton Nijholt and Kaleem Siddiqi and Marcello Pelillo and Kristof Van Laerhoven and Luca Vigan{\`{o}} and Nicola Zannone}, title = {Editorial: 2021 editors' pick: Computer science}, journal = {Frontiers Comput. Sci.}, volume = {4}, year = {2022}, url = {https://doi.org/10.3389/fcomp.2022.1062066}, doi = {10.3389/FCOMP.2022.1062066}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcomp/LukowiczNSPLVZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AhmadMRZ22, author = {Tahir Ahmad and Umberto Morelli and Silvio Ranise and Nicola Zannone}, title = {Extending access control in {AWS} IoT through event-driven functions: an experimental evaluation using a smart lock system}, journal = {Int. J. Inf. Sec.}, volume = {21}, number = {2}, pages = {379--408}, year = {2022}, url = {https://doi.org/10.1007/s10207-021-00558-3}, doi = {10.1007/S10207-021-00558-3}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AhmadMRZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/CaruccioDPTZ22, author = {Loredana Caruccio and Domenico Desiato and Giuseppe Polese and Genoveffa Tortora and Nicola Zannone}, title = {A decision-support framework for data anonymization with application to machine learning processes}, journal = {Inf. Sci.}, volume = {613}, pages = {1--32}, year = {2022}, url = {https://doi.org/10.1016/j.ins.2022.09.004}, doi = {10.1016/J.INS.2022.09.004}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/CaruccioDPTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/GengaAZ22, author = {Laura Genga and Luca Allodi and Nicola Zannone}, title = {Association Rule Mining Meets Regression Analysis: An Automated Approach to Unveil Systematic Biases in Decision-Making Processes}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {1}, pages = {191--219}, year = {2022}, url = {https://doi.org/10.3390/jcp2010011}, doi = {10.3390/JCP2010011}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/GengaAZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ClarkY0Z22, author = {Stanley Clark and Nikolay Yakovets and George Fletcher and Nicola Zannone}, editor = {Shamik Sural and Haibing Lu}, title = {ReLOG: {A} Unified Framework for Relationship-Based Access Control over Graph Databases}, booktitle = {Data and Applications Security and Privacy {XXXVI} - 36th Annual {IFIP} {WG} 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13383}, pages = {303--315}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-10684-2\_17}, doi = {10.1007/978-3-031-10684-2\_17}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ClarkY0Z22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KerstenBAZ22, author = {Leon Kersten and Pavlo Burda and Luca Allodi and Nicola Zannone}, title = {Investigating the Effect of Phishing Believability on Phishing Reporting}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022 - Workshops, Genoa, Italy, June 6-10, 2022}, pages = {117--128}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSPW55150.2022.00018}, doi = {10.1109/EUROSPW55150.2022.00018}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/KerstenBAZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/BurdaAZ22, author = {Pavlo Burda and Luca Allodi and Nicola Zannone}, editor = {Guy{-}Vincent Jourdan and Laurent Mounier and Carlisle M. Adams and Florence S{\`{e}}des and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection}, booktitle = {Foundations and Practice of Security - 15th International Symposium, {FPS} 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13877}, pages = {443--452}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-30122-3\_27}, doi = {10.1007/978-3-031-30122-3\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fps/BurdaAZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SciancaleporeZ22, author = {Savio Sciancalepore and Nicola Zannone}, editor = {Jiman Hong and Miroslav Bures and Juw Won Park and Tom{\'{a}}s Cern{\'{y}}}, title = {{PICO:} privacy-preserving access control in IoT scenarios through incomplete information}, booktitle = {{SAC} '22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022}, pages = {147--156}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3477314.3508379}, doi = {10.1145/3477314.3508379}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/SciancaleporeZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ClarkYFZ22, author = {Stanley Clark and Nikolay Yakovets and George H. L. Fletcher and Nicola Zannone}, editor = {Sven Dietrich and Omar Chowdhury and Daniel Takabi}, title = {Poster: {A} Flexible Relationship-Based Access Control Policy Generator}, booktitle = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and Technologies, New York, NY, USA, June 8 - 10, 2022}, pages = {263--265}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3532105.3535032}, doi = {10.1145/3532105.3535032}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ClarkYFZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SheikhalishahiS21, author = {Mina Sheikhalishahi and Ischa Stork and Nicola Zannone}, title = {Privacy-preserving policy evaluation in multi-party access control}, journal = {J. Comput. Secur.}, volume = {29}, number = {6}, pages = {613--650}, year = {2021}, url = {https://doi.org/10.3233/JCS-200007}, doi = {10.3233/JCS-200007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SheikhalishahiS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DooremaalBAZ21, author = {Bram van Dooremaal and Pavlo Burda and Luca Allodi and Nicola Zannone}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {60:1--60:10}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3470112}, doi = {10.1145/3465481.3470112}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/DooremaalBAZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AlishahiZ21, author = {Mina Alishahi and Nicola Zannone}, editor = {Ken Barker and Kambiz Ghazinour}, title = {Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized Datasets}, booktitle = {Data and Applications Security and Privacy {XXXV} - 35th Annual {IFIP} {WG} 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12840}, pages = {237--258}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81242-3\_14}, doi = {10.1007/978-3-030-81242-3\_14}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/AlishahiZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BurdaAZ21, author = {Pavlo Burda and Luca Allodi and Nicola Zannone}, title = {Dissecting Social Engineering Attacks Through the Lenses of Cognition}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {149--160}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSPW54576.2021.00024}, doi = {10.1109/EUROSPW54576.2021.00024}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BurdaAZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Lopuhaa-Zwakenberg21, author = {Milan Lopuha{\"{a}}{-}Zwakenberg and Mina Alishahi and Jeroen Kivits and Jordi Klarenbeek and Gert{-}Jan van der Velde and Nicola Zannone}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Comparing Classifiers' Performance under Differential Privacy}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {50--61}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010519000500061}, doi = {10.5220/0010519000500061}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Lopuhaa-Zwakenberg21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SinigagliaCCZ20, author = {Federico Sinigaglia and Roberto Carbone and Gabriele Costa and Nicola Zannone}, title = {A survey on multi-factor authentication for online banking in the wild}, journal = {Comput. Secur.}, volume = {95}, pages = {101745}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101745}, doi = {10.1016/J.COSE.2020.101745}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SinigagliaCCZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AllodiCPZ20, author = {Luca Allodi and Tzouliano Chotza and Ekaterina Panina and Nicola Zannone}, title = {The Need for New Antiphishing Measures Against Spear-Phishing Attacks}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {2}, pages = {23--34}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2019.2940952}, doi = {10.1109/MSEC.2019.2940952}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AllodiCPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BurdaCAZ20, author = {Pavlo Burda and Tzouliano Chotza and Luca Allodi and Nicola Zannone}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {3:1--3:10}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3409178}, doi = {10.1145/3407023.3409178}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BurdaCAZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/RivaVZ20, author = {Giovanni Maria Riva and Alexandr Vasenev and Nicola Zannone}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {SoK: engineering privacy-aware high-tech systems}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {19:1--19:10}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407061}, doi = {10.1145/3407023.3407061}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/RivaVZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MeijaardCMZ20, author = {Yoram J. Meijaard and Bram C. M. Cappers and Josh G. M. Mengerink and Nicola Zannone}, editor = {Anoop Singhal and Jaideep Vaidya}, title = {Predictive Analytics to Prevent Voice over {IP} International Revenue Sharing Fraud}, booktitle = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP} {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12122}, pages = {241--260}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49669-2\_14}, doi = {10.1007/978-3-030-49669-2\_14}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/MeijaardCMZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PaciBQZ20, author = {Federica Paci and Davide Bianchin and Elisa Quintarelli and Nicola Zannone}, editor = {Andrea Saracino and Paolo Mori}, title = {{IFTTT} Privacy Checker}, booktitle = {Emerging Technologies for Authorization and Authentication - Third International Workshop, {ETAA} 2020, Guildford, UK, September 18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12515}, pages = {90--107}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64455-0\_6}, doi = {10.1007/978-3-030-64455-0\_6}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/PaciBQZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BurdaAZ20, author = {Pavlo Burda and Luca Allodi and Nicola Zannone}, title = {Don't Forget the Human: a Crowdsourced Approach to Automate Response and Containment Against Spear Phishing Attacks}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2020, Genoa, Italy, September 7-11, 2020}, pages = {471--476}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSPW51379.2020.00069}, doi = {10.1109/EUROSPW51379.2020.00069}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BurdaAZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/PiroccaAZ20, author = {Simone Pirocca and Luca Allodi and Nicola Zannone}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {A Toolkit for Security Awareness Training Against Targeted Phishing}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {137--159}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_9}, doi = {10.1007/978-3-030-65610-2\_9}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/PiroccaAZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/RavidasRZ20, author = {Sowmya Ravidas and Indrakshi Ray and Nicola Zannone}, title = {Handling Incomplete Information in Policy Evaluation using Attribute Similarity}, booktitle = {Second {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta, GA, USA, October 28-31, 2020}, pages = {79--88}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TPS-ISA50397.2020.00021}, doi = {10.1109/TPS-ISA50397.2020.00021}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/RavidasRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SheikhalishahiZ20, author = {Mina Sheikhalishahi and Nicola Zannone}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {On the Comparison of Classifiers' Construction over Private Inputs}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {691--698}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00096}, doi = {10.1109/TRUSTCOM50675.2020.00096}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SheikhalishahiZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/SheikhalishahiZ20, author = {Mina Sheikhalishahi and Nicola Zannone}, title = {Privacy Preserving Statistical Detection of Adversarial Instances}, booktitle = {29th {IEEE} International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, {WETICE} 2020, Virtual Event, France, September 10-13, 2020}, pages = {159--164}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/WETICE49692.2020.00039}, doi = {10.1109/WETICE49692.2020.00039}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/SheikhalishahiZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/GengaPCDZ20, author = {Laura Genga and Domenico Potena and Andrea Chiorrini and Claudia Diamantini and Nicola Zannone}, editor = {Annalisa Appice and Michelangelo Ceci and Corrado Loglisci and Giuseppe Manco and Elio Masciari and Zbigniew W. Ras}, title = {A Latitudinal Study on the Use of Sequential and Concurrency Patterns in Deviance Mining}, booktitle = {Complex Pattern Mining - New Challenges, Methods and Applications}, series = {Studies in Computational Intelligence}, volume = {880}, pages = {103--119}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-36617-9\_7}, doi = {10.1007/978-3-030-36617-9\_7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/sci/GengaPCDZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GengaZS19, author = {Laura Genga and Nicola Zannone and Anna Cinzia Squicciarini}, title = {Discovering reliable evidence of data misuse by exploiting rule redundancy}, journal = {Comput. Secur.}, volume = {87}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.101577}, doi = {10.1016/J.COSE.2019.101577}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GengaZS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/MorissetWZ19, author = {Charles Morisset and Tim A. C. Willemse and Nicola Zannone}, title = {A framework for the extended evaluation of {ABAC} policies}, journal = {Cybersecur.}, volume = {2}, number = {1}, pages = {6}, year = {2019}, url = {https://doi.org/10.1186/s42400-019-0024-0}, doi = {10.1186/S42400-019-0024-0}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/MorissetWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/RavidasLPZ19, author = {Sowmya Ravidas and Alexios Lekidis and Federica Paci and Nicola Zannone}, title = {Access control in Internet-of-Things: {A} survey}, journal = {J. Netw. Comput. Appl.}, volume = {144}, pages = {79--101}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2019.06.017}, doi = {10.1016/J.JNCA.2019.06.017}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/RavidasLPZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aike/NasirianiSSGZ19, author = {Neda Nasiriani and Anna Cinzia Squicciarini and Zara Saldanha and Sanchit Goel and Nicola Zannone}, title = {Hierarchical Clustering for Discrimination Discovery: {A} Top-Down Approach}, booktitle = {2nd {IEEE} International Conference on Artificial Intelligence and Knowledge Engineering, {AIKE} 2019, Sardinia, Italy, June 3-5, 2019}, pages = {187--194}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AIKE.2019.00041}, doi = {10.1109/AIKE.2019.00041}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aike/NasirianiSSGZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bpm/GengaFGZ19, author = {Laura Genga and Chiara Di Francescomarino and Chiara Ghidini and Nicola Zannone}, editor = {Thomas T. Hildebrandt and Boudewijn F. van Dongen and Maximilian R{\"{o}}glinger and Jan Mendling}, title = {Predicting Critical Behaviors in Business Process Executions: When Evidence Counts}, booktitle = {Business Process Management Forum - {BPM} Forum 2019, Vienna, Austria, September 1-6, 2019, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {360}, pages = {72--90}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26643-1\_5}, doi = {10.1007/978-3-030-26643-1\_5}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bpm/GengaFGZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GengaAZ19, author = {Laura Genga and Luca Allodi and Nicola Zannone}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Unveiling Systematic Biases in Decisional Processes: An Application to Discrimination Discovery}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {67--72}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329856}, doi = {10.1145/3321705.3329856}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GengaAZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RavidasKDZ19, author = {Sowmya Ravidas and Priyanka Karkhanis and Yanja Dajsuren and Nicola Zannone}, editor = {Andrea Saracino and Paolo Mori}, title = {An Authorization Framework for Cooperative Intelligent Transport Systems}, booktitle = {Emerging Technologies for Authorization and Authentication - Second International Workshop, {ETAA} 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11967}, pages = {16--34}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39749-4\_2}, doi = {10.1007/978-3-030-39749-4\_2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/RavidasKDZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/MorissetRZ19, author = {Charles Morisset and Sowmya Ravidas and Nicola Zannone}, editor = {Abdelmalek Benzekri and Michel Barbeau and Guang Gong and Romain Laborde and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {On Attribute Retrieval in {ABAC}}, booktitle = {Foundations and Practice of Security - 12th International Symposium, {FPS} 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12056}, pages = {225--241}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-45371-8\_14}, doi = {10.1007/978-3-030-45371-8\_14}, timestamp = {Wed, 07 Dec 2022 23:10:28 +0100}, biburl = {https://dblp.org/rec/conf/fps/MorissetRZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BertolissiHZ19, author = {Clara Bertolissi and Jerry den Hartog and Nicola Zannone}, editor = {Florian Kerschbaum and Atefeh Mashatan and Jianwei Niu and Adam J. Lee}, title = {Using Provenance for Secure Data Fusion in Cooperative Systems}, booktitle = {Proceedings of the 24th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019}, pages = {185--194}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3322431.3325100}, doi = {10.1145/3322431.3325100}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/BertolissiHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/SheikhalishahiT19, author = {Mina Sheikhalishahi and Gamze Tillem and Zekeriya Erkin and Nicola Zannone}, editor = {Lorenzo Cavallaro and Johannes Kinder and Josep Domingo{-}Ferrer}, title = {Privacy-Preserving Multi-Party Access Control}, booktitle = {Proceedings of the 18th {ACM} Workshop on Privacy in the Electronic Society, WPES@CCS 2019, London, UK, November 11, 2019}, pages = {1--13}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338498.3358643}, doi = {10.1145/3338498.3358643}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/SheikhalishahiT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/LeHZ18, author = {Van Huynh Le and Jerry den Hartog and Nicola Zannone}, title = {Security and privacy for innovative automotive applications: {A} survey}, journal = {Comput. Commun.}, volume = {132}, pages = {17--41}, year = {2018}, url = {https://doi.org/10.1016/j.comcom.2018.09.010}, doi = {10.1016/J.COMCOM.2018.09.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/LeHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlizadehLFZA18, author = {Mahdi Alizadeh and Xixi Lu and Dirk Fahland and Nicola Zannone and Wil M. P. van der Aalst}, title = {Linking data and process perspectives for conformance analysis}, journal = {Comput. Secur.}, volume = {73}, pages = {172--193}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.010}, doi = {10.1016/J.COSE.2017.10.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlizadehLFZA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/PaciSZ18, author = {Federica Paci and Anna Cinzia Squicciarini and Nicola Zannone}, title = {Survey on Access Control for Community-Centered Collaborative Systems}, journal = {{ACM} Comput. Surv.}, volume = {51}, number = {1}, pages = {6:1--6:38}, year = {2018}, url = {https://doi.org/10.1145/3146025}, doi = {10.1145/3146025}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/PaciSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jiis/GengaAPDZ18, author = {Laura Genga and Mahdi Alizadeh and Domenico Potena and Claudia Diamantini and Nicola Zannone}, title = {Discovering anomalous frequent patterns from partially ordered event logs}, journal = {J. Intell. Inf. Syst.}, volume = {51}, number = {2}, pages = {257--300}, year = {2018}, url = {https://doi.org/10.1007/s10844-018-0501-z}, doi = {10.1007/S10844-018-0501-Z}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jiis/GengaAPDZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/SalnitriAGZG18, author = {Mattia Salnitri and Mahdi Alizadeh and Daniele Giovanella and Nicola Zannone and Paolo Giorgini}, editor = {Jan Mendling and Haralambos Mouratidis}, title = {From Security-by-Design to the Identification of Security-Critical Deviations in Process Executions}, booktitle = {Information Systems in the Big Data Era - CAiSE Forum 2018, Tallinn, Estonia, June 11-15, 2018, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {317}, pages = {218--234}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-92901-9\_19}, doi = {10.1007/978-3-319-92901-9\_19}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/SalnitriAGZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ArgentoMPSZ18, author = {Luciano Argento and Andrea Margheri and Federica Paci and Vladimiro Sassone and Nicola Zannone}, editor = {Florian Kerschbaum and Stefano Paraboschi}, title = {Towards Adaptive Access Control}, booktitle = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP} {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10980}, pages = {99--109}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95729-6\_7}, doi = {10.1007/978-3-319-95729-6\_7}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ArgentoMPSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/GengaZ18, author = {Laura Genga and Nicola Zannone}, editor = {Christian Callegari and Marten van Sinderen and Paulo Novais and Panagiotis G. Sarigiannidis and Sebastiano Battiato and {\'{A}}ngel Serrano S{\'{a}}nchez de Le{\'{o}}n and Pascal Lorenz and Mohammad S. Obaidat}, title = {Towards a Systematic Process-aware Behavioral Analysis for Security}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 1: DCNET, ICE-B, OPTICS, {SIGMAP} and WINSYS, Porto, Portugal, July 26-28, 2018}, pages = {626--635}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006944606260635}, doi = {10.5220/0006944606260635}, timestamp = {Wed, 29 Aug 2018 15:17:08 +0200}, biburl = {https://dblp.org/rec/conf/icete/GengaZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/LeHZ18, author = {Van Huynh Le and Jerry den Hartog and Nicola Zannone}, editor = {Christian Callegari and Marten van Sinderen and Paulo Novais and Panagiotis G. Sarigiannidis and Sebastiano Battiato and {\'{A}}ngel Serrano S{\'{a}}nchez de Le{\'{o}}n and Pascal Lorenz and Mohammad S. Obaidat}, title = {Feature Selection for Anomaly Detection in Vehicular Ad Hoc Networks}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 1: DCNET, ICE-B, OPTICS, {SIGMAP} and WINSYS, Porto, Portugal, July 26-28, 2018}, pages = {647--657}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006946806470657}, doi = {10.5220/0006946806470657}, timestamp = {Wed, 29 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/LeHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/LeRAZ18, author = {Tho Le and Roland van Rijswijk{-}Deij and Luca Allodi and Nicola Zannone}, title = {Economic incentives on {DNSSEC} deployment: Time to move from quantity to quality}, booktitle = {2018 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2018, Taipei, Taiwan, April 23-27, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NOMS.2018.8406223}, doi = {10.1109/NOMS.2018.8406223}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/noms/LeRAZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/AlizadehPEZ18, author = {Mahdi Alizadeh and Sander Peters and Sandro Etalle and Nicola Zannone}, editor = {Hisham M. Haddad and Roger L. Wainwright and Richard Chbeir}, title = {Behavior analysis in the medical sector: theory and practice}, booktitle = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, France, April 09-13, 2018}, pages = {1637--1646}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3167132.3167307}, doi = {10.1145/3167132.3167307}, timestamp = {Wed, 25 Sep 2019 18:12:13 +0200}, biburl = {https://dblp.org/rec/conf/sac/AlizadehPEZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SquicciariniRZ18, author = {Anna Cinzia Squicciarini and Sarah Michele Rajtmajer and Nicola Zannone}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Multi-Party Access Control: Requirements, State of the Art and Open Challenges}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {49}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205999}, doi = {10.1145/3205977.3205999}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/SquicciariniRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MorissetWZ18, author = {Charles Morisset and Tim A. C. Willemse and Nicola Zannone}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Efficient Extended {ABAC} Evaluation}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {149--160}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205980}, doi = {10.1145/3205977.3205980}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/MorissetWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/AhmadMRZ18, author = {Tahir Ahmad and Umberto Morelli and Silvio Ranise and Nicola Zannone}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An {AWS} Case Study}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {235--246}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205989}, doi = {10.1145/3205977.3205989}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/AhmadMRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TurkmenHRZ17, author = {Fatih Turkmen and Jerry den Hartog and Silvio Ranise and Nicola Zannone}, title = {Formal analysis of {XACML} policies using {SMT}}, journal = {Comput. Secur.}, volume = {66}, pages = {185--203}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.01.009}, doi = {10.1016/J.COSE.2017.01.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TurkmenHRZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bpm/GengaAPDZ17, author = {Laura Genga and Mahdi Alizadeh and Domenico Potena and Claudia Diamantini and Nicola Zannone}, editor = {Robert Claris{\'{o}} and Henrik Leopold and Jan Mendling and Wil M. P. van der Aalst and Akhil Kumar and Brian T. Pentland and Mathias Weske}, title = {{APD} tool: Mining Anomalous Patterns from Event Logs}, booktitle = {Proceedings of the {BPM} Demo Track and {BPM} Dissertation Award co-located with 15th International Conference on Business Process Modeling {(BPM} 2017), Barcelona, Spain, September 13, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1920}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1920/BPM\_2017\_paper\_186.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:55 +0100}, biburl = {https://dblp.org/rec/conf/bpm/GengaAPDZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/simpda/TaxGZ17, author = {Niek Tax and Laura Genga and Nicola Zannone}, editor = {Paolo Ceravolo and Maurice van Keulen and Kilian Stoffel}, title = {On the Use of Hierarchical Subtrace Mining for Efficient Local Process Model Mining}, booktitle = {Proceedings of the 7th International Symposium on Data-driven Process Discovery and Analysis {(SIMPDA} 2017), Neuch{\^{a}}tel, Switzerland, December 6-8, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2016}, pages = {8--22}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2016/paper2.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:35 +0100}, biburl = {https://dblp.org/rec/conf/simpda/TaxGZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/simpda/GengaTZ17, author = {Laura Genga and Niek Tax and Nicola Zannone}, editor = {Paolo Ceravolo and Maurice van Keulen and Kilian Stoffel}, title = {Mining Local Process Models and Their Correlations}, booktitle = {Data-Driven Process Discovery and Analysis - 7th {IFIP} {WG} 2.6 International Symposium, {SIMPDA} 2017, Neuchatel, Switzerland, December 6-8, 2017, Revised Selected Papers}, series = {Lecture Notes in Business Information Processing}, volume = {340}, pages = {65--88}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-11638-5\_4}, doi = {10.1007/978-3-030-11638-5\_4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/simpda/GengaTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SkoricHZ16, author = {Boris Skoric and Sebastiaan J. A. de Hoogh and Nicola Zannone}, title = {Flow-based reputation with uncertainty: evidence-based subjective logic}, journal = {Int. J. Inf. Sec.}, volume = {15}, number = {4}, pages = {381--402}, year = {2016}, url = {https://doi.org/10.1007/s10207-015-0298-5}, doi = {10.1007/S10207-015-0298-5}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/SkoricHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VavilisPZ16, author = {Sokratis Vavilis and Milan Petkovic and Nicola Zannone}, title = {A severity-based quantification of data leakages in database systems}, journal = {J. Comput. Secur.}, volume = {24}, number = {3}, pages = {321--345}, year = {2016}, url = {https://doi.org/10.3233/JCS-160543}, doi = {10.3233/JCS-160543}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VavilisPZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/VavilisEPZ16, author = {Sokratis Vavilis and Alexandru Ionut Egner and Milan Petkovic and Nicola Zannone}, title = {Role Mining with Missing Values}, booktitle = {11th International Conference on Availability, Reliability and Security, {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016}, pages = {167--176}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ARES.2016.32}, doi = {10.1109/ARES.2016.32}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/VavilisEPZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/HartogZ16, author = {Jerry den Hartog and Nicola Zannone}, editor = {Elisa Bertino and Ravi S. Sandhu and Ram Krishnan}, title = {A Policy Framework for Data Fusion and Derived Data Control}, booktitle = {Proceedings of the 2016 {ACM} International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA, March 11, 2016}, pages = {47--57}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2875491.2875492}, doi = {10.1145/2875491.2875492}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/HartogZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AlizadehZ16, author = {Mahdi Alizadeh and Nicola Zannone}, editor = {Elisa Bertino and Ravi S. Sandhu and Alexander Pretschner}, title = {Risk-based Analysis of Business Process Executions}, booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March 9-11, 2016}, pages = {130--132}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2857705.2857742}, doi = {10.1145/2857705.2857742}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/AlizadehZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/EgnerLHZ16, author = {Alexandru Ionut Egner and Duc Luu and Jerry den Hartog and Nicola Zannone}, editor = {Elisa Bertino and Ravi S. Sandhu and Alexander Pretschner}, title = {An Authorization Service for Collaborative Situation Awareness}, booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March 9-11, 2016}, pages = {136--138}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2857705.2857740}, doi = {10.1145/2857705.2857740}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/EgnerLHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MahmudluHZ16, author = {Rauf Mahmudlu and Jerry den Hartog and Nicola Zannone}, editor = {Silvio Ranise and Vipin Swarup}, title = {Data Governance and Transparency for Collaborative Systems}, booktitle = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP} {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9766}, pages = {199--216}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41483-6\_15}, doi = {10.1007/978-3-319-41483-6\_15}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MahmudluHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/HartogZ16, author = {Jerry den Hartog and Nicola Zannone}, editor = {Indrajit Ray and Manoj Singh Gaur and Mauro Conti and Dheeraj Sanghi and V. Kamakoti}, title = {Collaborative Access Decisions: Why Has My Decision Not Been Enforced?}, booktitle = {Information Systems Security - 12th International Conference, {ICISS} 2016, Jaipur, India, December 16-20, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {109--130}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49806-5\_6}, doi = {10.1007/978-3-319-49806-5\_6}, timestamp = {Thu, 10 Sep 2020 09:33:08 +0200}, biburl = {https://dblp.org/rec/conf/iciss/HartogZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkdd/GengaPMADZ16, author = {Laura Genga and Domenico Potena and Orazio Martino and Mahdi Alizadeh and Claudia Diamantini and Nicola Zannone}, editor = {Annalisa Appice and Michelangelo Ceci and Corrado Loglisci and Elio Masciari and Zbigniew W. Ras}, title = {Subgraph Mining for Anomalous Pattern Discovery in Event Logs}, booktitle = {New Frontiers in Mining Complex Patterns - 5th International Workshop, {NFMCP} 2016, Held in Conjunction with {ECML-PKDD} 2016, Riva del Garda, Italy, September 19, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10312}, pages = {181--197}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61461-8\_12}, doi = {10.1007/978-3-319-61461-8\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkdd/GengaPMADZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CostanteFEHZ16, author = {Elisa Costante and Davide Fauri and Sandro Etalle and Jerry den Hartog and Nicola Zannone}, title = {A Hybrid Framework for Data Loss Prevention and Detection}, booktitle = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {324--333}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SPW.2016.24}, doi = {10.1109/SPW.2016.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/CostanteFEHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VavilisEPZ15, author = {Sokratis Vavilis and Alexandru Ionut Egner and Milan Petkovic and Nicola Zannone}, title = {An anomaly analysis framework for database systems}, journal = {Comput. Secur.}, volume = {53}, pages = {156--173}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.06.004}, doi = {10.1016/J.COSE.2015.06.004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VavilisEPZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fiict/KaluvuriEHZ15, author = {Samuel Paul Kaluvuri and Alexandru Ionut Egner and Jerry den Hartog and Nicola Zannone}, title = {{SAFAX} - An Extensible Authorization Service for Cloud Environments}, journal = {Frontiers {ICT}}, volume = {2}, pages = {9}, year = {2015}, url = {https://doi.org/10.3389/fict.2015.00009}, doi = {10.3389/FICT.2015.00009}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fiict/KaluvuriEHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/KatebZMCNMT15, author = {Donia El Kateb and Nicola Zannone and Assaad Moawad and Patrice Caire and Gr{\'{e}}gory Nain and Tejeddine Mouelhi and Yves Le Traon}, title = {Conviviality-driven access control policy}, journal = {Requir. Eng.}, volume = {20}, number = {4}, pages = {363--382}, year = {2015}, url = {https://doi.org/10.1007/s00766-014-0204-0}, doi = {10.1007/S00766-014-0204-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/KatebZMCNMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/TurkmenHRZ15, author = {Fatih Turkmen and Jerry den Hartog and Silvio Ranise and Nicola Zannone}, editor = {Riccardo Focardi and Andrew C. Myers}, title = {Analysis of {XACML} Policies with {SMT}}, booktitle = {Principles of Security and Trust - 4th International Conference, {POST} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9036}, pages = {115--134}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46666-7\_7}, doi = {10.1007/978-3-662-46666-7\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/TurkmenHRZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/PaciZ15, author = {Federica Paci and Nicola Zannone}, editor = {Edgar R. Weippl and Florian Kerschbaum and Adam J. Lee}, title = {Preventing Information Inference in Access Control}, booktitle = {Proceedings of the 20th {ACM} Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015}, pages = {87--97}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2752952.2752971}, doi = {10.1145/2752952.2752971}, timestamp = {Mon, 26 Jun 2023 20:45:28 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/PaciZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/CramptonMZ15, author = {Jason Crampton and Charles Morisset and Nicola Zannone}, editor = {Edgar R. Weippl and Florian Kerschbaum and Adam J. Lee}, title = {On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval}, booktitle = {Proceedings of the 20th {ACM} Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015}, pages = {99--109}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2752952.2752970}, doi = {10.1145/2752952.2752970}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/CramptonMZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssci/AlizadehLZ15, author = {Mahdi Alizadeh and Massimiliano de Leoni and Nicola Zannone}, title = {Constructing Probable Explanations of Nonconformity: {A} Data-Aware and History-Based Approach}, booktitle = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2015, Cape Town, South Africa, December 7-10, 2015}, pages = {1358--1365}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/SSCI.2015.194}, doi = {10.1109/SSCI.2015.194}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssci/AlizadehLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/FeiriPPZK15, author = {Michael Feiri and Rolf Pielage and Jonathan Petit and Nicola Zannone and Frank Kargl}, title = {Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in {VANET}}, booktitle = {{IEEE} 81st Vehicular Technology Conference, {VTC} Spring 2015, Glasgow, United Kingdom, 11-14 May, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/VTCSpring.2015.7146029}, doi = {10.1109/VTCSPRING.2015.7146029}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/vtc/FeiriPPZK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/VavilisPZ14, author = {Sokratis Vavilis and Milan Petkovic and Nicola Zannone}, title = {A reference model for reputation systems}, journal = {Decis. Support Syst.}, volume = {61}, pages = {147--154}, year = {2014}, url = {https://doi.org/10.1016/j.dss.2014.02.002}, doi = {10.1016/J.DSS.2014.02.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dss/VavilisPZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fiict/EtalleZ14, author = {Sandro Etalle and Nicola Zannone}, title = {Understanding Computer Security}, journal = {Frontiers {ICT}}, volume = {1}, pages = {3}, year = {2014}, url = {https://doi.org/10.3389/fict.2014.00003}, doi = {10.3389/FICT.2014.00003}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fiict/EtalleZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/VeeningenWZ14, author = {Meilof Veeningen and Benne de Weger and Nicola Zannone}, title = {Data minimisation in communication protocols: a formal analysis framework and application to identity management}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {6}, pages = {529--569}, year = {2014}, url = {https://doi.org/10.1007/s10207-014-0235-z}, doi = {10.1007/S10207-014-0235-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/VeeningenWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tplp/TrivellatoZE14, author = {Daniel Trivellato and Nicola Zannone and Sandro Etalle}, title = {{GEM:} {A} distributed goal evaluation algorithm for trust management}, journal = {Theory Pract. Log. Program.}, volume = {14}, number = {3}, pages = {293--337}, year = {2014}, url = {https://doi.org/10.1017/S1471068412000397}, doi = {10.1017/S1471068412000397}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tplp/TrivellatoZE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TurkmenHZ14, author = {Fatih Turkmen and Jerry den Hartog and Nicola Zannone}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Analyzing Access Control Policies with {SMT}}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1508--1510}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662366}, doi = {10.1145/2660267.2662366}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TurkmenHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cts/DamenHZ14, author = {Stan Damen and Jerry den Hartog and Nicola Zannone}, title = {CollAC: Collaborative access control}, booktitle = {2014 International Conference on Collaboration Technologies and Systems, {CTS} 2014, Minneapolis, MN, USA, May 19-23, 2014}, pages = {142--149}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CTS.2014.6867557}, doi = {10.1109/CTS.2014.6867557}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cts/DamenHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/VavilisPZ14, author = {Sokratis Vavilis and Milan Petkovic and Nicola Zannone}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Data Leakage Quantification}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {98--113}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_7}, doi = {10.1007/978-3-662-43936-4\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/VavilisPZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MorissetZ14, author = {Charles Morisset and Nicola Zannone}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Reduction of access control decisions}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {53--62}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613106}, doi = {10.1145/2613087.2613106}, timestamp = {Wed, 02 Jun 2021 09:13:31 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/MorissetZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/simpda/AlizadehLZ14, author = {Mahdi Alizadeh and Massimiliano de Leoni and Nicola Zannone}, editor = {Rafael Accorsi and Paolo Ceravolo and Barbara Russo}, title = {History-based Construction of Log-Process Alignments for Conformance Checking: Discovering What Really Went Wrong}, booktitle = {Proceedings of the 4th International Symposium on Data-driven Process Discovery and Analysis {(SIMPDA} 2014), Milan, Italy, November 19-21, 2014}, series = {{CEUR} Workshop Proceedings}, volume = {1293}, pages = {1--15}, publisher = {CEUR-WS.org}, year = {2014}, url = {https://ceur-ws.org/Vol-1293/preface.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:35 +0100}, biburl = {https://dblp.org/rec/conf/simpda/AlizadehLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/simpda/AlizadehLZ14a, author = {Mahdi Alizadeh and Massimiliano de Leoni and Nicola Zannone}, editor = {Paolo Ceravolo and Barbara Russo and Rafael Accorsi}, title = {History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation}, booktitle = {Data-Driven Process Discovery and Analysis - 4th International Symposium, {SIMPDA} 2014, Milan, Italy, November 19-21, 2014, Revised Selected Papers}, series = {Lecture Notes in Business Information Processing}, volume = {237}, pages = {58--78}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27243-6\_3}, doi = {10.1007/978-3-319-27243-6\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/simpda/AlizadehLZ14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SkoricHZ14, author = {Boris Skoric and Sebastiaan de Hoogh and Nicola Zannone}, title = {Flow-based reputation with uncertainty: Evidence-Based Subjective Logic}, journal = {CoRR}, volume = {abs/1402.3319}, year = {2014}, url = {http://arxiv.org/abs/1402.3319}, eprinttype = {arXiv}, eprint = {1402.3319}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SkoricHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcis/TrivellatoZGSE13, author = {Daniel Trivellato and Nicola Zannone and Maurice Glaundrup and Jacek Skowronek and Sandro Etalle}, title = {A Semantic Security Framework for Systems of Systems}, journal = {Int. J. Cooperative Inf. Syst.}, volume = {22}, number = {1}, year = {2013}, url = {https://doi.org/10.1142/S0218843013500044}, doi = {10.1142/S0218843013500044}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcis/TrivellatoZGSE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/AdriansyahDZ13, author = {Arya Adriansyah and Boudewijn F. van Dongen and Nicola Zannone}, title = {Privacy Analysis of User Behavior Using Alignments}, journal = {it Inf. Technol.}, volume = {55}, number = {6}, pages = {255--260}, year = {2013}, url = {https://doi.org/10.1524/itit.2013.2006}, doi = {10.1524/ITIT.2013.2006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/it/AdriansyahDZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jwsr/CostantePZ13, author = {Elisa Costante and Federica Paci and Nicola Zannone}, title = {Privacy-Aware Web Service Composition and Ranking}, journal = {Int. J. Web Serv. Res.}, volume = {10}, number = {3}, pages = {1--23}, year = {2013}, url = {https://doi.org/10.4018/ijwsr.2013070101}, doi = {10.4018/IJWSR.2013070101}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jwsr/CostantePZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/GursesSZ13, author = {Seda F. G{\"{u}}rses and Magali Seguran and Nicola Zannone}, title = {Requirements engineering within a large-scale security-oriented research project: lessons learned}, journal = {Requir. Eng.}, volume = {18}, number = {1}, pages = {43--66}, year = {2013}, url = {https://doi.org/10.1007/s00766-011-0139-7}, doi = {10.1007/S00766-011-0139-7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/GursesSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbms/VavilisZP13, author = {Sokratis Vavilis and Nicola Zannone and Milan Petkovic}, editor = {Pedro Pereira Rodrigues and Mykola Pechenizkiy and Jo{\~{a}}o Gama and Ricardo Cruz{-}Correia and Jiming Liu and Agma J. M. Traina and Peter J. F. Lucas and Paolo Soda}, title = {Data reliability in home healthcare services}, booktitle = {Proceedings of the 26th {IEEE} International Symposium on Computer-Based Medical Systems, Porto, Portugal, June 20-22, 2013}, pages = {377--380}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CBMS.2013.6627820}, doi = {10.1109/CBMS.2013.6627820}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cbms/VavilisZP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VeeningenBHZ13, author = {Meilof Veeningen and Mayla Brus{\`{o}} and Jerry den Hartog and Nicola Zannone}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{TRIPLEX:} verifying data minimisation in communication systems}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1415--1418}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512514}, doi = {10.1145/2508859.2512514}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VeeningenBHZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/VeeningenPZ13, author = {Meilof Veeningen and Antonio Piepoli and Nicola Zannone}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Georgios V. Lioudakis and Nora Cuppens{-}Boulahia and Simon N. Foley and William M. Fitzgerald}, title = {Are On-Line Personae Really Unlinkable?}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, {DPM} 2013, and 6th International Workshop, {SETOP} 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8247}, pages = {369--379}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-54568-9\_24}, doi = {10.1007/978-3-642-54568-9\_24}, timestamp = {Sun, 25 Oct 2020 22:34:56 +0100}, biburl = {https://dblp.org/rec/conf/esorics/VeeningenPZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/CostantePZ13, author = {Elisa Costante and Federica Paci and Nicola Zannone}, title = {Privacy-Aware Web Service Composition and Ranking}, booktitle = {2013 {IEEE} 20th International Conference on Web Services, Santa Clara, CA, USA, June 28 - July 3, 2013}, pages = {131--138}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICWS.2013.27}, doi = {10.1109/ICWS.2013.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/CostantePZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/VeeningenWZ13, author = {Meilof Veeningen and Benne de Weger and Nicola Zannone}, editor = {M. Carmen Fern{\'{a}}ndez Gago and Fabio Martinelli and Siani Pearson and Isaac Agudo}, title = {Symbolic Privacy Analysis through Linkability and Detectability}, booktitle = {Trust Management {VII} - 7th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2013, Malaga, Spain, June 3-7, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {401}, pages = {1--16}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38323-6\_1}, doi = {10.1007/978-3-642-38323-6\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/VeeningenWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/EgeaPPZ13, author = {Marina Egea and Federica Paci and Marinella Petrocchi and Nicola Zannone}, editor = {M. Carmen Fern{\'{a}}ndez Gago and Fabio Martinelli and Siani Pearson and Isaac Agudo}, title = {{PERSONA} - {A} Personalized Data Protection Framework}, booktitle = {Trust Management {VII} - 7th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2013, Malaga, Spain, June 3-7, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {401}, pages = {272--280}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38323-6\_22}, doi = {10.1007/978-3-642-38323-6\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/EgeaPPZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/DamenZ13, author = {Stan Damen and Nicola Zannone}, editor = {Willem Jonker and Milan Petkovic}, title = {Privacy Implications of Privacy Settings and Tagging in Facebook}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {121--138}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_16}, doi = {10.1007/978-3-319-06811-4\_16}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/DamenZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CostanteVEHPZ13, author = {Elisa Costante and Sokratis Vavilis and Sandro Etalle and Jerry den Hartog and Milan Petkovic and Nicola Zannone}, editor = {Pierangela Samarati}, title = {Database Anomalous Activities - Detection and Quantification}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {603--608}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223222/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CostanteVEHPZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/AdriansyahDZ13, author = {Arya Adriansyah and Boudewijn F. van Dongen and Nicola Zannone}, title = {Controlling Break-the-Glass through Alignment}, booktitle = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013}, pages = {606--611}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SocialCom.2013.91}, doi = {10.1109/SOCIALCOM.2013.91}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/AdriansyahDZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/awareness/TrivellatoELZ13, author = {Daniel Trivellato and Sandro Etalle and Erik Luit and Nicola Zannone}, editor = {Pi{\"{e}}rre van de Laar and Jan Tretmans and Michael Borth}, title = {The {POLIPO} Security Framework}, booktitle = {Situation Awareness with Systems of Systems}, pages = {189--208}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-6230-9\_12}, doi = {10.1007/978-1-4614-6230-9\_12}, timestamp = {Sat, 30 Sep 2023 09:32:43 +0200}, biburl = {https://dblp.org/rec/books/sp/awareness/TrivellatoELZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitdm/SimoneSZ12, author = {Antonino Simone and Boris Skoric and Nicola Zannone}, title = {Flow-Based Reputation: More than Just Ranking}, journal = {Int. J. Inf. Technol. Decis. Mak.}, volume = {11}, number = {3}, pages = {551--578}, year = {2012}, url = {https://doi.org/10.1142/S0219622012500113}, doi = {10.1142/S0219622012500113}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijitdm/SimoneSZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AsimIPTZ12, author = {Muhammad Asim and Tanya Ignatenko and Milan Petkovic and Daniel Trivellato and Nicola Zannone}, title = {Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {212--217}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.78}, doi = {10.1109/ARES.2012.78}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/AsimIPTZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bpm/BanescuPZ12, author = {Sebastian Banescu and Milan Petkovic and Nicola Zannone}, editor = {Alistair Barros and Avigdor Gal and Ekkart Kindler}, title = {Measuring Privacy Compliance Using Fitness Metrics}, booktitle = {Business Process Management - 10th International Conference, {BPM} 2012, Tallinn, Estonia, September 3-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7481}, pages = {114--119}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32885-5\_8}, doi = {10.1007/978-3-642-32885-5\_8}, timestamp = {Mon, 16 Aug 2021 11:09:48 +0200}, biburl = {https://dblp.org/rec/conf/bpm/BanescuPZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/EtalleHLTZ12, author = {Sandro Etalle and Timothy L. Hinrichs and Adam J. Lee and Daniel Trivellato and Nicola Zannone}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ali Miri and Nadia Tawbi}, title = {Policy Administration in Tag-Based Authorization}, booktitle = {Foundations and Practice of Security - 5th International Symposium, {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7743}, pages = {162--179}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37119-6\_11}, doi = {10.1007/978-3-642-37119-6\_11}, timestamp = {Sun, 02 Oct 2022 16:01:32 +0200}, biburl = {https://dblp.org/rec/conf/fps/EtalleHLTZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hcc/VavilisPZ12, author = {Sokratis Vavilis and Milan Petkovic and Nicola Zannone}, editor = {Magda David Hercheui and Diane Whitehouse and William J. McIver Jr. and Jackie Phahlamohlaka}, title = {Impact of {ICT} on Home Healthcare}, booktitle = {{ICT} Critical Infrastructures and Society - 10th {IFIP} {TC} 9 International Conference on Human Choice and Computers, {HCC10} 2012, Amsterdam, The Netherlands, September 27-28, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {386}, pages = {111--122}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33332-3\_11}, doi = {10.1007/978-3-642-33332-3\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hcc/VavilisPZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/VeeningenWZ12, author = {Meilof Veeningen and Benne de Weger and Nicola Zannone}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Formal Modelling of (De)Pseudonymisation: {A} Case Study in Health Care Privacy}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {145--160}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_10}, doi = {10.1007/978-3-642-38004-4\_10}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/stm/VeeningenWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1203-1820, author = {Antonino Simone and Boris Skoric and Nicola Zannone}, title = {Flow-based reputation: more than just ranking}, journal = {CoRR}, volume = {abs/1203.1820}, year = {2012}, url = {http://arxiv.org/abs/1203.1820}, eprinttype = {arXiv}, eprint = {1203.1820}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1203-1820.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1205-5757, author = {Muhammad Asim and Tanya Ignatenko and Milan Petkovic and Daniel Trivellato and Nicola Zannone}, title = {Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption}, journal = {CoRR}, volume = {abs/1205.5757}, year = {2012}, url = {http://arxiv.org/abs/1205.5757}, eprinttype = {arXiv}, eprint = {1205.5757}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1205-5757.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/VeeningenWZ12, author = {Meilof Veeningen and Benne de Weger and Nicola Zannone}, title = {Data Minimisation in Communication Protocols: {A} Formal Analysis Framework and Application to Identity Management}, journal = {CoRR}, volume = {abs/1206.7111}, year = {2012}, url = {http://arxiv.org/abs/1206.7111}, eprinttype = {arXiv}, eprint = {1206.7111}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/VeeningenWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-0368, author = {Daniel Trivellato and Nicola Zannone and Sandro Etalle}, title = {{GEM:} a Distributed Goal Evaluation Algorithm for Trust Management}, journal = {CoRR}, volume = {abs/1210.0368}, year = {2012}, url = {http://arxiv.org/abs/1210.0368}, eprinttype = {arXiv}, eprint = {1210.0368}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-0368.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aamas/MontaliTZMB11, author = {Marco Montali and Paolo Torroni and Nicola Zannone and Paola Mello and Volha Bryl}, title = {Engineering and verifying agent-oriented requirements augmented by business constraints with \emph{B}-Tropos}, journal = {Auton. Agents Multi Agent Syst.}, volume = {23}, number = {2}, pages = {193--223}, year = {2011}, url = {https://doi.org/10.1007/s10458-010-9135-4}, doi = {10.1007/S10458-010-9135-4}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aamas/MontaliTZMB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/AsnarMSRFTKLSZ11, author = {Yudistira Asnar and Fabio Massacci and Ayda Sa{\"{\i}}dane and Carlo Riccucci and Massimo Felici and Alessandra Tedeschi and Paul El Khoury and Keqin Li and Magali Seguran and Nicola Zannone}, title = {Organizational Patterns for Security and Dependability: From Design to Application}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {3}, pages = {1--22}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011070101}, doi = {10.4018/JSSE.2011070101}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/AsnarMSRFTKLSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TrivellatoZE11, author = {Daniel Trivellato and Nicola Zannone and Sandro Etalle}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: protecting information in systems of systems}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {865--868}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093513}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TrivellatoZE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esem/ElahiYZ11, author = {Golnaz Elahi and Eric S. K. Yu and Nicola Zannone}, editor = {James Walden and Laurie A. Williams}, title = {Security Risk Management by Qualitative Vulnerability Analysis}, booktitle = {Third International Workshop on Security Measurements and Metrics, Metrisec@ESEM 2011, Banff, Alberta, Canada, September 21, 2011}, pages = {1--10}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/Metrisec.2011.12}, doi = {10.1109/METRISEC.2011.12}, timestamp = {Mon, 07 Sep 2020 10:46:59 +0200}, biburl = {https://dblp.org/rec/conf/esem/ElahiYZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esem/BanescuZ11, author = {Sebastian Banescu and Nicola Zannone}, editor = {James Walden and Laurie A. Williams}, title = {Measuring Privacy Compliance with Process Specifications}, booktitle = {Third International Workshop on Security Measurements and Metrics, Metrisec@ESEM 2011, Banff, Alberta, Canada, September 21, 2011}, pages = {41--50}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/Metrisec.2011.10}, doi = {10.1109/METRISEC.2011.10}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esem/BanescuZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/VeeningenWZ11, author = {Meilof Veeningen and Benne de Weger and Nicola Zannone}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Formal Privacy Analysis of Communication Protocols for Identity Management}, booktitle = {Information Systems Security - 7th International Conference, {ICISS} 2011, Kolkata, India, December 15-19, 2011, Procedings}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {235--249}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25560-1\_16}, doi = {10.1007/978-3-642-25560-1\_16}, timestamp = {Wed, 25 Sep 2019 18:06:16 +0200}, biburl = {https://dblp.org/rec/conf/iciss/VeeningenWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/TrivellatoZE11, author = {Daniel Trivellato and Nicola Zannone and Sandro Etalle}, title = {A Security Framework for Systems of Systems}, booktitle = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011}, pages = {182--183}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/POLICY.2011.16}, doi = {10.1109/POLICY.2011.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/TrivellatoZE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/PetkovicPZ11, author = {Milan Petkovic and Davide Prandi and Nicola Zannone}, editor = {Willem Jonker and Milan Petkovic}, title = {Purpose Control: Did You Process the Data for the Intended Purpose?}, booktitle = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, pages = {145--168}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6\_10}, doi = {10.1007/978-3-642-23556-6\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/PetkovicPZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/mit/11/MassacciZ11, author = {Fabio Massacci and Nicola Zannone}, editor = {Eric S. K. Yu and Paolo Giorgini and Neil A. M. Maiden and John Mylopoulos}, title = {Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank}, booktitle = {Social Modeling for Requirements Engineering}, series = {Cooperative information systems}, pages = {337--362}, publisher = {{MIT} Press}, year = {2011}, timestamp = {Fri, 22 May 2020 12:08:24 +0200}, biburl = {https://dblp.org/rec/books/mit/11/MassacciZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/essos/2011, editor = {{\'{U}}lfar Erlingsson and Roel J. Wieringa and Nicola Zannone}, title = {Engineering Secure Software and Systems - Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6542}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19125-1}, doi = {10.1007/978-3-642-19125-1}, isbn = {978-3-642-19124-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jtaer/BohmEHHTTZ10, author = {Klemens B{\"{o}}hm and Sandro Etalle and Jerry den Hartog and Christian H{\"{u}}tter and Slim Trabelsi and Daniel Trivellato and Nicola Zannone}, title = {A Flexible Architecture for Privacy-Aware Trust Management}, journal = {J. Theor. Appl. Electron. Commer. Res.}, volume = {5}, number = {2}, pages = {77--96}, year = {2010}, url = {https://doi.org/10.4067/s0718-18762010000200006}, doi = {10.4067/S0718-18762010000200006}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jtaer/BohmEHHTTZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/ElahiYZ10, author = {Golnaz Elahi and Eric S. K. Yu and Nicola Zannone}, title = {A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities}, journal = {Requir. Eng.}, volume = {15}, number = {1}, pages = {41--62}, year = {2010}, url = {https://doi.org/10.1007/s00766-009-0090-z}, doi = {10.1007/S00766-009-0090-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/ElahiYZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/VeeningenWZ10, author = {Meilof Veeningen and Benne de Weger and Nicola Zannone}, editor = {Pierpaolo Degano and Sandro Etalle and Joshua D. Guttman}, title = {Modeling Identity-Related Properties and Their Privacy Strength}, booktitle = {Formal Aspects of Security and Trust - 7th International Workshop, {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6561}, pages = {126--140}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19751-2\_9}, doi = {10.1007/978-3-642-19751-2\_9}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/VeeningenWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZannonePE10, author = {Nicola Zannone and Milan Petkovic and Sandro Etalle}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Towards Data Protection Compliance}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {213--216}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 08:40:23 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ZannonePE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/MassacciMZ10, author = {Fabio Massacci and John Mylopoulos and Nicola Zannone}, editor = {Zbigniew W. Ras and Li{-}Shiang Tsay}, title = {Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology}, booktitle = {Advances in Intelligent Information Systems}, series = {Studies in Computational Intelligence}, volume = {265}, pages = {147--174}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-05183-8\_6}, doi = {10.1007/978-3-642-05183-8\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/sci/MassacciMZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/essos/2010, editor = {Fabio Massacci and Dan S. Wallach and Nicola Zannone}, title = {Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5965}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11747-3}, doi = {10.1007/978-3-642-11747-3}, isbn = {978-3-642-11746-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0031232, author = {Nicola Zannone}, title = {Security Agent-Oriented Requirements Engineering - the SI* Modeling Language and the Secure Tropos Methodology}, publisher = {{VDM}}, year = {2009}, isbn = {978-3-639-17654-4}, timestamp = {Fri, 05 Jul 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0031232.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ail/CompagnaKKMZ09, author = {Luca Compagna and Paul El Khoury and Alzbeta Krausov{\'{a}} and Fabio Massacci and Nicola Zannone}, title = {How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns}, journal = {Artif. Intell. Law}, volume = {17}, number = {1}, pages = {1--30}, year = {2009}, url = {https://doi.org/10.1007/s10506-008-9067-3}, doi = {10.1007/S10506-008-9067-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ail/CompagnaKKMZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/Zannone09, author = {Nicola Zannone}, title = {The Si* Modeling Framework: Metamodel and Applications}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {19}, number = {5}, pages = {727--746}, year = {2009}, url = {https://doi.org/10.1142/S0218194009004374}, doi = {10.1142/S0218194009004374}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/Zannone09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/GuardaZ09, author = {Paolo Guarda and Nicola Zannone}, title = {Towards the development of privacy-aware systems}, journal = {Inf. Softw. Technol.}, volume = {51}, number = {2}, pages = {337--350}, year = {2009}, url = {https://doi.org/10.1016/j.infsof.2008.04.004}, doi = {10.1016/J.INFSOF.2008.04.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/GuardaZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/TrivellatoSZE09, author = {Daniel Trivellato and Fred Spiessens and Nicola Zannone and Sandro Etalle}, title = {Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control}, booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August 29-31, 2009}, pages = {252--258}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSE.2009.123}, doi = {10.1109/CSE.2009.123}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/TrivellatoSZE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/ElahiYZ09, author = {Golnaz Elahi and Eric S. K. Yu and Nicola Zannone}, editor = {Alberto H. F. Laender and Silvana Castano and Umeshwar Dayal and Fabio Casati and Jos{\'{e}} Palazzo Moreira de Oliveira}, title = {A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations}, booktitle = {Conceptual Modeling - {ER} 2009, 28th International Conference on Conceptual Modeling, Gramado, Brazil, November 9-12, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5829}, pages = {99--114}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04840-1\_10}, doi = {10.1007/978-3-642-04840-1\_10}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/er/ElahiYZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/TrivellatoSZE09, author = {Daniel Trivellato and Fred Spiessens and Nicola Zannone and Sandro Etalle}, title = {{POLIPO:} Policies {\&} OntoLogies for Interoperability, Portability, and autOnomy}, booktitle = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009}, pages = {110--113}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/POLICY.2009.19}, doi = {10.1109/POLICY.2009.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/TrivellatoSZE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/essos/2009, editor = {Fabio Massacci and Samuel T. Redwine Jr. and Nicola Zannone}, title = {Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5429}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00199-4}, doi = {10.1007/978-3-642-00199-4}, isbn = {978-3-642-00198-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ase/KiyavitskayaZ08, author = {Nadzeya Kiyavitskaya and Nicola Zannone}, title = {Requirements model generation to support requirements elicitation: the Secure Tropos experience}, journal = {Autom. Softw. Eng.}, volume = {15}, number = {2}, pages = {149--173}, year = {2008}, url = {https://doi.org/10.1007/s10515-008-0028-6}, doi = {10.1007/S10515-008-0028-6}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ase/KiyavitskayaZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbidm/AsnarGCMSZ08, author = {Yudistira Asnar and Paolo Giorgini and Paolo Ciancarini and Rocco Moretti and Maurizio Sebastianis and Nicola Zannone}, title = {An evaluation of business solutions in manufacturing enterprises}, journal = {Int. J. Bus. Intell. Data Min.}, volume = {3}, number = {3}, pages = {305--329}, year = {2008}, url = {https://doi.org/10.1504/IJBIDM.2008.022137}, doi = {10.1504/IJBIDM.2008.022137}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbidm/AsnarGCMSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AsnarMSZ08, author = {Yudistira Asnar and Rocco Moretti and Maurizio Sebastianis and Nicola Zannone}, title = {Risk as Dependability Metrics for the Evaluation of Business Solutions: {A} Model-driven Approach}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {1240--1247}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.17}, doi = {10.1109/ARES.2008.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/AsnarMSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AsnarZ08, author = {Yudistira Asnar and Nicola Zannone}, editor = {Andy Ozment and Ketil St{\o}len}, title = {Perceived risk assessment}, booktitle = {Proceedings of the 4th {ACM} Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008}, pages = {59--64}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456362.1456375}, doi = {10.1145/1456362.1456375}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AsnarZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coordination/PrandiQZ08, author = {Davide Prandi and Paola Quaglia and Nicola Zannone}, editor = {Doug Lea and Gianluigi Zavattaro}, title = {Formal Analysis of {BPMN} Via a Translation into {COWS}}, booktitle = {Coordination Models and Languages, 10th International Conference, {COORDINATION} 2008, Oslo, Norway, June 4-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5052}, pages = {249--263}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68265-3\_16}, doi = {10.1007/978-3-540-68265-3\_16}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/coordination/PrandiQZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/CabotZ08, author = {Jordi Cabot and Nicola Zannone}, editor = {Jon Whittle and Jan J{\"{u}}rjens and Bashar Nuseibeh and Glen Dobson}, title = {Towards an Integrated Framework for Model-Driven Security Engineering}, booktitle = {Proceedings of the Workshop on Modeling Security {(} {MODSEC08} {)} held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems {(} {MODELS} {)} Toulouse, France, September 28, 2008}, series = {{CEUR} Workshop Proceedings}, volume = {413}, publisher = {CEUR-WS.org}, year = {2008}, url = {https://ceur-ws.org/Vol-413/paper13.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:21 +0100}, biburl = {https://dblp.org/rec/conf/models/CabotZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/MassacciZ08, author = {Fabio Massacci and Nicola Zannone}, editor = {Robert Meersman and Zahir Tari}, title = {A Model-Driven Approach for the Specification and Analysis of Access Control Policies}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2008, {OTM} 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and {ODBASE} 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5332}, pages = {1087--1103}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88873-4\_11}, doi = {10.1007/978-3-540-88873-4\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/MassacciZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/KiyavitskayaKZ08, author = {Nadzeya Kiyavitskaya and Alzbeta Krausov{\'{a}} and Nicola Zannone}, title = {Why Eliciting and Managing Legal Requirements Is Hard}, booktitle = {First International Workshop on Requirements Engineering and Law, {RELAW} 2008, Barcelona, Spain, September 9, 2008}, pages = {26--30}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/RELAW.2008.10}, doi = {10.1109/RELAW.2008.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/KiyavitskayaKZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BusnelKLSZ09, author = {Pierre Busnel and Paul El Khoury and Keqin Li and Ayda Sa{\"{\i}}dane and Nicola Zannone}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {S{\&}D Pattern Deployment at Organizational Level: {A} Prototype for Remote Healthcare System}, booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, pages = {27--39}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.036}, doi = {10.1016/J.ENTCS.2009.07.036}, timestamp = {Thu, 09 Mar 2023 13:54:01 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BusnelKLSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ase/MassacciMZ07, author = {Fabio Massacci and John Mylopoulos and Nicola Zannone}, title = {Computer-aided Support for Secure Tropos}, journal = {Autom. Softw. Eng.}, volume = {14}, number = {3}, pages = {341--364}, year = {2007}, url = {https://doi.org/10.1007/s10515-007-0013-5}, doi = {10.1007/S10515-007-0013-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ase/MassacciMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/MassacciMZ07, author = {Fabio Massacci and John Mylopoulos and Nicola Zannone}, title = {From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {17}, number = {2}, pages = {265--284}, year = {2007}, url = {https://doi.org/10.1142/S0218194007003239}, doi = {10.1142/S0218194007003239}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/MassacciMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AsnarGMZ07, author = {Yudistira Asnar and Paolo Giorgini and Fabio Massacci and Nicola Zannone}, title = {From Trust to Dependability through Risk Analysis}, booktitle = {Proceedings of the The Second International Conference on Availability, Reliability and Security, {ARES} 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria}, pages = {19--26}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARES.2007.93}, doi = {10.1109/ARES.2007.93}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/AsnarGMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aose/AsnarGZ07, author = {Yudistira Asnar and Paolo Giorgini and Nicola Zannone}, editor = {Michael Luck and Lin Padgham}, title = {Reasoning About Risk in Agent's Deliberation Process: {A} Jadex Implementation}, booktitle = {Agent-Oriented Software Engineering VIII, 8th International Workshop, {AOSE} 2007, Honolulu, HI, USA, May 14, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4951}, pages = {118--131}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79488-2\_9}, doi = {10.1007/978-3-540-79488-2\_9}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aose/AsnarGZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/clima/BrylMMTZ07, author = {Volha Bryl and Paola Mello and Marco Montali and Paolo Torroni and Nicola Zannone}, editor = {Fariba Sadri and Ken Satoh}, title = {-Tropos}, booktitle = {Computational Logic in Multi-Agent Systems, 8th International Workshop, {CLIMA} VIII, Porto, Portugal, September 10-11, 2007. Revised Selected and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {5056}, pages = {157--176}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-88833-8\_9}, doi = {10.1007/978-3-540-88833-8\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/clima/BrylMMTZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icail/CompagnaKMTZ07, author = {Luca Compagna and Paul El Khoury and Fabio Massacci and Reshma Thomas and Nicola Zannone}, editor = {Anne Gardner and Radboud Winkels}, title = {How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach}, booktitle = {The Eleventh International Conference on Artificial Intelligence and Law, Proceedings of the Conference, June 4-8, 2007, Stanford Law School, Stanford, California, {USA}}, pages = {149--153}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1276318.1276346}, doi = {10.1145/1276318.1276346}, timestamp = {Wed, 14 Nov 2018 10:58:33 +0100}, biburl = {https://dblp.org/rec/conf/icail/CompagnaKMTZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/LopezMZ07, author = {Hugo A. L{\'{o}}pez and Fabio Massacci and Nicola Zannone}, editor = {Elisabetta Di Nitto and Matei Ripeanu}, title = {Goal-Equivalent Secure Business Process Re-engineering}, booktitle = {Service-Oriented Computing - {ICSOC} 2007 Workshops, International Workshops, Vienna, Austria, September 17, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4907}, pages = {212--223}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-93851-4\_21}, doi = {10.1007/978-3-540-93851-4\_21}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsoc/LopezMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GiorginiMMZ06, author = {Paolo Giorgini and Fabio Massacci and John Mylopoulos and Nicola Zannone}, title = {Requirements engineering for trust management: model, methodology, and reasoning}, journal = {Int. J. Inf. Sec.}, volume = {5}, number = {4}, pages = {257--274}, year = {2006}, url = {https://doi.org/10.1007/s10207-006-0005-7}, doi = {10.1007/S10207-006-0005-7}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/GiorginiMMZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vldb/MassacciMZ06, author = {Fabio Massacci and John Mylopoulos and Nicola Zannone}, title = {Hierarchical hippocratic databases with minimal disclosure for virtual organizations}, journal = {{VLDB} J.}, volume = {15}, number = {4}, pages = {370--387}, year = {2006}, url = {https://doi.org/10.1007/s00778-006-0009-y}, doi = {10.1007/S00778-006-0009-Y}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vldb/MassacciMZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/BrylMMZ06, author = {Volha Bryl and Fabio Massacci and John Mylopoulos and Nicola Zannone}, editor = {Eric Dubois and Klaus Pohl}, title = {Designing Security Requirements Models Through Planning}, booktitle = {Advanced Information Systems Engineering, 18th International Conference, CAiSE 2006, Luxembourg, Luxembourg, June 5-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4001}, pages = {33--47}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11767138\_4}, doi = {10.1007/11767138\_4}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/caise/BrylMMZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ZannoneJW06, author = {Nicola Zannone and Sushil Jajodia and Duminda Wijesekera}, editor = {Ernesto Damiani and Peng Liu}, title = {Creating Objects in the Flexible Authorization Framework}, booktitle = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4127}, pages = {1--14}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11805588\_1}, doi = {10.1007/11805588\_1}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ZannoneJW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/GiorginiMMZ06, author = {Paolo Giorgini and Fabio Massacci and John Mylopoulos and Nicola Zannone}, title = {Detecting Conflicts of Interest}, booktitle = {14th {IEEE} International Conference on Requirements Engineering {(RE} 2006), 11-15 September 2006, Minneapolis/St.Paul, Minnesota, {USA}}, pages = {308--311}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/RE.2006.16}, doi = {10.1109/RE.2006.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/GiorginiMMZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/MassacciPZ05, author = {Fabio Massacci and Marco Prest and Nicola Zannone}, title = {Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation}, journal = {Comput. Stand. Interfaces}, volume = {27}, number = {5}, pages = {445--455}, year = {2005}, url = {https://doi.org/10.1016/j.csi.2005.01.003}, doi = {10.1016/J.CSI.2005.01.003}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/MassacciPZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MassacciMZ05, author = {Fabio Massacci and John Mylopoulos and Nicola Zannone}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {438--454}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_25}, doi = {10.1007/11555827\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MassacciMZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/GiorginiMZ05, author = {Paolo Giorgini and Fabio Massacci and Nicola Zannone}, editor = {Alessandro Aldini and Roberto Gorrieri and Fabio Martinelli}, title = {Security and Trust Requirements Engineering}, booktitle = {Foundations of Security Analysis and Design III, {FOSAD} 2004/2005 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {3655}, pages = {237--272}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554578\_8}, doi = {10.1007/11554578\_8}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fosad/GiorginiMZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itrust/GiorginiMMZ05, author = {Paolo Giorgini and Fabio Massacci and John Mylopoulos and Nicola Zannone}, editor = {Peter Herrmann and Val{\'{e}}rie Issarny and Simon Shiu}, title = {Modeling Social and Individual Trust in Requirements Engineering Methodologies}, booktitle = {Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3477}, pages = {161--176}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11429760\_12}, doi = {10.1007/11429760\_12}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itrust/GiorginiMMZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itrust/GiorginiMMSZ05, author = {Paolo Giorgini and Fabio Massacci and John Mylopoulos and Alberto Siena and Nicola Zannone}, editor = {Peter Herrmann and Val{\'{e}}rie Issarny and Simon Shiu}, title = {ST-Tool: {A} {CASE} Tool for Modeling and Analyzing Trust Requirements}, booktitle = {Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3477}, pages = {415--419}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11429760\_33}, doi = {10.1007/11429760\_33}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itrust/GiorginiMMSZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/GiorginiMMZ05, author = {Paolo Giorgini and Fabio Massacci and John Mylopoulos and Nicola Zannone}, title = {Modeling Security Requirements Through Ownership, Permission and Delegation}, booktitle = {13th {IEEE} International Conference on Requirements Engineering {(RE} 2005), 29 August - 2 September 2005, Paris, France}, pages = {167--176}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/RE.2005.43}, doi = {10.1109/RE.2005.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/GiorginiMMZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/GiorginiMMZ05a, author = {Paolo Giorgini and Fabio Massacci and John Mylopoulos and Nicola Zannone}, title = {ST-Tool: {A} {CASE} Tool for Security Requirements Engineering}, booktitle = {13th {IEEE} International Conference on Requirements Engineering {(RE} 2005), 29 August - 2 September 2005, Paris, France}, pages = {451--452}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/RE.2005.67}, doi = {10.1109/RE.2005.67}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/GiorginiMMZ05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/ZannoneJMW05, author = {Nicola Zannone and Sushil Jajodia and Fabio Massacci and Duminda Wijesekera}, editor = {Vijay Atluri and Sabrina De Capitani di Vimercati and Roger Dingledine}, title = {Maintaining privacy on derived objects}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005}, pages = {10--19}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102199.1102202}, doi = {10.1145/1102199.1102202}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/ZannoneJMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/GiorginiMMZ04, author = {Paolo Giorgini and Fabio Massacci and John Mylopoulos and Nicola Zannone}, editor = {Sokratis K. Katsikas and Stefanos Gritzalis and Javier L{\'{o}}pez}, title = {Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures}, booktitle = {Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3093}, pages = {98--111}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25980-0\_8}, doi = {10.1007/978-3-540-25980-0\_8}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/europki/GiorginiMMZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itrust/GiorginiMMZ04, author = {Paolo Giorgini and Fabio Massacci and John Mylopoulos and Nicola Zannone}, editor = {Christian Damsgaard Jensen and Stefan Poslad and Theodosis Dimitrakos}, title = {Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning}, booktitle = {Trust Management, Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2995}, pages = {176--190}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24747-0\_14}, doi = {10.1007/978-3-540-24747-0\_14}, timestamp = {Sun, 02 Oct 2022 16:10:26 +0200}, biburl = {https://dblp.org/rec/conf/itrust/GiorginiMMZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MassacciZ04, author = {Fabio Massacci and Nicola Zannone}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Privacy Is Linking Permission to Purpose}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {179--191}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_20}, doi = {10.1007/11861386\_20}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/MassacciZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.