BibTeX records: Nicola Zannone

download as .bib file

@article{DBLP:journals/tochi/BurdaAZ24,
  author       = {Pavlo Burda and
                  Luca Allodi and
                  Nicola Zannone},
  title        = {Cognition in Social Engineering Empirical Research: {A} Systematic
                  Literature Review},
  journal      = {{ACM} Trans. Comput. Hum. Interact.},
  volume       = {31},
  number       = {2},
  pages        = {19:1--19:55},
  year         = {2024},
  url          = {https://doi.org/10.1145/3635149},
  doi          = {10.1145/3635149},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tochi/BurdaAZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PaciPZ23,
  author       = {Federica Paci and
                  Jacopo Pizzoli and
                  Nicola Zannone},
  title        = {A Comprehensive Study on Third-Party User Tracking in Mobile Applications},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {97:1--97:8},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605079},
  doi          = {10.1145/3600160.3605079},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PaciPZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LuccheseLMPZF23,
  author       = {Marco Lucchese and
                  Francesco Lupia and
                  Massimo Merro and
                  Federica Paci and
                  Nicola Zannone and
                  Angelo Furfaro},
  title        = {HoneyICS: {A} High-interaction Physics-aware Honeynet for Industrial
                  Control Systems},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {113:1--113:10},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3604984},
  doi          = {10.1145/3600160.3604984},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LuccheseLMPZF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CozzaPLMZ23,
  author       = {Vittoria Cozza and
                  Mila Dalla Preda and
                  Marco Lucchese and
                  Massimo Merro and
                  Nicola Zannone},
  title        = {Towards Obfuscation of Programmable Logic Controllers},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {121:1--121:10},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605081},
  doi          = {10.1145/3600160.3605081},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CozzaPLMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MehriWPZ23,
  author       = {Gelareh Hasel Mehri and
                  Inez L. Wester and
                  Federica Paci and
                  Nicola Zannone},
  title        = {Mitigating Privilege Misuse in Access Control through Anomaly Detection},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {139:1--139:10},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3604988},
  doi          = {10.1145/3600160.3604988},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MehriWPZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/LupiaLMZ23,
  author       = {Francesco Lupia and
                  Marco Lucchese and
                  Massimo Merro and
                  Nicola Zannone},
  editor       = {Jingrui He and
                  Themis Palpanas and
                  Xiaohua Hu and
                  Alfredo Cuzzocrea and
                  Dejing Dou and
                  Dominik Slezak and
                  Wei Wang and
                  Aleksandra Gruca and
                  Jerry Chun{-}Wei Lin and
                  Rakesh Agrawal},
  title        = {{ICS} Honeypot Interactions: {A} Latitudinal Study},
  booktitle    = {{IEEE} International Conference on Big Data, BigData 2023, Sorrento,
                  Italy, December 15-18, 2023},
  pages        = {3025--3034},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BigData59044.2023.10386497},
  doi          = {10.1109/BIGDATA59044.2023.10386497},
  timestamp    = {Fri, 02 Feb 2024 12:00:39 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/LupiaLMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/MarinBZA23,
  author       = {Ioana Andreea Marin and
                  Pavlo Burda and
                  Nicola Zannone and
                  Luca Allodi},
  editor       = {Albrecht Schmidt and
                  Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and
                  Tesh Goyal and
                  Per Ola Kristensson and
                  Anicia Peters and
                  Stefanie Mueller and
                  Julie R. Williamson and
                  Max L. Wilson},
  title        = {The Influence of Human Factors on the Intention to Report Phishing
                  Emails},
  booktitle    = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023},
  pages        = {620:1--620:18},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544548.3580985},
  doi          = {10.1145/3544548.3580985},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/MarinBZA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BurdaAAZ23,
  author       = {Pavlo Burda and
                  Abdul Malek Altawekji and
                  Luca Allodi and
                  Nicola Zannone},
  title        = {The Peculiar Case of Tailored Phishing against SMEs: Detection and
                  Collective DefenseMechanisms at a Small {IT} Company},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023 - Workshops, Delft, Netherlands, July 3-7, 2023},
  pages        = {232--243},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSPW59978.2023.00031},
  doi          = {10.1109/EUROSPW59978.2023.00031},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/BurdaAAZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/LanotteMZ23,
  author       = {Ruggero Lanotte and
                  Massimo Merro and
                  Nicola Zannone},
  editor       = {Marieke Huisman and
                  Ant{\'{o}}nio Ravara},
  title        = {Impact Analysis of Coordinated Cyber-Physical Attacks via Statistical
                  Model Checking: {A} Case Study},
  booktitle    = {Formal Techniques for Distributed Objects, Components, and Systems
                  - 43rd {IFIP} {WG} 6.1 International Conference, {FORTE} 2023, Held
                  as Part of the 18th International Federated Conference on Distributed
                  Computing Techniques, DisCoTec 2023, Lisbon, Portugal, June 19-23,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13910},
  pages        = {75--94},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35355-0\_6},
  doi          = {10.1007/978-3-031-35355-0\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/forte/LanotteMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msr/MohayejiACZS23,
  author       = {Hamid Mohayeji and
                  Andrei Agaronian and
                  Eleni Constantinou and
                  Nicola Zannone and
                  Alexander Serebrenik},
  title        = {Investigating the Resolution of Vulnerable Dependencies with Dependabot
                  Security Updates},
  booktitle    = {20th {IEEE/ACM} International Conference on Mining Software Repositories,
                  {MSR} 2023, Melbourne, Australia, May 15-16, 2023},
  pages        = {234--246},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSR59073.2023.00042},
  doi          = {10.1109/MSR59073.2023.00042},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msr/MohayejiACZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/LuccheseMPZ23,
  author       = {Marco Lucchese and
                  Massimo Merro and
                  Federica Paci and
                  Nicola Zannone},
  editor       = {Jiman Hong and
                  Maart Lanperne and
                  Juw Won Park and
                  Tom{\'{a}}s Cern{\'{y}} and
                  Hossain Shahriar},
  title        = {Towards {A} High-interaction Physics-aware Honeynet for Industrial
                  Control Systems},
  booktitle    = {Proceedings of the 38th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2023, Tallinn, Estonia, March 27-31, 2023},
  pages        = {76--79},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3555776.3577803},
  doi          = {10.1145/3555776.3577803},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/LuccheseMPZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/GeorgeSZ23,
  author       = {Dominik Roy George and
                  Savio Sciancalepore and
                  Nicola Zannone},
  editor       = {Silvio Ranise and
                  Roberto Carbone and
                  Daniel Takabi},
  title        = {Privacy-Preserving Multi-Party Access Control for Third-Party {UAV}
                  Services},
  booktitle    = {Proceedings of the 28th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023},
  pages        = {19--30},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3589608.3593837},
  doi          = {10.1145/3589608.3593837},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/GeorgeSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BertolissiAZ23,
  author       = {Clara Bertolissi and
                  Alba Martinez Anton and
                  Nicola Zannone},
  editor       = {Silvio Ranise and
                  Roberto Carbone and
                  Daniel Takabi},
  title        = {Data Sharing in Social Networks},
  booktitle    = {Proceedings of the 28th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023},
  pages        = {181--192},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3589608.3593833},
  doi          = {10.1145/3589608.3593833},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/BertolissiAZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sebd/CaruccioDPTZ23,
  author       = {Loredana Caruccio and
                  Domenico Desiato and
                  Giuseppe Polese and
                  Genoveffa Tortora and
                  Nicola Zannone},
  editor       = {Diego Calvanese and
                  Claudia Diamantini and
                  Guglielmo Faggioli and
                  Nicola Ferro and
                  Stefano Marchesin and
                  Gianmaria Silvello and
                  Letizia Tanca},
  title        = {An Approach to Trade-off Privacy and Classification Accuracy in Machine
                  Learning Processes},
  booktitle    = {Proceedings of the 31st Symposium of Advanced Database Systems, Galzingano
                  Terme, Italy, July 2nd to 5th, 2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3478},
  pages        = {420--429},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3478/paper72.pdf},
  timestamp    = {Wed, 13 Sep 2023 16:08:43 +0200},
  biburl       = {https://dblp.org/rec/conf/sebd/CaruccioDPTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcomp/LukowiczNSPLVZ22,
  author       = {Paul Lukowicz and
                  Anton Nijholt and
                  Kaleem Siddiqi and
                  Marcello Pelillo and
                  Kristof Van Laerhoven and
                  Luca Vigan{\`{o}} and
                  Nicola Zannone},
  title        = {Editorial: 2021 editors' pick: Computer science},
  journal      = {Frontiers Comput. Sci.},
  volume       = {4},
  year         = {2022},
  url          = {https://doi.org/10.3389/fcomp.2022.1062066},
  doi          = {10.3389/FCOMP.2022.1062066},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcomp/LukowiczNSPLVZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AhmadMRZ22,
  author       = {Tahir Ahmad and
                  Umberto Morelli and
                  Silvio Ranise and
                  Nicola Zannone},
  title        = {Extending access control in {AWS} IoT through event-driven functions:
                  an experimental evaluation using a smart lock system},
  journal      = {Int. J. Inf. Sec.},
  volume       = {21},
  number       = {2},
  pages        = {379--408},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10207-021-00558-3},
  doi          = {10.1007/S10207-021-00558-3},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AhmadMRZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/CaruccioDPTZ22,
  author       = {Loredana Caruccio and
                  Domenico Desiato and
                  Giuseppe Polese and
                  Genoveffa Tortora and
                  Nicola Zannone},
  title        = {A decision-support framework for data anonymization with application
                  to machine learning processes},
  journal      = {Inf. Sci.},
  volume       = {613},
  pages        = {1--32},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ins.2022.09.004},
  doi          = {10.1016/J.INS.2022.09.004},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/CaruccioDPTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocsap/GengaAZ22,
  author       = {Laura Genga and
                  Luca Allodi and
                  Nicola Zannone},
  title        = {Association Rule Mining Meets Regression Analysis: An Automated Approach
                  to Unveil Systematic Biases in Decision-Making Processes},
  journal      = {J. Cybersecur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {191--219},
  year         = {2022},
  url          = {https://doi.org/10.3390/jcp2010011},
  doi          = {10.3390/JCP2010011},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocsap/GengaAZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ClarkY0Z22,
  author       = {Stanley Clark and
                  Nikolay Yakovets and
                  George Fletcher and
                  Nicola Zannone},
  editor       = {Shamik Sural and
                  Haibing Lu},
  title        = {ReLOG: {A} Unified Framework for Relationship-Based Access Control
                  over Graph Databases},
  booktitle    = {Data and Applications Security and Privacy {XXXVI} - 36th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13383},
  pages        = {303--315},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-10684-2\_17},
  doi          = {10.1007/978-3-031-10684-2\_17},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ClarkY0Z22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KerstenBAZ22,
  author       = {Leon Kersten and
                  Pavlo Burda and
                  Luca Allodi and
                  Nicola Zannone},
  title        = {Investigating the Effect of Phishing Believability on Phishing Reporting},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2022 - Workshops, Genoa, Italy, June 6-10, 2022},
  pages        = {117--128},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/EuroSPW55150.2022.00018},
  doi          = {10.1109/EUROSPW55150.2022.00018},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/KerstenBAZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/BurdaAZ22,
  author       = {Pavlo Burda and
                  Luca Allodi and
                  Nicola Zannone},
  editor       = {Guy{-}Vincent Jourdan and
                  Laurent Mounier and
                  Carlisle M. Adams and
                  Florence S{\`{e}}des and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {A Decision-Support Tool for Experimentation on Zero-Hour Phishing
                  Detection},
  booktitle    = {Foundations and Practice of Security - 15th International Symposium,
                  {FPS} 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13877},
  pages        = {443--452},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-30122-3\_27},
  doi          = {10.1007/978-3-031-30122-3\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/BurdaAZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SciancaleporeZ22,
  author       = {Savio Sciancalepore and
                  Nicola Zannone},
  editor       = {Jiman Hong and
                  Miroslav Bures and
                  Juw Won Park and
                  Tom{\'{a}}s Cern{\'{y}}},
  title        = {{PICO:} privacy-preserving access control in IoT scenarios through
                  incomplete information},
  booktitle    = {{SAC} '22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual
                  Event, April 25 - 29, 2022},
  pages        = {147--156},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3477314.3508379},
  doi          = {10.1145/3477314.3508379},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/SciancaleporeZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ClarkYFZ22,
  author       = {Stanley Clark and
                  Nikolay Yakovets and
                  George H. L. Fletcher and
                  Nicola Zannone},
  editor       = {Sven Dietrich and
                  Omar Chowdhury and
                  Daniel Takabi},
  title        = {Poster: {A} Flexible Relationship-Based Access Control Policy Generator},
  booktitle    = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and
                  Technologies, New York, NY, USA, June 8 - 10, 2022},
  pages        = {263--265},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3532105.3535032},
  doi          = {10.1145/3532105.3535032},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/ClarkYFZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SheikhalishahiS21,
  author       = {Mina Sheikhalishahi and
                  Ischa Stork and
                  Nicola Zannone},
  title        = {Privacy-preserving policy evaluation in multi-party access control},
  journal      = {J. Comput. Secur.},
  volume       = {29},
  number       = {6},
  pages        = {613--650},
  year         = {2021},
  url          = {https://doi.org/10.3233/JCS-200007},
  doi          = {10.3233/JCS-200007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SheikhalishahiS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DooremaalBAZ21,
  author       = {Bram van Dooremaal and
                  Pavlo Burda and
                  Luca Allodi and
                  Nicola Zannone},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {Combining Text and Visual Features to Improve the Identification of
                  Cloned Webpages for Early Phishing Detection},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {60:1--60:10},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3470112},
  doi          = {10.1145/3465481.3470112},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DooremaalBAZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AlishahiZ21,
  author       = {Mina Alishahi and
                  Nicola Zannone},
  editor       = {Ken Barker and
                  Kambiz Ghazinour},
  title        = {Not a Free Lunch, But a Cheap One: On Classifiers Performance on Anonymized
                  Datasets},
  booktitle    = {Data and Applications Security and Privacy {XXXV} - 35th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12840},
  pages        = {237--258},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81242-3\_14},
  doi          = {10.1007/978-3-030-81242-3\_14},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/AlishahiZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BurdaAZ21,
  author       = {Pavlo Burda and
                  Luca Allodi and
                  Nicola Zannone},
  title        = {Dissecting Social Engineering Attacks Through the Lenses of Cognition},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {149--160},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSPW54576.2021.00024},
  doi          = {10.1109/EUROSPW54576.2021.00024},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BurdaAZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Lopuhaa-Zwakenberg21,
  author       = {Milan Lopuha{\"{a}}{-}Zwakenberg and
                  Mina Alishahi and
                  Jeroen Kivits and
                  Jordi Klarenbeek and
                  Gert{-}Jan van der Velde and
                  Nicola Zannone},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Comparing Classifiers' Performance under Differential Privacy},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {50--61},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010519000500061},
  doi          = {10.5220/0010519000500061},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Lopuhaa-Zwakenberg21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SinigagliaCCZ20,
  author       = {Federico Sinigaglia and
                  Roberto Carbone and
                  Gabriele Costa and
                  Nicola Zannone},
  title        = {A survey on multi-factor authentication for online banking in the
                  wild},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101745},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101745},
  doi          = {10.1016/J.COSE.2020.101745},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SinigagliaCCZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AllodiCPZ20,
  author       = {Luca Allodi and
                  Tzouliano Chotza and
                  Ekaterina Panina and
                  Nicola Zannone},
  title        = {The Need for New Antiphishing Measures Against Spear-Phishing Attacks},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {2},
  pages        = {23--34},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2019.2940952},
  doi          = {10.1109/MSEC.2019.2940952},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AllodiCPZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BurdaCAZ20,
  author       = {Pavlo Burda and
                  Tzouliano Chotza and
                  Luca Allodi and
                  Nicola Zannone},
  editor       = {Melanie Volkamer and
                  Christian Wressnegger},
  title        = {Testing the effectiveness of tailored phishing techniques in industry
                  and academia: a field experiment},
  booktitle    = {{ARES} 2020: The 15th International Conference on Availability, Reliability
                  and Security, Virtual Event, Ireland, August 25-28, 2020},
  pages        = {3:1--3:10},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3407023.3409178},
  doi          = {10.1145/3407023.3409178},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BurdaCAZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/RivaVZ20,
  author       = {Giovanni Maria Riva and
                  Alexandr Vasenev and
                  Nicola Zannone},
  editor       = {Melanie Volkamer and
                  Christian Wressnegger},
  title        = {SoK: engineering privacy-aware high-tech systems},
  booktitle    = {{ARES} 2020: The 15th International Conference on Availability, Reliability
                  and Security, Virtual Event, Ireland, August 25-28, 2020},
  pages        = {19:1--19:10},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3407023.3407061},
  doi          = {10.1145/3407023.3407061},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/RivaVZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MeijaardCMZ20,
  author       = {Yoram J. Meijaard and
                  Bram C. M. Cappers and
                  Josh G. M. Mengerink and
                  Nicola Zannone},
  editor       = {Anoop Singhal and
                  Jaideep Vaidya},
  title        = {Predictive Analytics to Prevent Voice over {IP} International Revenue
                  Sharing Fraud},
  booktitle    = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12122},
  pages        = {241--260},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49669-2\_14},
  doi          = {10.1007/978-3-030-49669-2\_14},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/MeijaardCMZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PaciBQZ20,
  author       = {Federica Paci and
                  Davide Bianchin and
                  Elisa Quintarelli and
                  Nicola Zannone},
  editor       = {Andrea Saracino and
                  Paolo Mori},
  title        = {{IFTTT} Privacy Checker},
  booktitle    = {Emerging Technologies for Authorization and Authentication - Third
                  International Workshop, {ETAA} 2020, Guildford, UK, September 18,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12515},
  pages        = {90--107},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64455-0\_6},
  doi          = {10.1007/978-3-030-64455-0\_6},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/PaciBQZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BurdaAZ20,
  author       = {Pavlo Burda and
                  Luca Allodi and
                  Nicola Zannone},
  title        = {Don't Forget the Human: a Crowdsourced Approach to Automate Response
                  and Containment Against Spear Phishing Attacks},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  Workshops 2020, Genoa, Italy, September 7-11, 2020},
  pages        = {471--476},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSPW51379.2020.00069},
  doi          = {10.1109/EUROSPW51379.2020.00069},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BurdaAZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PiroccaAZ20,
  author       = {Simone Pirocca and
                  Luca Allodi and
                  Nicola Zannone},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {A Toolkit for Security Awareness Training Against Targeted Phishing},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {137--159},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_9},
  doi          = {10.1007/978-3-030-65610-2\_9},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/PiroccaAZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/RavidasRZ20,
  author       = {Sowmya Ravidas and
                  Indrakshi Ray and
                  Nicola Zannone},
  title        = {Handling Incomplete Information in Policy Evaluation using Attribute
                  Similarity},
  booktitle    = {Second {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta,
                  GA, USA, October 28-31, 2020},
  pages        = {79--88},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPS-ISA50397.2020.00021},
  doi          = {10.1109/TPS-ISA50397.2020.00021},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/RavidasRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SheikhalishahiZ20,
  author       = {Mina Sheikhalishahi and
                  Nicola Zannone},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {On the Comparison of Classifiers' Construction over Private Inputs},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {691--698},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00096},
  doi          = {10.1109/TRUSTCOM50675.2020.00096},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/SheikhalishahiZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/SheikhalishahiZ20,
  author       = {Mina Sheikhalishahi and
                  Nicola Zannone},
  title        = {Privacy Preserving Statistical Detection of Adversarial Instances},
  booktitle    = {29th {IEEE} International Conference on Enabling Technologies: Infrastructure
                  for Collaborative Enterprises, {WETICE} 2020, Virtual Event, France,
                  September 10-13, 2020},
  pages        = {159--164},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WETICE49692.2020.00039},
  doi          = {10.1109/WETICE49692.2020.00039},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/SheikhalishahiZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/GengaPCDZ20,
  author       = {Laura Genga and
                  Domenico Potena and
                  Andrea Chiorrini and
                  Claudia Diamantini and
                  Nicola Zannone},
  editor       = {Annalisa Appice and
                  Michelangelo Ceci and
                  Corrado Loglisci and
                  Giuseppe Manco and
                  Elio Masciari and
                  Zbigniew W. Ras},
  title        = {A Latitudinal Study on the Use of Sequential and Concurrency Patterns
                  in Deviance Mining},
  booktitle    = {Complex Pattern Mining - New Challenges, Methods and Applications},
  series       = {Studies in Computational Intelligence},
  volume       = {880},
  pages        = {103--119},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-36617-9\_7},
  doi          = {10.1007/978-3-030-36617-9\_7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/sci/GengaPCDZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GengaZS19,
  author       = {Laura Genga and
                  Nicola Zannone and
                  Anna Cinzia Squicciarini},
  title        = {Discovering reliable evidence of data misuse by exploiting rule redundancy},
  journal      = {Comput. Secur.},
  volume       = {87},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.101577},
  doi          = {10.1016/J.COSE.2019.101577},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GengaZS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/MorissetWZ19,
  author       = {Charles Morisset and
                  Tim A. C. Willemse and
                  Nicola Zannone},
  title        = {A framework for the extended evaluation of {ABAC} policies},
  journal      = {Cybersecur.},
  volume       = {2},
  number       = {1},
  pages        = {6},
  year         = {2019},
  url          = {https://doi.org/10.1186/s42400-019-0024-0},
  doi          = {10.1186/S42400-019-0024-0},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/MorissetWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/RavidasLPZ19,
  author       = {Sowmya Ravidas and
                  Alexios Lekidis and
                  Federica Paci and
                  Nicola Zannone},
  title        = {Access control in Internet-of-Things: {A} survey},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {144},
  pages        = {79--101},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jnca.2019.06.017},
  doi          = {10.1016/J.JNCA.2019.06.017},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/RavidasLPZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aike/NasirianiSSGZ19,
  author       = {Neda Nasiriani and
                  Anna Cinzia Squicciarini and
                  Zara Saldanha and
                  Sanchit Goel and
                  Nicola Zannone},
  title        = {Hierarchical Clustering for Discrimination Discovery: {A} Top-Down
                  Approach},
  booktitle    = {2nd {IEEE} International Conference on Artificial Intelligence and
                  Knowledge Engineering, {AIKE} 2019, Sardinia, Italy, June 3-5, 2019},
  pages        = {187--194},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AIKE.2019.00041},
  doi          = {10.1109/AIKE.2019.00041},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aike/NasirianiSSGZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bpm/GengaFGZ19,
  author       = {Laura Genga and
                  Chiara Di Francescomarino and
                  Chiara Ghidini and
                  Nicola Zannone},
  editor       = {Thomas T. Hildebrandt and
                  Boudewijn F. van Dongen and
                  Maximilian R{\"{o}}glinger and
                  Jan Mendling},
  title        = {Predicting Critical Behaviors in Business Process Executions: When
                  Evidence Counts},
  booktitle    = {Business Process Management Forum - {BPM} Forum 2019, Vienna, Austria,
                  September 1-6, 2019, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {360},
  pages        = {72--90},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26643-1\_5},
  doi          = {10.1007/978-3-030-26643-1\_5},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bpm/GengaFGZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GengaAZ19,
  author       = {Laura Genga and
                  Luca Allodi and
                  Nicola Zannone},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Unveiling Systematic Biases in Decisional Processes: An Application
                  to Discrimination Discovery},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329856},
  doi          = {10.1145/3321705.3329856},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GengaAZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RavidasKDZ19,
  author       = {Sowmya Ravidas and
                  Priyanka Karkhanis and
                  Yanja Dajsuren and
                  Nicola Zannone},
  editor       = {Andrea Saracino and
                  Paolo Mori},
  title        = {An Authorization Framework for Cooperative Intelligent Transport Systems},
  booktitle    = {Emerging Technologies for Authorization and Authentication - Second
                  International Workshop, {ETAA} 2019, Luxembourg City, Luxembourg,
                  September 27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11967},
  pages        = {16--34},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39749-4\_2},
  doi          = {10.1007/978-3-030-39749-4\_2},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/RavidasKDZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/MorissetRZ19,
  author       = {Charles Morisset and
                  Sowmya Ravidas and
                  Nicola Zannone},
  editor       = {Abdelmalek Benzekri and
                  Michel Barbeau and
                  Guang Gong and
                  Romain Laborde and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {On Attribute Retrieval in {ABAC}},
  booktitle    = {Foundations and Practice of Security - 12th International Symposium,
                  {FPS} 2019, Toulouse, France, November 5-7, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12056},
  pages        = {225--241},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-45371-8\_14},
  doi          = {10.1007/978-3-030-45371-8\_14},
  timestamp    = {Wed, 07 Dec 2022 23:10:28 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/MorissetRZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BertolissiHZ19,
  author       = {Clara Bertolissi and
                  Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Florian Kerschbaum and
                  Atefeh Mashatan and
                  Jianwei Niu and
                  Adam J. Lee},
  title        = {Using Provenance for Secure Data Fusion in Cooperative Systems},
  booktitle    = {Proceedings of the 24th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019},
  pages        = {185--194},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3322431.3325100},
  doi          = {10.1145/3322431.3325100},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/BertolissiHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/SheikhalishahiT19,
  author       = {Mina Sheikhalishahi and
                  Gamze Tillem and
                  Zekeriya Erkin and
                  Nicola Zannone},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Josep Domingo{-}Ferrer},
  title        = {Privacy-Preserving Multi-Party Access Control},
  booktitle    = {Proceedings of the 18th {ACM} Workshop on Privacy in the Electronic
                  Society, WPES@CCS 2019, London, UK, November 11, 2019},
  pages        = {1--13},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338498.3358643},
  doi          = {10.1145/3338498.3358643},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/SheikhalishahiT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LeHZ18,
  author       = {Van Huynh Le and
                  Jerry den Hartog and
                  Nicola Zannone},
  title        = {Security and privacy for innovative automotive applications: {A} survey},
  journal      = {Comput. Commun.},
  volume       = {132},
  pages        = {17--41},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comcom.2018.09.010},
  doi          = {10.1016/J.COMCOM.2018.09.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/LeHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlizadehLFZA18,
  author       = {Mahdi Alizadeh and
                  Xixi Lu and
                  Dirk Fahland and
                  Nicola Zannone and
                  Wil M. P. van der Aalst},
  title        = {Linking data and process perspectives for conformance analysis},
  journal      = {Comput. Secur.},
  volume       = {73},
  pages        = {172--193},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.10.010},
  doi          = {10.1016/J.COSE.2017.10.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlizadehLFZA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/PaciSZ18,
  author       = {Federica Paci and
                  Anna Cinzia Squicciarini and
                  Nicola Zannone},
  title        = {Survey on Access Control for Community-Centered Collaborative Systems},
  journal      = {{ACM} Comput. Surv.},
  volume       = {51},
  number       = {1},
  pages        = {6:1--6:38},
  year         = {2018},
  url          = {https://doi.org/10.1145/3146025},
  doi          = {10.1145/3146025},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/PaciSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiis/GengaAPDZ18,
  author       = {Laura Genga and
                  Mahdi Alizadeh and
                  Domenico Potena and
                  Claudia Diamantini and
                  Nicola Zannone},
  title        = {Discovering anomalous frequent patterns from partially ordered event
                  logs},
  journal      = {J. Intell. Inf. Syst.},
  volume       = {51},
  number       = {2},
  pages        = {257--300},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10844-018-0501-z},
  doi          = {10.1007/S10844-018-0501-Z},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jiis/GengaAPDZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/SalnitriAGZG18,
  author       = {Mattia Salnitri and
                  Mahdi Alizadeh and
                  Daniele Giovanella and
                  Nicola Zannone and
                  Paolo Giorgini},
  editor       = {Jan Mendling and
                  Haralambos Mouratidis},
  title        = {From Security-by-Design to the Identification of Security-Critical
                  Deviations in Process Executions},
  booktitle    = {Information Systems in the Big Data Era - CAiSE Forum 2018, Tallinn,
                  Estonia, June 11-15, 2018, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {317},
  pages        = {218--234},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-92901-9\_19},
  doi          = {10.1007/978-3-319-92901-9\_19},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/SalnitriAGZG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ArgentoMPSZ18,
  author       = {Luciano Argento and
                  Andrea Margheri and
                  Federica Paci and
                  Vladimiro Sassone and
                  Nicola Zannone},
  editor       = {Florian Kerschbaum and
                  Stefano Paraboschi},
  title        = {Towards Adaptive Access Control},
  booktitle    = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10980},
  pages        = {99--109},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95729-6\_7},
  doi          = {10.1007/978-3-319-95729-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ArgentoMPSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/GengaZ18,
  author       = {Laura Genga and
                  Nicola Zannone},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Paulo Novais and
                  Panagiotis G. Sarigiannidis and
                  Sebastiano Battiato and
                  {\'{A}}ngel Serrano S{\'{a}}nchez de Le{\'{o}}n and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Towards a Systematic Process-aware Behavioral Analysis for Security},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 1: DCNET, ICE-B, OPTICS,
                  {SIGMAP} and WINSYS, Porto, Portugal, July 26-28, 2018},
  pages        = {626--635},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006944606260635},
  doi          = {10.5220/0006944606260635},
  timestamp    = {Wed, 29 Aug 2018 15:17:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/GengaZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/LeHZ18,
  author       = {Van Huynh Le and
                  Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Paulo Novais and
                  Panagiotis G. Sarigiannidis and
                  Sebastiano Battiato and
                  {\'{A}}ngel Serrano S{\'{a}}nchez de Le{\'{o}}n and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Feature Selection for Anomaly Detection in Vehicular Ad Hoc Networks},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 1: DCNET, ICE-B, OPTICS,
                  {SIGMAP} and WINSYS, Porto, Portugal, July 26-28, 2018},
  pages        = {647--657},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006946806470657},
  doi          = {10.5220/0006946806470657},
  timestamp    = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/LeHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/LeRAZ18,
  author       = {Tho Le and
                  Roland van Rijswijk{-}Deij and
                  Luca Allodi and
                  Nicola Zannone},
  title        = {Economic incentives on {DNSSEC} deployment: Time to move from quantity
                  to quality},
  booktitle    = {2018 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2018, Taipei, Taiwan, April 23-27, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NOMS.2018.8406223},
  doi          = {10.1109/NOMS.2018.8406223},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/noms/LeRAZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/AlizadehPEZ18,
  author       = {Mahdi Alizadeh and
                  Sander Peters and
                  Sandro Etalle and
                  Nicola Zannone},
  editor       = {Hisham M. Haddad and
                  Roger L. Wainwright and
                  Richard Chbeir},
  title        = {Behavior analysis in the medical sector: theory and practice},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing,
                  {SAC} 2018, Pau, France, April 09-13, 2018},
  pages        = {1637--1646},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3167132.3167307},
  doi          = {10.1145/3167132.3167307},
  timestamp    = {Wed, 25 Sep 2019 18:12:13 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/AlizadehPEZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/SquicciariniRZ18,
  author       = {Anna Cinzia Squicciarini and
                  Sarah Michele Rajtmajer and
                  Nicola Zannone},
  editor       = {Elisa Bertino and
                  Dan Lin and
                  Jorge Lobo},
  title        = {Multi-Party Access Control: Requirements, State of the Art and Open
                  Challenges},
  booktitle    = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15,
                  2018},
  pages        = {49},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3205977.3205999},
  doi          = {10.1145/3205977.3205999},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/SquicciariniRZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/MorissetWZ18,
  author       = {Charles Morisset and
                  Tim A. C. Willemse and
                  Nicola Zannone},
  editor       = {Elisa Bertino and
                  Dan Lin and
                  Jorge Lobo},
  title        = {Efficient Extended {ABAC} Evaluation},
  booktitle    = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15,
                  2018},
  pages        = {149--160},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3205977.3205980},
  doi          = {10.1145/3205977.3205980},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/MorissetWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/AhmadMRZ18,
  author       = {Tahir Ahmad and
                  Umberto Morelli and
                  Silvio Ranise and
                  Nicola Zannone},
  editor       = {Elisa Bertino and
                  Dan Lin and
                  Jorge Lobo},
  title        = {A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An
                  {AWS} Case Study},
  booktitle    = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15,
                  2018},
  pages        = {235--246},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3205977.3205989},
  doi          = {10.1145/3205977.3205989},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/AhmadMRZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TurkmenHRZ17,
  author       = {Fatih Turkmen and
                  Jerry den Hartog and
                  Silvio Ranise and
                  Nicola Zannone},
  title        = {Formal analysis of {XACML} policies using {SMT}},
  journal      = {Comput. Secur.},
  volume       = {66},
  pages        = {185--203},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2017.01.009},
  doi          = {10.1016/J.COSE.2017.01.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TurkmenHRZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bpm/GengaAPDZ17,
  author       = {Laura Genga and
                  Mahdi Alizadeh and
                  Domenico Potena and
                  Claudia Diamantini and
                  Nicola Zannone},
  editor       = {Robert Claris{\'{o}} and
                  Henrik Leopold and
                  Jan Mendling and
                  Wil M. P. van der Aalst and
                  Akhil Kumar and
                  Brian T. Pentland and
                  Mathias Weske},
  title        = {{APD} tool: Mining Anomalous Patterns from Event Logs},
  booktitle    = {Proceedings of the {BPM} Demo Track and {BPM} Dissertation Award co-located
                  with 15th International Conference on Business Process Modeling {(BPM}
                  2017), Barcelona, Spain, September 13, 2017},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1920},
  publisher    = {CEUR-WS.org},
  year         = {2017},
  url          = {https://ceur-ws.org/Vol-1920/BPM\_2017\_paper\_186.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:55 +0100},
  biburl       = {https://dblp.org/rec/conf/bpm/GengaAPDZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/simpda/TaxGZ17,
  author       = {Niek Tax and
                  Laura Genga and
                  Nicola Zannone},
  editor       = {Paolo Ceravolo and
                  Maurice van Keulen and
                  Kilian Stoffel},
  title        = {On the Use of Hierarchical Subtrace Mining for Efficient Local Process
                  Model Mining},
  booktitle    = {Proceedings of the 7th International Symposium on Data-driven Process
                  Discovery and Analysis {(SIMPDA} 2017), Neuch{\^{a}}tel, Switzerland,
                  December 6-8, 2017},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2016},
  pages        = {8--22},
  publisher    = {CEUR-WS.org},
  year         = {2017},
  url          = {https://ceur-ws.org/Vol-2016/paper2.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:35 +0100},
  biburl       = {https://dblp.org/rec/conf/simpda/TaxGZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/simpda/GengaTZ17,
  author       = {Laura Genga and
                  Niek Tax and
                  Nicola Zannone},
  editor       = {Paolo Ceravolo and
                  Maurice van Keulen and
                  Kilian Stoffel},
  title        = {Mining Local Process Models and Their Correlations},
  booktitle    = {Data-Driven Process Discovery and Analysis - 7th {IFIP} {WG} 2.6 International
                  Symposium, {SIMPDA} 2017, Neuchatel, Switzerland, December 6-8, 2017,
                  Revised Selected Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {340},
  pages        = {65--88},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-11638-5\_4},
  doi          = {10.1007/978-3-030-11638-5\_4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/simpda/GengaTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SkoricHZ16,
  author       = {Boris Skoric and
                  Sebastiaan J. A. de Hoogh and
                  Nicola Zannone},
  title        = {Flow-based reputation with uncertainty: evidence-based subjective
                  logic},
  journal      = {Int. J. Inf. Sec.},
  volume       = {15},
  number       = {4},
  pages        = {381--402},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10207-015-0298-5},
  doi          = {10.1007/S10207-015-0298-5},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/SkoricHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/VavilisPZ16,
  author       = {Sokratis Vavilis and
                  Milan Petkovic and
                  Nicola Zannone},
  title        = {A severity-based quantification of data leakages in database systems},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {321--345},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160543},
  doi          = {10.3233/JCS-160543},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/VavilisPZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/VavilisEPZ16,
  author       = {Sokratis Vavilis and
                  Alexandru Ionut Egner and
                  Milan Petkovic and
                  Nicola Zannone},
  title        = {Role Mining with Missing Values},
  booktitle    = {11th International Conference on Availability, Reliability and Security,
                  {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016},
  pages        = {167--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ARES.2016.32},
  doi          = {10.1109/ARES.2016.32},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/VavilisEPZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/HartogZ16,
  author       = {Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  title        = {A Policy Framework for Data Fusion and Derived Data Control},
  booktitle    = {Proceedings of the 2016 {ACM} International Workshop on Attribute
                  Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA,
                  March 11, 2016},
  pages        = {47--57},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2875491.2875492},
  doi          = {10.1145/2875491.2875492},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/HartogZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AlizadehZ16,
  author       = {Mahdi Alizadeh and
                  Nicola Zannone},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Risk-based Analysis of Business Process Executions},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {130--132},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857742},
  doi          = {10.1145/2857705.2857742},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/AlizadehZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/EgnerLHZ16,
  author       = {Alexandru Ionut Egner and
                  Duc Luu and
                  Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {An Authorization Service for Collaborative Situation Awareness},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {136--138},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857740},
  doi          = {10.1145/2857705.2857740},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/EgnerLHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MahmudluHZ16,
  author       = {Rauf Mahmudlu and
                  Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Silvio Ranise and
                  Vipin Swarup},
  title        = {Data Governance and Transparency for Collaborative Systems},
  booktitle    = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9766},
  pages        = {199--216},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-41483-6\_15},
  doi          = {10.1007/978-3-319-41483-6\_15},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MahmudluHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HartogZ16,
  author       = {Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Indrajit Ray and
                  Manoj Singh Gaur and
                  Mauro Conti and
                  Dheeraj Sanghi and
                  V. Kamakoti},
  title        = {Collaborative Access Decisions: Why Has My Decision Not Been Enforced?},
  booktitle    = {Information Systems Security - 12th International Conference, {ICISS}
                  2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {109--130},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49806-5\_6},
  doi          = {10.1007/978-3-319-49806-5\_6},
  timestamp    = {Thu, 10 Sep 2020 09:33:08 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/HartogZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkdd/GengaPMADZ16,
  author       = {Laura Genga and
                  Domenico Potena and
                  Orazio Martino and
                  Mahdi Alizadeh and
                  Claudia Diamantini and
                  Nicola Zannone},
  editor       = {Annalisa Appice and
                  Michelangelo Ceci and
                  Corrado Loglisci and
                  Elio Masciari and
                  Zbigniew W. Ras},
  title        = {Subgraph Mining for Anomalous Pattern Discovery in Event Logs},
  booktitle    = {New Frontiers in Mining Complex Patterns - 5th International Workshop,
                  {NFMCP} 2016, Held in Conjunction with {ECML-PKDD} 2016, Riva del
                  Garda, Italy, September 19, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10312},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61461-8\_12},
  doi          = {10.1007/978-3-319-61461-8\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkdd/GengaPMADZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CostanteFEHZ16,
  author       = {Elisa Costante and
                  Davide Fauri and
                  Sandro Etalle and
                  Jerry den Hartog and
                  Nicola Zannone},
  title        = {A Hybrid Framework for Data Loss Prevention and Detection},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {324--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.24},
  doi          = {10.1109/SPW.2016.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/CostanteFEHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VavilisEPZ15,
  author       = {Sokratis Vavilis and
                  Alexandru Ionut Egner and
                  Milan Petkovic and
                  Nicola Zannone},
  title        = {An anomaly analysis framework for database systems},
  journal      = {Comput. Secur.},
  volume       = {53},
  pages        = {156--173},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.06.004},
  doi          = {10.1016/J.COSE.2015.06.004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VavilisEPZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fiict/KaluvuriEHZ15,
  author       = {Samuel Paul Kaluvuri and
                  Alexandru Ionut Egner and
                  Jerry den Hartog and
                  Nicola Zannone},
  title        = {{SAFAX} - An Extensible Authorization Service for Cloud Environments},
  journal      = {Frontiers {ICT}},
  volume       = {2},
  pages        = {9},
  year         = {2015},
  url          = {https://doi.org/10.3389/fict.2015.00009},
  doi          = {10.3389/FICT.2015.00009},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fiict/KaluvuriEHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/KatebZMCNMT15,
  author       = {Donia El Kateb and
                  Nicola Zannone and
                  Assaad Moawad and
                  Patrice Caire and
                  Gr{\'{e}}gory Nain and
                  Tejeddine Mouelhi and
                  Yves Le Traon},
  title        = {Conviviality-driven access control policy},
  journal      = {Requir. Eng.},
  volume       = {20},
  number       = {4},
  pages        = {363--382},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00766-014-0204-0},
  doi          = {10.1007/S00766-014-0204-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/KatebZMCNMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/TurkmenHRZ15,
  author       = {Fatih Turkmen and
                  Jerry den Hartog and
                  Silvio Ranise and
                  Nicola Zannone},
  editor       = {Riccardo Focardi and
                  Andrew C. Myers},
  title        = {Analysis of {XACML} Policies with {SMT}},
  booktitle    = {Principles of Security and Trust - 4th International Conference, {POST}
                  2015, Held as Part of the European Joint Conferences on Theory and
                  Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9036},
  pages        = {115--134},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46666-7\_7},
  doi          = {10.1007/978-3-662-46666-7\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/post/TurkmenHRZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/PaciZ15,
  author       = {Federica Paci and
                  Nicola Zannone},
  editor       = {Edgar R. Weippl and
                  Florian Kerschbaum and
                  Adam J. Lee},
  title        = {Preventing Information Inference in Access Control},
  booktitle    = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
                  Technologies, Vienna, Austria, June 1-3, 2015},
  pages        = {87--97},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2752952.2752971},
  doi          = {10.1145/2752952.2752971},
  timestamp    = {Mon, 26 Jun 2023 20:45:28 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/PaciZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CramptonMZ15,
  author       = {Jason Crampton and
                  Charles Morisset and
                  Nicola Zannone},
  editor       = {Edgar R. Weippl and
                  Florian Kerschbaum and
                  Adam J. Lee},
  title        = {On Missing Attributes in Access Control: Non-deterministic and Probabilistic
                  Attribute Retrieval},
  booktitle    = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
                  Technologies, Vienna, Austria, June 1-3, 2015},
  pages        = {99--109},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2752952.2752970},
  doi          = {10.1145/2752952.2752970},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/CramptonMZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssci/AlizadehLZ15,
  author       = {Mahdi Alizadeh and
                  Massimiliano de Leoni and
                  Nicola Zannone},
  title        = {Constructing Probable Explanations of Nonconformity: {A} Data-Aware
                  and History-Based Approach},
  booktitle    = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2015,
                  Cape Town, South Africa, December 7-10, 2015},
  pages        = {1358--1365},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/SSCI.2015.194},
  doi          = {10.1109/SSCI.2015.194},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssci/AlizadehLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/FeiriPPZK15,
  author       = {Michael Feiri and
                  Rolf Pielage and
                  Jonathan Petit and
                  Nicola Zannone and
                  Frank Kargl},
  title        = {Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication
                  in {VANET}},
  booktitle    = {{IEEE} 81st Vehicular Technology Conference, {VTC} Spring 2015, Glasgow,
                  United Kingdom, 11-14 May, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/VTCSpring.2015.7146029},
  doi          = {10.1109/VTCSPRING.2015.7146029},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/FeiriPPZK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/VavilisPZ14,
  author       = {Sokratis Vavilis and
                  Milan Petkovic and
                  Nicola Zannone},
  title        = {A reference model for reputation systems},
  journal      = {Decis. Support Syst.},
  volume       = {61},
  pages        = {147--154},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.dss.2014.02.002},
  doi          = {10.1016/J.DSS.2014.02.002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dss/VavilisPZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fiict/EtalleZ14,
  author       = {Sandro Etalle and
                  Nicola Zannone},
  title        = {Understanding Computer Security},
  journal      = {Frontiers {ICT}},
  volume       = {1},
  pages        = {3},
  year         = {2014},
  url          = {https://doi.org/10.3389/fict.2014.00003},
  doi          = {10.3389/FICT.2014.00003},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fiict/EtalleZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/VeeningenWZ14,
  author       = {Meilof Veeningen and
                  Benne de Weger and
                  Nicola Zannone},
  title        = {Data minimisation in communication protocols: a formal analysis framework
                  and application to identity management},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {6},
  pages        = {529--569},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-014-0235-z},
  doi          = {10.1007/S10207-014-0235-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/VeeningenWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tplp/TrivellatoZE14,
  author       = {Daniel Trivellato and
                  Nicola Zannone and
                  Sandro Etalle},
  title        = {{GEM:} {A} distributed goal evaluation algorithm for trust management},
  journal      = {Theory Pract. Log. Program.},
  volume       = {14},
  number       = {3},
  pages        = {293--337},
  year         = {2014},
  url          = {https://doi.org/10.1017/S1471068412000397},
  doi          = {10.1017/S1471068412000397},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tplp/TrivellatoZE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TurkmenHZ14,
  author       = {Fatih Turkmen and
                  Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{POSTER:} Analyzing Access Control Policies with {SMT}},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1508--1510},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662366},
  doi          = {10.1145/2660267.2662366},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TurkmenHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cts/DamenHZ14,
  author       = {Stan Damen and
                  Jerry den Hartog and
                  Nicola Zannone},
  title        = {CollAC: Collaborative access control},
  booktitle    = {2014 International Conference on Collaboration Technologies and Systems,
                  {CTS} 2014, Minneapolis, MN, USA, May 19-23, 2014},
  pages        = {142--149},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CTS.2014.6867557},
  doi          = {10.1109/CTS.2014.6867557},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cts/DamenHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/VavilisPZ14,
  author       = {Sokratis Vavilis and
                  Milan Petkovic and
                  Nicola Zannone},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Data Leakage Quantification},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {98--113},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_7},
  doi          = {10.1007/978-3-662-43936-4\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/VavilisPZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/MorissetZ14,
  author       = {Charles Morisset and
                  Nicola Zannone},
  editor       = {Sylvia L. Osborn and
                  Mahesh V. Tripunitara and
                  Ian M. Molloy},
  title        = {Reduction of access control decisions},
  booktitle    = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '14, London, ON, Canada - June 25 - 27, 2014},
  pages        = {53--62},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2613087.2613106},
  doi          = {10.1145/2613087.2613106},
  timestamp    = {Wed, 02 Jun 2021 09:13:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/MorissetZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/simpda/AlizadehLZ14,
  author       = {Mahdi Alizadeh and
                  Massimiliano de Leoni and
                  Nicola Zannone},
  editor       = {Rafael Accorsi and
                  Paolo Ceravolo and
                  Barbara Russo},
  title        = {History-based Construction of Log-Process Alignments for Conformance
                  Checking: Discovering What Really Went Wrong},
  booktitle    = {Proceedings of the 4th International Symposium on Data-driven Process
                  Discovery and Analysis {(SIMPDA} 2014), Milan, Italy, November 19-21,
                  2014},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1293},
  pages        = {1--15},
  publisher    = {CEUR-WS.org},
  year         = {2014},
  url          = {https://ceur-ws.org/Vol-1293/preface.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:35 +0100},
  biburl       = {https://dblp.org/rec/conf/simpda/AlizadehLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/simpda/AlizadehLZ14a,
  author       = {Mahdi Alizadeh and
                  Massimiliano de Leoni and
                  Nicola Zannone},
  editor       = {Paolo Ceravolo and
                  Barbara Russo and
                  Rafael Accorsi},
  title        = {History-Based Construction of Alignments for Conformance Checking:
                  Formalization and Implementation},
  booktitle    = {Data-Driven Process Discovery and Analysis - 4th International Symposium,
                  {SIMPDA} 2014, Milan, Italy, November 19-21, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {237},
  pages        = {58--78},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27243-6\_3},
  doi          = {10.1007/978-3-319-27243-6\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/simpda/AlizadehLZ14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SkoricHZ14,
  author       = {Boris Skoric and
                  Sebastiaan de Hoogh and
                  Nicola Zannone},
  title        = {Flow-based reputation with uncertainty: Evidence-Based Subjective
                  Logic},
  journal      = {CoRR},
  volume       = {abs/1402.3319},
  year         = {2014},
  url          = {http://arxiv.org/abs/1402.3319},
  eprinttype    = {arXiv},
  eprint       = {1402.3319},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SkoricHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcis/TrivellatoZGSE13,
  author       = {Daniel Trivellato and
                  Nicola Zannone and
                  Maurice Glaundrup and
                  Jacek Skowronek and
                  Sandro Etalle},
  title        = {A Semantic Security Framework for Systems of Systems},
  journal      = {Int. J. Cooperative Inf. Syst.},
  volume       = {22},
  number       = {1},
  year         = {2013},
  url          = {https://doi.org/10.1142/S0218843013500044},
  doi          = {10.1142/S0218843013500044},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcis/TrivellatoZGSE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/AdriansyahDZ13,
  author       = {Arya Adriansyah and
                  Boudewijn F. van Dongen and
                  Nicola Zannone},
  title        = {Privacy Analysis of User Behavior Using Alignments},
  journal      = {it Inf. Technol.},
  volume       = {55},
  number       = {6},
  pages        = {255--260},
  year         = {2013},
  url          = {https://doi.org/10.1524/itit.2013.2006},
  doi          = {10.1524/ITIT.2013.2006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/it/AdriansyahDZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jwsr/CostantePZ13,
  author       = {Elisa Costante and
                  Federica Paci and
                  Nicola Zannone},
  title        = {Privacy-Aware Web Service Composition and Ranking},
  journal      = {Int. J. Web Serv. Res.},
  volume       = {10},
  number       = {3},
  pages        = {1--23},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijwsr.2013070101},
  doi          = {10.4018/IJWSR.2013070101},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jwsr/CostantePZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/GursesSZ13,
  author       = {Seda F. G{\"{u}}rses and
                  Magali Seguran and
                  Nicola Zannone},
  title        = {Requirements engineering within a large-scale security-oriented research
                  project: lessons learned},
  journal      = {Requir. Eng.},
  volume       = {18},
  number       = {1},
  pages        = {43--66},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00766-011-0139-7},
  doi          = {10.1007/S00766-011-0139-7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/GursesSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbms/VavilisZP13,
  author       = {Sokratis Vavilis and
                  Nicola Zannone and
                  Milan Petkovic},
  editor       = {Pedro Pereira Rodrigues and
                  Mykola Pechenizkiy and
                  Jo{\~{a}}o Gama and
                  Ricardo Cruz{-}Correia and
                  Jiming Liu and
                  Agma J. M. Traina and
                  Peter J. F. Lucas and
                  Paolo Soda},
  title        = {Data reliability in home healthcare services},
  booktitle    = {Proceedings of the 26th {IEEE} International Symposium on Computer-Based
                  Medical Systems, Porto, Portugal, June 20-22, 2013},
  pages        = {377--380},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CBMS.2013.6627820},
  doi          = {10.1109/CBMS.2013.6627820},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cbms/VavilisZP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VeeningenBHZ13,
  author       = {Meilof Veeningen and
                  Mayla Brus{\`{o}} and
                  Jerry den Hartog and
                  Nicola Zannone},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {{TRIPLEX:} verifying data minimisation in communication systems},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1415--1418},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2512514},
  doi          = {10.1145/2508859.2512514},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VeeningenBHZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/VeeningenPZ13,
  author       = {Meilof Veeningen and
                  Antonio Piepoli and
                  Nicola Zannone},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Georgios V. Lioudakis and
                  Nora Cuppens{-}Boulahia and
                  Simon N. Foley and
                  William M. Fitzgerald},
  title        = {Are On-Line Personae Really Unlinkable?},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security - 8th
                  International Workshop, {DPM} 2013, and 6th International Workshop,
                  {SETOP} 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8247},
  pages        = {369--379},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-54568-9\_24},
  doi          = {10.1007/978-3-642-54568-9\_24},
  timestamp    = {Sun, 25 Oct 2020 22:34:56 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/VeeningenPZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/CostantePZ13,
  author       = {Elisa Costante and
                  Federica Paci and
                  Nicola Zannone},
  title        = {Privacy-Aware Web Service Composition and Ranking},
  booktitle    = {2013 {IEEE} 20th International Conference on Web Services, Santa Clara,
                  CA, USA, June 28 - July 3, 2013},
  pages        = {131--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICWS.2013.27},
  doi          = {10.1109/ICWS.2013.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/CostantePZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/VeeningenWZ13,
  author       = {Meilof Veeningen and
                  Benne de Weger and
                  Nicola Zannone},
  editor       = {M. Carmen Fern{\'{a}}ndez Gago and
                  Fabio Martinelli and
                  Siani Pearson and
                  Isaac Agudo},
  title        = {Symbolic Privacy Analysis through Linkability and Detectability},
  booktitle    = {Trust Management {VII} - 7th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2013, Malaga, Spain, June 3-7, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {401},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38323-6\_1},
  doi          = {10.1007/978-3-642-38323-6\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/VeeningenWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/EgeaPPZ13,
  author       = {Marina Egea and
                  Federica Paci and
                  Marinella Petrocchi and
                  Nicola Zannone},
  editor       = {M. Carmen Fern{\'{a}}ndez Gago and
                  Fabio Martinelli and
                  Siani Pearson and
                  Isaac Agudo},
  title        = {{PERSONA} - {A} Personalized Data Protection Framework},
  booktitle    = {Trust Management {VII} - 7th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2013, Malaga, Spain, June 3-7, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {401},
  pages        = {272--280},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38323-6\_22},
  doi          = {10.1007/978-3-642-38323-6\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/EgeaPPZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/DamenZ13,
  author       = {Stan Damen and
                  Nicola Zannone},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Privacy Implications of Privacy Settings and Tagging in Facebook},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {121--138},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_16},
  doi          = {10.1007/978-3-319-06811-4\_16},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/DamenZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CostanteVEHPZ13,
  author       = {Elisa Costante and
                  Sokratis Vavilis and
                  Sandro Etalle and
                  Jerry den Hartog and
                  Milan Petkovic and
                  Nicola Zannone},
  editor       = {Pierangela Samarati},
  title        = {Database Anomalous Activities - Detection and Quantification},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {603--608},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223222/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CostanteVEHPZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/AdriansyahDZ13,
  author       = {Arya Adriansyah and
                  Boudewijn F. van Dongen and
                  Nicola Zannone},
  title        = {Controlling Break-the-Glass through Alignment},
  booktitle    = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom
                  2013, Washington, DC, USA, 8-14 September, 2013},
  pages        = {606--611},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SocialCom.2013.91},
  doi          = {10.1109/SOCIALCOM.2013.91},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/AdriansyahDZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/awareness/TrivellatoELZ13,
  author       = {Daniel Trivellato and
                  Sandro Etalle and
                  Erik Luit and
                  Nicola Zannone},
  editor       = {Pi{\"{e}}rre van de Laar and
                  Jan Tretmans and
                  Michael Borth},
  title        = {The {POLIPO} Security Framework},
  booktitle    = {Situation Awareness with Systems of Systems},
  pages        = {189--208},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-6230-9\_12},
  doi          = {10.1007/978-1-4614-6230-9\_12},
  timestamp    = {Sat, 30 Sep 2023 09:32:43 +0200},
  biburl       = {https://dblp.org/rec/books/sp/awareness/TrivellatoELZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitdm/SimoneSZ12,
  author       = {Antonino Simone and
                  Boris Skoric and
                  Nicola Zannone},
  title        = {Flow-Based Reputation: More than Just Ranking},
  journal      = {Int. J. Inf. Technol. Decis. Mak.},
  volume       = {11},
  number       = {3},
  pages        = {551--578},
  year         = {2012},
  url          = {https://doi.org/10.1142/S0219622012500113},
  doi          = {10.1142/S0219622012500113},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijitdm/SimoneSZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AsimIPTZ12,
  author       = {Muhammad Asim and
                  Tanya Ignatenko and
                  Milan Petkovic and
                  Daniel Trivellato and
                  Nicola Zannone},
  title        = {Enforcing Access Control in Virtual Organizations Using Hierarchical
                  Attribute-Based Encryption},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {212--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.78},
  doi          = {10.1109/ARES.2012.78},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AsimIPTZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bpm/BanescuPZ12,
  author       = {Sebastian Banescu and
                  Milan Petkovic and
                  Nicola Zannone},
  editor       = {Alistair Barros and
                  Avigdor Gal and
                  Ekkart Kindler},
  title        = {Measuring Privacy Compliance Using Fitness Metrics},
  booktitle    = {Business Process Management - 10th International Conference, {BPM}
                  2012, Tallinn, Estonia, September 3-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7481},
  pages        = {114--119},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32885-5\_8},
  doi          = {10.1007/978-3-642-32885-5\_8},
  timestamp    = {Mon, 16 Aug 2021 11:09:48 +0200},
  biburl       = {https://dblp.org/rec/conf/bpm/BanescuPZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/EtalleHLTZ12,
  author       = {Sandro Etalle and
                  Timothy L. Hinrichs and
                  Adam J. Lee and
                  Daniel Trivellato and
                  Nicola Zannone},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Ali Miri and
                  Nadia Tawbi},
  title        = {Policy Administration in Tag-Based Authorization},
  booktitle    = {Foundations and Practice of Security - 5th International Symposium,
                  {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7743},
  pages        = {162--179},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37119-6\_11},
  doi          = {10.1007/978-3-642-37119-6\_11},
  timestamp    = {Sun, 02 Oct 2022 16:01:32 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/EtalleHLTZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hcc/VavilisPZ12,
  author       = {Sokratis Vavilis and
                  Milan Petkovic and
                  Nicola Zannone},
  editor       = {Magda David Hercheui and
                  Diane Whitehouse and
                  William J. McIver Jr. and
                  Jackie Phahlamohlaka},
  title        = {Impact of {ICT} on Home Healthcare},
  booktitle    = {{ICT} Critical Infrastructures and Society - 10th {IFIP} {TC} 9 International
                  Conference on Human Choice and Computers, {HCC10} 2012, Amsterdam,
                  The Netherlands, September 27-28, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {386},
  pages        = {111--122},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33332-3\_11},
  doi          = {10.1007/978-3-642-33332-3\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hcc/VavilisPZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/VeeningenWZ12,
  author       = {Meilof Veeningen and
                  Benne de Weger and
                  Nicola Zannone},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Formal Modelling of (De)Pseudonymisation: {A} Case Study in Health
                  Care Privacy},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {145--160},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_10},
  doi          = {10.1007/978-3-642-38004-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/VeeningenWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1203-1820,
  author       = {Antonino Simone and
                  Boris Skoric and
                  Nicola Zannone},
  title        = {Flow-based reputation: more than just ranking},
  journal      = {CoRR},
  volume       = {abs/1203.1820},
  year         = {2012},
  url          = {http://arxiv.org/abs/1203.1820},
  eprinttype    = {arXiv},
  eprint       = {1203.1820},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1203-1820.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1205-5757,
  author       = {Muhammad Asim and
                  Tanya Ignatenko and
                  Milan Petkovic and
                  Daniel Trivellato and
                  Nicola Zannone},
  title        = {Enforcing Access Control in Virtual Organizations Using Hierarchical
                  Attribute-Based Encryption},
  journal      = {CoRR},
  volume       = {abs/1205.5757},
  year         = {2012},
  url          = {http://arxiv.org/abs/1205.5757},
  eprinttype    = {arXiv},
  eprint       = {1205.5757},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1205-5757.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/VeeningenWZ12,
  author       = {Meilof Veeningen and
                  Benne de Weger and
                  Nicola Zannone},
  title        = {Data Minimisation in Communication Protocols: {A} Formal Analysis
                  Framework and Application to Identity Management},
  journal      = {CoRR},
  volume       = {abs/1206.7111},
  year         = {2012},
  url          = {http://arxiv.org/abs/1206.7111},
  eprinttype    = {arXiv},
  eprint       = {1206.7111},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/VeeningenWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-0368,
  author       = {Daniel Trivellato and
                  Nicola Zannone and
                  Sandro Etalle},
  title        = {{GEM:} a Distributed Goal Evaluation Algorithm for Trust Management},
  journal      = {CoRR},
  volume       = {abs/1210.0368},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.0368},
  eprinttype    = {arXiv},
  eprint       = {1210.0368},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-0368.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aamas/MontaliTZMB11,
  author       = {Marco Montali and
                  Paolo Torroni and
                  Nicola Zannone and
                  Paola Mello and
                  Volha Bryl},
  title        = {Engineering and verifying agent-oriented requirements augmented by
                  business constraints with \emph{B}-Tropos},
  journal      = {Auton. Agents Multi Agent Syst.},
  volume       = {23},
  number       = {2},
  pages        = {193--223},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10458-010-9135-4},
  doi          = {10.1007/S10458-010-9135-4},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aamas/MontaliTZMB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/AsnarMSRFTKLSZ11,
  author       = {Yudistira Asnar and
                  Fabio Massacci and
                  Ayda Sa{\"{\i}}dane and
                  Carlo Riccucci and
                  Massimo Felici and
                  Alessandra Tedeschi and
                  Paul El Khoury and
                  Keqin Li and
                  Magali Seguran and
                  Nicola Zannone},
  title        = {Organizational Patterns for Security and Dependability: From Design
                  to Application},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {2},
  number       = {3},
  pages        = {1--22},
  year         = {2011},
  url          = {https://doi.org/10.4018/jsse.2011070101},
  doi          = {10.4018/JSSE.2011070101},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/AsnarMSRFTKLSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TrivellatoZE11,
  author       = {Daniel Trivellato and
                  Nicola Zannone and
                  Sandro Etalle},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: protecting information in systems of systems},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {865--868},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093513},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TrivellatoZE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esem/ElahiYZ11,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu and
                  Nicola Zannone},
  editor       = {James Walden and
                  Laurie A. Williams},
  title        = {Security Risk Management by Qualitative Vulnerability Analysis},
  booktitle    = {Third International Workshop on Security Measurements and Metrics,
                  Metrisec@ESEM 2011, Banff, Alberta, Canada, September 21, 2011},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/Metrisec.2011.12},
  doi          = {10.1109/METRISEC.2011.12},
  timestamp    = {Mon, 07 Sep 2020 10:46:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esem/ElahiYZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esem/BanescuZ11,
  author       = {Sebastian Banescu and
                  Nicola Zannone},
  editor       = {James Walden and
                  Laurie A. Williams},
  title        = {Measuring Privacy Compliance with Process Specifications},
  booktitle    = {Third International Workshop on Security Measurements and Metrics,
                  Metrisec@ESEM 2011, Banff, Alberta, Canada, September 21, 2011},
  pages        = {41--50},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/Metrisec.2011.10},
  doi          = {10.1109/METRISEC.2011.10},
  timestamp    = {Wed, 29 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esem/BanescuZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/VeeningenWZ11,
  author       = {Meilof Veeningen and
                  Benne de Weger and
                  Nicola Zannone},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Formal Privacy Analysis of Communication Protocols for Identity Management},
  booktitle    = {Information Systems Security - 7th International Conference, {ICISS}
                  2011, Kolkata, India, December 15-19, 2011, Procedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {235--249},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25560-1\_16},
  doi          = {10.1007/978-3-642-25560-1\_16},
  timestamp    = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/VeeningenWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/TrivellatoZE11,
  author       = {Daniel Trivellato and
                  Nicola Zannone and
                  Sandro Etalle},
  title        = {A Security Framework for Systems of Systems},
  booktitle    = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Pisa, Italy, 6-8 June 2011},
  pages        = {182--183},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/POLICY.2011.16},
  doi          = {10.1109/POLICY.2011.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/TrivellatoZE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/PetkovicPZ11,
  author       = {Milan Petkovic and
                  Davide Prandi and
                  Nicola Zannone},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Purpose Control: Did You Process the Data for the Intended Purpose?},
  booktitle    = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle,
                  WA, USA, September 2, 2011, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6933},
  pages        = {145--168},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23556-6\_10},
  doi          = {10.1007/978-3-642-23556-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/PetkovicPZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/mit/11/MassacciZ11,
  author       = {Fabio Massacci and
                  Nicola Zannone},
  editor       = {Eric S. K. Yu and
                  Paolo Giorgini and
                  Neil A. M. Maiden and
                  John Mylopoulos},
  title        = {Detecting Conflicts between Functional and Security Requirements with
                  Secure Tropos: John Rusnak and the Allied Irish Bank},
  booktitle    = {Social Modeling for Requirements Engineering},
  series       = {Cooperative information systems},
  pages        = {337--362},
  publisher    = {{MIT} Press},
  year         = {2011},
  timestamp    = {Fri, 22 May 2020 12:08:24 +0200},
  biburl       = {https://dblp.org/rec/books/mit/11/MassacciZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/essos/2011,
  editor       = {{\'{U}}lfar Erlingsson and
                  Roel J. Wieringa and
                  Nicola Zannone},
  title        = {Engineering Secure Software and Systems - Third International Symposium,
                  ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6542},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19125-1},
  doi          = {10.1007/978-3-642-19125-1},
  isbn         = {978-3-642-19124-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jtaer/BohmEHHTTZ10,
  author       = {Klemens B{\"{o}}hm and
                  Sandro Etalle and
                  Jerry den Hartog and
                  Christian H{\"{u}}tter and
                  Slim Trabelsi and
                  Daniel Trivellato and
                  Nicola Zannone},
  title        = {A Flexible Architecture for Privacy-Aware Trust Management},
  journal      = {J. Theor. Appl. Electron. Commer. Res.},
  volume       = {5},
  number       = {2},
  pages        = {77--96},
  year         = {2010},
  url          = {https://doi.org/10.4067/s0718-18762010000200006},
  doi          = {10.4067/S0718-18762010000200006},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jtaer/BohmEHHTTZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/ElahiYZ10,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu and
                  Nicola Zannone},
  title        = {A vulnerability-centric requirements engineering framework: analyzing
                  security attacks, countermeasures, and requirements based on vulnerabilities},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {1},
  pages        = {41--62},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-009-0090-z},
  doi          = {10.1007/S00766-009-0090-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/ElahiYZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/VeeningenWZ10,
  author       = {Meilof Veeningen and
                  Benne de Weger and
                  Nicola Zannone},
  editor       = {Pierpaolo Degano and
                  Sandro Etalle and
                  Joshua D. Guttman},
  title        = {Modeling Identity-Related Properties and Their Privacy Strength},
  booktitle    = {Formal Aspects of Security and Trust - 7th International Workshop,
                  {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6561},
  pages        = {126--140},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19751-2\_9},
  doi          = {10.1007/978-3-642-19751-2\_9},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/VeeningenWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZannonePE10,
  author       = {Nicola Zannone and
                  Milan Petkovic and
                  Sandro Etalle},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Towards Data Protection Compliance},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {213--216},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZannonePE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/MassacciMZ10,
  author       = {Fabio Massacci and
                  John Mylopoulos and
                  Nicola Zannone},
  editor       = {Zbigniew W. Ras and
                  Li{-}Shiang Tsay},
  title        = {Security Requirements Engineering: The SI* Modeling Language and the
                  Secure Tropos Methodology},
  booktitle    = {Advances in Intelligent Information Systems},
  series       = {Studies in Computational Intelligence},
  volume       = {265},
  pages        = {147--174},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-05183-8\_6},
  doi          = {10.1007/978-3-642-05183-8\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/sci/MassacciMZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/essos/2010,
  editor       = {Fabio Massacci and
                  Dan S. Wallach and
                  Nicola Zannone},
  title        = {Engineering Secure Software and Systems, Second International Symposium,
                  ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5965},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11747-3},
  doi          = {10.1007/978-3-642-11747-3},
  isbn         = {978-3-642-11746-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0031232,
  author       = {Nicola Zannone},
  title        = {Security Agent-Oriented Requirements Engineering - the SI* Modeling
                  Language and the Secure Tropos Methodology},
  publisher    = {{VDM}},
  year         = {2009},
  isbn         = {978-3-639-17654-4},
  timestamp    = {Fri, 05 Jul 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0031232.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ail/CompagnaKKMZ09,
  author       = {Luca Compagna and
                  Paul El Khoury and
                  Alzbeta Krausov{\'{a}} and
                  Fabio Massacci and
                  Nicola Zannone},
  title        = {How to integrate legal requirements into a requirements engineering
                  methodology for the development of security and privacy patterns},
  journal      = {Artif. Intell. Law},
  volume       = {17},
  number       = {1},
  pages        = {1--30},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10506-008-9067-3},
  doi          = {10.1007/S10506-008-9067-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ail/CompagnaKKMZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/Zannone09,
  author       = {Nicola Zannone},
  title        = {The Si* Modeling Framework: Metamodel and Applications},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {19},
  number       = {5},
  pages        = {727--746},
  year         = {2009},
  url          = {https://doi.org/10.1142/S0218194009004374},
  doi          = {10.1142/S0218194009004374},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/Zannone09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/GuardaZ09,
  author       = {Paolo Guarda and
                  Nicola Zannone},
  title        = {Towards the development of privacy-aware systems},
  journal      = {Inf. Softw. Technol.},
  volume       = {51},
  number       = {2},
  pages        = {337--350},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.infsof.2008.04.004},
  doi          = {10.1016/J.INFSOF.2008.04.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/GuardaZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/TrivellatoSZE09,
  author       = {Daniel Trivellato and
                  Fred Spiessens and
                  Nicola Zannone and
                  Sandro Etalle},
  title        = {Reputation-Based Ontology Alignment for Autonomy and Interoperability
                  in Distributed Access Control},
  booktitle    = {Proceedings of the 12th {IEEE} International Conference on Computational
                  Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
                  29-31, 2009},
  pages        = {252--258},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSE.2009.123},
  doi          = {10.1109/CSE.2009.123},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/TrivellatoSZE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/ElahiYZ09,
  author       = {Golnaz Elahi and
                  Eric S. K. Yu and
                  Nicola Zannone},
  editor       = {Alberto H. F. Laender and
                  Silvana Castano and
                  Umeshwar Dayal and
                  Fabio Casati and
                  Jos{\'{e}} Palazzo Moreira de Oliveira},
  title        = {A Modeling Ontology for Integrating Vulnerabilities into Security
                  Requirements Conceptual Foundations},
  booktitle    = {Conceptual Modeling - {ER} 2009, 28th International Conference on
                  Conceptual Modeling, Gramado, Brazil, November 9-12, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5829},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04840-1\_10},
  doi          = {10.1007/978-3-642-04840-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/er/ElahiYZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/TrivellatoSZE09,
  author       = {Daniel Trivellato and
                  Fred Spiessens and
                  Nicola Zannone and
                  Sandro Etalle},
  title        = {{POLIPO:} Policies {\&} OntoLogies for Interoperability, Portability,
                  and autOnomy},
  booktitle    = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, London, UK, 20-22 July 2009},
  pages        = {110--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/POLICY.2009.19},
  doi          = {10.1109/POLICY.2009.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/TrivellatoSZE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/essos/2009,
  editor       = {Fabio Massacci and
                  Samuel T. Redwine Jr. and
                  Nicola Zannone},
  title        = {Engineering Secure Software and Systems, First International Symposium
                  ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5429},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00199-4},
  doi          = {10.1007/978-3-642-00199-4},
  isbn         = {978-3-642-00198-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ase/KiyavitskayaZ08,
  author       = {Nadzeya Kiyavitskaya and
                  Nicola Zannone},
  title        = {Requirements model generation to support requirements elicitation:
                  the Secure Tropos experience},
  journal      = {Autom. Softw. Eng.},
  volume       = {15},
  number       = {2},
  pages        = {149--173},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10515-008-0028-6},
  doi          = {10.1007/S10515-008-0028-6},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ase/KiyavitskayaZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbidm/AsnarGCMSZ08,
  author       = {Yudistira Asnar and
                  Paolo Giorgini and
                  Paolo Ciancarini and
                  Rocco Moretti and
                  Maurizio Sebastianis and
                  Nicola Zannone},
  title        = {An evaluation of business solutions in manufacturing enterprises},
  journal      = {Int. J. Bus. Intell. Data Min.},
  volume       = {3},
  number       = {3},
  pages        = {305--329},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJBIDM.2008.022137},
  doi          = {10.1504/IJBIDM.2008.022137},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbidm/AsnarGCMSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AsnarMSZ08,
  author       = {Yudistira Asnar and
                  Rocco Moretti and
                  Maurizio Sebastianis and
                  Nicola Zannone},
  title        = {Risk as Dependability Metrics for the Evaluation of Business Solutions:
                  {A} Model-driven Approach},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {1240--1247},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.17},
  doi          = {10.1109/ARES.2008.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AsnarMSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AsnarZ08,
  author       = {Yudistira Asnar and
                  Nicola Zannone},
  editor       = {Andy Ozment and
                  Ketil St{\o}len},
  title        = {Perceived risk assessment},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Quality of Protection, QoP
                  2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {59--64},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456362.1456375},
  doi          = {10.1145/1456362.1456375},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AsnarZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coordination/PrandiQZ08,
  author       = {Davide Prandi and
                  Paola Quaglia and
                  Nicola Zannone},
  editor       = {Doug Lea and
                  Gianluigi Zavattaro},
  title        = {Formal Analysis of {BPMN} Via a Translation into {COWS}},
  booktitle    = {Coordination Models and Languages, 10th International Conference,
                  {COORDINATION} 2008, Oslo, Norway, June 4-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5052},
  pages        = {249--263},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68265-3\_16},
  doi          = {10.1007/978-3-540-68265-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/coordination/PrandiQZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/CabotZ08,
  author       = {Jordi Cabot and
                  Nicola Zannone},
  editor       = {Jon Whittle and
                  Jan J{\"{u}}rjens and
                  Bashar Nuseibeh and
                  Glen Dobson},
  title        = {Towards an Integrated Framework for Model-Driven Security Engineering},
  booktitle    = {Proceedings of the Workshop on Modeling Security {(} {MODSEC08} {)}
                  held as part of the 2008 International Conference on Model Driven
                  Engineering Languages and Systems {(} {MODELS} {)} Toulouse, France,
                  September 28, 2008},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {413},
  publisher    = {CEUR-WS.org},
  year         = {2008},
  url          = {https://ceur-ws.org/Vol-413/paper13.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:21 +0100},
  biburl       = {https://dblp.org/rec/conf/models/CabotZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/MassacciZ08,
  author       = {Fabio Massacci and
                  Nicola Zannone},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {A Model-Driven Approach for the Specification and Analysis of Access
                  Control Policies},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2008, {OTM} 2008
                  Confederated International Conferences, CoopIS, DOA, GADA, IS, and
                  {ODBASE} 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5332},
  pages        = {1087--1103},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88873-4\_11},
  doi          = {10.1007/978-3-540-88873-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/MassacciZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/KiyavitskayaKZ08,
  author       = {Nadzeya Kiyavitskaya and
                  Alzbeta Krausov{\'{a}} and
                  Nicola Zannone},
  title        = {Why Eliciting and Managing Legal Requirements Is Hard},
  booktitle    = {First International Workshop on Requirements Engineering and Law,
                  {RELAW} 2008, Barcelona, Spain, September 9, 2008},
  pages        = {26--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/RELAW.2008.10},
  doi          = {10.1109/RELAW.2008.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/KiyavitskayaKZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BusnelKLSZ09,
  author       = {Pierre Busnel and
                  Paul El Khoury and
                  Keqin Li and
                  Ayda Sa{\"{\i}}dane and
                  Nicola Zannone},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {S{\&}D Pattern Deployment at Organizational Level: {A} Prototype
                  for Remote Healthcare System},
  booktitle    = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  pages        = {27--39},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.036},
  doi          = {10.1016/J.ENTCS.2009.07.036},
  timestamp    = {Thu, 09 Mar 2023 13:54:01 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BusnelKLSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ase/MassacciMZ07,
  author       = {Fabio Massacci and
                  John Mylopoulos and
                  Nicola Zannone},
  title        = {Computer-aided Support for Secure Tropos},
  journal      = {Autom. Softw. Eng.},
  volume       = {14},
  number       = {3},
  pages        = {341--364},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10515-007-0013-5},
  doi          = {10.1007/S10515-007-0013-5},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ase/MassacciMZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/MassacciMZ07,
  author       = {Fabio Massacci and
                  John Mylopoulos and
                  Nicola Zannone},
  title        = {From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering
                  Approach},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {17},
  number       = {2},
  pages        = {265--284},
  year         = {2007},
  url          = {https://doi.org/10.1142/S0218194007003239},
  doi          = {10.1142/S0218194007003239},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/MassacciMZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AsnarGMZ07,
  author       = {Yudistira Asnar and
                  Paolo Giorgini and
                  Fabio Massacci and
                  Nicola Zannone},
  title        = {From Trust to Dependability through Risk Analysis},
  booktitle    = {Proceedings of the The Second International Conference on Availability,
                  Reliability and Security, {ARES} 2007, The International Dependability
                  Conference - Bridging Theory and Practice, April 10-13 2007, Vienna,
                  Austria},
  pages        = {19--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARES.2007.93},
  doi          = {10.1109/ARES.2007.93},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AsnarGMZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aose/AsnarGZ07,
  author       = {Yudistira Asnar and
                  Paolo Giorgini and
                  Nicola Zannone},
  editor       = {Michael Luck and
                  Lin Padgham},
  title        = {Reasoning About Risk in Agent's Deliberation Process: {A} Jadex Implementation},
  booktitle    = {Agent-Oriented Software Engineering VIII, 8th International Workshop,
                  {AOSE} 2007, Honolulu, HI, USA, May 14, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4951},
  pages        = {118--131},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79488-2\_9},
  doi          = {10.1007/978-3-540-79488-2\_9},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aose/AsnarGZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/clima/BrylMMTZ07,
  author       = {Volha Bryl and
                  Paola Mello and
                  Marco Montali and
                  Paolo Torroni and
                  Nicola Zannone},
  editor       = {Fariba Sadri and
                  Ken Satoh},
  title        = {-Tropos},
  booktitle    = {Computational Logic in Multi-Agent Systems, 8th International Workshop,
                  {CLIMA} VIII, Porto, Portugal, September 10-11, 2007. Revised Selected
                  and Invited Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5056},
  pages        = {157--176},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-88833-8\_9},
  doi          = {10.1007/978-3-540-88833-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/clima/BrylMMTZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icail/CompagnaKMTZ07,
  author       = {Luca Compagna and
                  Paul El Khoury and
                  Fabio Massacci and
                  Reshma Thomas and
                  Nicola Zannone},
  editor       = {Anne Gardner and
                  Radboud Winkels},
  title        = {How to capture, model, and verify the knowledge of legal, security,
                  and privacy experts: a pattern-based approach},
  booktitle    = {The Eleventh International Conference on Artificial Intelligence and
                  Law, Proceedings of the Conference, June 4-8, 2007, Stanford Law School,
                  Stanford, California, {USA}},
  pages        = {149--153},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1276318.1276346},
  doi          = {10.1145/1276318.1276346},
  timestamp    = {Wed, 14 Nov 2018 10:58:33 +0100},
  biburl       = {https://dblp.org/rec/conf/icail/CompagnaKMTZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/LopezMZ07,
  author       = {Hugo A. L{\'{o}}pez and
                  Fabio Massacci and
                  Nicola Zannone},
  editor       = {Elisabetta Di Nitto and
                  Matei Ripeanu},
  title        = {Goal-Equivalent Secure Business Process Re-engineering},
  booktitle    = {Service-Oriented Computing - {ICSOC} 2007 Workshops, International
                  Workshops, Vienna, Austria, September 17, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4907},
  pages        = {212--223},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-93851-4\_21},
  doi          = {10.1007/978-3-540-93851-4\_21},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsoc/LopezMZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GiorginiMMZ06,
  author       = {Paolo Giorgini and
                  Fabio Massacci and
                  John Mylopoulos and
                  Nicola Zannone},
  title        = {Requirements engineering for trust management: model, methodology,
                  and reasoning},
  journal      = {Int. J. Inf. Sec.},
  volume       = {5},
  number       = {4},
  pages        = {257--274},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10207-006-0005-7},
  doi          = {10.1007/S10207-006-0005-7},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/GiorginiMMZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vldb/MassacciMZ06,
  author       = {Fabio Massacci and
                  John Mylopoulos and
                  Nicola Zannone},
  title        = {Hierarchical hippocratic databases with minimal disclosure for virtual
                  organizations},
  journal      = {{VLDB} J.},
  volume       = {15},
  number       = {4},
  pages        = {370--387},
  year         = {2006},
  url          = {https://doi.org/10.1007/s00778-006-0009-y},
  doi          = {10.1007/S00778-006-0009-Y},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vldb/MassacciMZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/BrylMMZ06,
  author       = {Volha Bryl and
                  Fabio Massacci and
                  John Mylopoulos and
                  Nicola Zannone},
  editor       = {Eric Dubois and
                  Klaus Pohl},
  title        = {Designing Security Requirements Models Through Planning},
  booktitle    = {Advanced Information Systems Engineering, 18th International Conference,
                  CAiSE 2006, Luxembourg, Luxembourg, June 5-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4001},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767138\_4},
  doi          = {10.1007/11767138\_4},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/BrylMMZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ZannoneJW06,
  author       = {Nicola Zannone and
                  Sushil Jajodia and
                  Duminda Wijesekera},
  editor       = {Ernesto Damiani and
                  Peng Liu},
  title        = {Creating Objects in the Flexible Authorization Framework},
  booktitle    = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Sophia Antipolis, France,
                  July 31-August 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4127},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11805588\_1},
  doi          = {10.1007/11805588\_1},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ZannoneJW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GiorginiMMZ06,
  author       = {Paolo Giorgini and
                  Fabio Massacci and
                  John Mylopoulos and
                  Nicola Zannone},
  title        = {Detecting Conflicts of Interest},
  booktitle    = {14th {IEEE} International Conference on Requirements Engineering {(RE}
                  2006), 11-15 September 2006, Minneapolis/St.Paul, Minnesota, {USA}},
  pages        = {308--311},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/RE.2006.16},
  doi          = {10.1109/RE.2006.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/GiorginiMMZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/MassacciPZ05,
  author       = {Fabio Massacci and
                  Marco Prest and
                  Nicola Zannone},
  title        = {Using a security requirements engineering methodology in practice:
                  The compliance with the Italian data protection legislation},
  journal      = {Comput. Stand. Interfaces},
  volume       = {27},
  number       = {5},
  pages        = {445--455},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.csi.2005.01.003},
  doi          = {10.1016/J.CSI.2005.01.003},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/MassacciPZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MassacciMZ05,
  author       = {Fabio Massacci and
                  John Mylopoulos and
                  Nicola Zannone},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {438--454},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_25},
  doi          = {10.1007/11555827\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MassacciMZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/GiorginiMZ05,
  author       = {Paolo Giorgini and
                  Fabio Massacci and
                  Nicola Zannone},
  editor       = {Alessandro Aldini and
                  Roberto Gorrieri and
                  Fabio Martinelli},
  title        = {Security and Trust Requirements Engineering},
  booktitle    = {Foundations of Security Analysis and Design III, {FOSAD} 2004/2005
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {3655},
  pages        = {237--272},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554578\_8},
  doi          = {10.1007/11554578\_8},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/GiorginiMZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itrust/GiorginiMMZ05,
  author       = {Paolo Giorgini and
                  Fabio Massacci and
                  John Mylopoulos and
                  Nicola Zannone},
  editor       = {Peter Herrmann and
                  Val{\'{e}}rie Issarny and
                  Simon Shiu},
  title        = {Modeling Social and Individual Trust in Requirements Engineering Methodologies},
  booktitle    = {Trust Management, Third International Conference, iTrust 2005, Paris,
                  France, May 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3477},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11429760\_12},
  doi          = {10.1007/11429760\_12},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itrust/GiorginiMMZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itrust/GiorginiMMSZ05,
  author       = {Paolo Giorgini and
                  Fabio Massacci and
                  John Mylopoulos and
                  Alberto Siena and
                  Nicola Zannone},
  editor       = {Peter Herrmann and
                  Val{\'{e}}rie Issarny and
                  Simon Shiu},
  title        = {ST-Tool: {A} {CASE} Tool for Modeling and Analyzing Trust Requirements},
  booktitle    = {Trust Management, Third International Conference, iTrust 2005, Paris,
                  France, May 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3477},
  pages        = {415--419},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11429760\_33},
  doi          = {10.1007/11429760\_33},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itrust/GiorginiMMSZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GiorginiMMZ05,
  author       = {Paolo Giorgini and
                  Fabio Massacci and
                  John Mylopoulos and
                  Nicola Zannone},
  title        = {Modeling Security Requirements Through Ownership, Permission and Delegation},
  booktitle    = {13th {IEEE} International Conference on Requirements Engineering {(RE}
                  2005), 29 August - 2 September 2005, Paris, France},
  pages        = {167--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/RE.2005.43},
  doi          = {10.1109/RE.2005.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/GiorginiMMZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GiorginiMMZ05a,
  author       = {Paolo Giorgini and
                  Fabio Massacci and
                  John Mylopoulos and
                  Nicola Zannone},
  title        = {ST-Tool: {A} {CASE} Tool for Security Requirements Engineering},
  booktitle    = {13th {IEEE} International Conference on Requirements Engineering {(RE}
                  2005), 29 August - 2 September 2005, Paris, France},
  pages        = {451--452},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/RE.2005.67},
  doi          = {10.1109/RE.2005.67},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/GiorginiMMZ05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/ZannoneJMW05,
  author       = {Nicola Zannone and
                  Sushil Jajodia and
                  Fabio Massacci and
                  Duminda Wijesekera},
  editor       = {Vijay Atluri and
                  Sabrina De Capitani di Vimercati and
                  Roger Dingledine},
  title        = {Maintaining privacy on derived objects},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  pages        = {10--19},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102199.1102202},
  doi          = {10.1145/1102199.1102202},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/ZannoneJMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/GiorginiMMZ04,
  author       = {Paolo Giorgini and
                  Fabio Massacci and
                  John Mylopoulos and
                  Nicola Zannone},
  editor       = {Sokratis K. Katsikas and
                  Stefanos Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {Filling the Gap between Requirements Engineering and Public Key/Trust
                  Management Infrastructures},
  booktitle    = {Public Key Infrastructure, First European PKIWorkshop: Research and
                  Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3093},
  pages        = {98--111},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25980-0\_8},
  doi          = {10.1007/978-3-540-25980-0\_8},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/GiorginiMMZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itrust/GiorginiMMZ04,
  author       = {Paolo Giorgini and
                  Fabio Massacci and
                  John Mylopoulos and
                  Nicola Zannone},
  editor       = {Christian Damsgaard Jensen and
                  Stefan Poslad and
                  Theodosis Dimitrakos},
  title        = {Requirements Engineering Meets Trust Management: Model, Methodology,
                  and Reasoning},
  booktitle    = {Trust Management, Second International Conference, iTrust 2004, Oxford,
                  UK, March 29 - April 1, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2995},
  pages        = {176--190},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24747-0\_14},
  doi          = {10.1007/978-3-540-24747-0\_14},
  timestamp    = {Sun, 02 Oct 2022 16:10:26 +0200},
  biburl       = {https://dblp.org/rec/conf/itrust/GiorginiMMZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MassacciZ04,
  author       = {Fabio Massacci and
                  Nicola Zannone},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Privacy Is Linking Permission to Purpose},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {179--191},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_20},
  doi          = {10.1007/11861386\_20},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MassacciZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics