Остановите войну!
for scientists:
default search action
Fabiano Dalpiaz
- > Home > Persons > Fabiano Dalpiaz
Publications
- 2018
- [c79]Fatma Basak Aydemir, Fabiano Dalpiaz, Sjaak Brinkkemper, Paolo Giorgini, John Mylopoulos:
The Next Release Problem Revisited: A New Avenue for Goal Models. RE 2018: 5-16 - 2017
- [j11]Mattia Salnitri, Fabiano Dalpiaz, Paolo Giorgini:
Designing secure business processes with SecBPMN. Softw. Syst. Model. 16(3): 737-757 (2017) - 2016
- [c66]Evellin Cardoso, Katsiaryna Labunets, Fabiano Dalpiaz, John Mylopoulos, Paolo Giorgini:
Modeling Structured and Unstructured Processes: An Empirical Evaluation. ER 2016: 347-361 - 2015
- [j9]Elda Paja, Fabiano Dalpiaz, Paolo Giorgini:
Modelling and reasoning about security requirements in socio-technical systems. Data Knowl. Eng. 98: 123-143 (2015) - [c51]Fabiano Dalpiaz, Evellin Cardoso, Giulia Canobbio, Paolo Giorgini, John Mylopoulos:
Social specifications of business processes with Azzurra. RCIS 2015: 7-18 - 2014
- [j7]Per Håkon Meland, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, Paolo Giorgini:
Threat Analysis in Goal-Oriented Security Requirements Modelling. Int. J. Secur. Softw. Eng. 5(2): 1-19 (2014) - [j6]Raian Ali, Fabiano Dalpiaz, Paolo Giorgini:
Requirements-driven deployment - Customizing the requirements model for the host environment. Softw. Syst. Model. 13(1): 433-456 (2014) - [c44]Mattia Salnitri, Fabiano Dalpiaz, Paolo Giorgini:
Modeling and Verifying Security Policies in Business Processes. BMMDS/EMMSAD 2014: 200-214 - [c41]Fatma Basak Aydemir, Paolo Giorgini, John Mylopoulos, Fabiano Dalpiaz:
Exploring alternative designs for sociotechnical systems. RCIS 2014: 1-12 - [c40]Amit K. Chopra, Fabiano Dalpiaz, Fatma Basak Aydemir, Paolo Giorgini, John Mylopoulos, Munindar P. Singh:
Protos: Foundations for engineering innovative sociotechnical systems. RE 2014: 53-62 - [p5]Per Håkon Meland, Muhammad Asim, Dhouha Ayed, Fabiano Dalpiaz, Edith Felix, Paolo Giorgini, Susana Gonzáles, Brett Lempereur, John Ronan:
Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions. Secure and Trustworthy Service Composition 2014: 10-35 - [p4]Elda Paja, Fabiano Dalpiaz, Paolo Giorgini:
The Socio-technical Security Requirements Modelling Language for Secure Composite Services. Secure and Trustworthy Service Composition 2014: 63-78 - [p3]Elda Paja, Fabiano Dalpiaz, Paolo Giorgini:
STS-Tool: Security Requirements Engineering for Socio-Technical Systems. Engineering Secure Future Internet Services and Systems 2014: 65-96 - [p2]Elda Paja, Mauro Poggianella, Fabiano Dalpiaz, Pierluigi Roberti, Paolo Giorgini:
Security Requirements Engineering with STS-Tool. Secure and Trustworthy Service Composition 2014: 95-109 - [e1]Achim D. Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Håkon Meland, Erkuden Rios:
Secure and Trustworthy Service Composition - The Aniketos Approach. Lecture Notes in Computer Science 8900, Springer 2014, ISBN 978-3-319-13517-5 [contents] - 2013
- [j5]Raian Ali, Fabiano Dalpiaz, Paolo Giorgini:
Reasoning with contextual requirements: Detecting inconsistency and conflicts. Inf. Softw. Technol. 55(1): 35-57 (2013) - [j4]Fabiano Dalpiaz, Paolo Giorgini, John Mylopoulos:
Adaptive socio-technical systems: a requirements-based approach. Requir. Eng. 18(1): 1-24 (2013) - [c35]Elda Paja, Fabiano Dalpiaz, Paolo Giorgini:
Managing Security Requirements Conflicts in Socio-Technical Systems. ER 2013: 270-283 - [c34]Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, Paolo Giorgini:
Specifying and Reasoning over Socio-Technical Security Requirements with STS-Tool. ER 2013: 504-507 - [c32]Elda Paja, Fabiano Dalpiaz, Paolo Giorgini:
Designing Secure Socio-Technical Systems with STS-ml. iStar 2013: 79-84 - [c31]Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, Paolo Giorgini:
STS-Tool: Specifying and Reasoning over Socio-Technical Security Requirements. iStar 2013: 131-133 - 2012
- [j3]Sandra Trösterer, Elke Beck, Fabiano Dalpiaz, Elda Paja, Paolo Giorgini, Manfred Tscheligi:
Formative User-Centered Evaluation of Security Modeling: Results from a Case Study. Int. J. Secur. Softw. Eng. 3(1): 1-19 (2012) - [c28]Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, Paolo Giorgini:
Modelling Security Requirements in Socio-Technical Systems with STS-Tool. CAiSE Forum 2012: 155-162 - [c27]Fabiano Dalpiaz, Raian Ali, Paolo Giorgini:
Aligning Software Configuration with Business and IT Context. CAiSE 2012: 206-221 - [c26]Raian Ali, Alberto Griggio, Anders Franzén, Fabiano Dalpiaz, Paolo Giorgini:
Optimizing Monitoring Requirements in Self-adaptive Systems. BMMDS/EMMSAD 2012: 362-377 - [c25]Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, Paolo Giorgini:
STS-Tool: Using Commitments to Specify Socio-Technical Security Requirements. ER Workshops 2012: 396-399 - [c24]Fabiano Dalpiaz, Estefanía Serral, Pedro Valderas, Paolo Giorgini, Vicente Pelechano:
A NFR-Based Framework for User-Centered Adaptation. ER 2012: 439-448 - [c23]Mattia Salnitri, Fabiano Dalpiaz, Paolo Giorgini:
Aligning Service-Oriented Architectures with Security Requirements. OTM Conferences (1) 2012: 232-249 - [c22]Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, Paolo Giorgini:
STS-tool: Socio-technical Security Requirements through social commitments. RE 2012: 331-332 - 2011
- [c21]Raian Ali, Fabiano Dalpiaz, Paolo Giorgini, Vítor Estêvão Silva Souza:
Requirements Evolution: From Assumptions to Reality. BMMDS/EMMSAD 2011: 372-382 - [c20]Fabiano Dalpiaz, Elda Paja, Paolo Giorgini:
Security Requirements Engineering for Service-Oriented Applications. iStar 2011: 102-107 - [c18]Raian Ali, Carlos Solís, Fabiano Dalpiaz, Walid Maalej, Paolo Giorgini, Bashar Nuseibeh:
Social Software Product Lines. RESC 2011: 14-17 - [c16]Fabiano Dalpiaz, Elda Paja, Paolo Giorgini:
Security requirements engineering via commitments. STAST 2011: 1-8 - 2010
- [j2]Raian Ali, Fabiano Dalpiaz, Paolo Giorgini:
A goal-based framework for contextual requirements modeling and analysis. Requir. Eng. 15(4): 439-458 (2010) - [c15]Amit K. Chopra, Fabiano Dalpiaz, Paolo Giorgini, John Mylopoulos:
Reasoning about agents and protocols via goals and commitments. AAMAS 2010: 457-464 - [c14]Amit K. Chopra, Fabiano Dalpiaz, Paolo Giorgini, John Mylopoulos:
Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments. CAiSE 2010: 113-128 - [c13]Fabiano Dalpiaz, Amit K. Chopra, Paolo Giorgini, John Mylopoulos:
Adaptation in Open Systems: Giving Interaction Its Rightful Place. ER 2010: 31-45 - [c12]José Luis de la Vara, Raian Ali, Fabiano Dalpiaz, Juan Sánchez, Paolo Giorgini:
Business Processes Contextualisation via Context Analysis. ER 2010: 471-476 - [c11]Raian Ali, Amit K. Chopra, Fabiano Dalpiaz, Paolo Giorgini, John Mylopoulos, Vítor Estêvão Silva Souza:
The Evolution of Tropos: Contexts, Commitments and Adaptivity. iStar 2010: 15-19 - [c10]José Luis de la Vara, Raian Ali, Fabiano Dalpiaz, Juan Sánchez, Paolo Giorgini:
COMPRO: A Methodological Approach for Business Process Contextualisation. OTM Conferences (1) 2010: 132-149 - [p1]Amit K. Chopra, John Mylopoulos, Fabiano Dalpiaz, Paolo Giorgini, Munindar P. Singh:
Requirements as Goals and Commitments Too. Intentional Perspectives on Information Systems Engineering 2010: 137-153 - 2009
- [c9]Fabiano Dalpiaz, Paolo Giorgini, John Mylopoulos:
Software self-reconfiguration: a BDI-based approach. AAMAS (2) 2009: 1159-1160 - [c8]Raian Ali, Fabiano Dalpiaz, Paolo Giorgini:
Goal-Based Self-Contextualization. CAiSE Forum 2009 - [c7]Fabiano Dalpiaz, Paolo Giorgini, John Mylopoulos:
An Architecture for Requirements-Driven Self-reconfiguration. CAiSE 2009: 246-260 - [c6]Raian Ali, Fabiano Dalpiaz, Paolo Giorgini:
A Goal Modeling Framework for Self-contextualizable Software. BMMDS/EMMSAD 2009: 326-338 - 2008
- [c5]Raian Ali, Fabiano Dalpiaz, Paolo Giorgini:
Location-Based Variability for Mobile Information Systems. CAiSE 2008: 575-578 - [c4]Raian Ali, Fabiano Dalpiaz, Paolo Giorgini:
Location-Based Software Modeling and Analysis: Tropos-Based Approach. ER 2008: 169-182 - [c3]Raian Ali, Fabiano Dalpiaz, Paolo Giorgini:
Modeling and Analyzing Variability for Mobile Information Systems. ICCSA (2) 2008: 291-306 - [c2]Fabiano Dalpiaz, Raian Ali, Yudistira Asnar, Volha Bryl, Paolo Giorgini:
Applying Tropos to Socio-Technical System Design and Runtime Configuration. WOA 2008: 101-107
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-06 23:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint