Travelled to:
1 × Argentina
1 × Austria
1 × Germany
1 × India
1 × Italy
1 × Korea
1 × Latvia
1 × Poland
1 × Portugal
1 × Sweden
1 × The Netherlands
1 × Tunisia
3 × France
5 × USA
Collaborated with:
J.Mylopoulos F.Dalpiaz H.Mouratidis G.A.Manson F.Massacci N.Zannone R.Ali M.Kolp M.Gharib A.K.Chopra E.Blanzieri R.Sebastiani A.F.Dragoni P.Puliti A.Gani P.Massa S.Recla E.Paja M.Poggianella P.Roberti Y.Asnar R.Bonato V.Meduri C.Riccucci A.Perini F.Giunchiglia P.Bresciani Q.Ramadan M.Salnitri D.Strüber J.Jürjens F.B.Aydemir M.P.Singh A.Birukou V.D'Andrea N.Kokash A.Modena
Talks about:
secur (11) system (8) requir (7) inform (7) model (6) develop (3) servic (3) orient (3) engin (3) tool (3)
Person: Paolo Giorgini
DBLP: Giorgini:Paolo
Contributed to:
Wrote 22 papers:
- REFSQ-2015-GharibG #modelling #quality #reasoning #requirements
- Modeling and Reasoning About Information Quality Requirements (MG, PG), pp. 49–64.
- RE-2014-ChopraDAGMS #named
- Protos: Foundations for engineering innovative sociotechnical systems (AKC, FD, FBA, PG, JM, MPS), pp. 53–62.
- CAiSE-2012-DalpiazAG
- Aligning Software Configuration with Business and IT Context (FD, RA, PG), pp. 206–221.
- RE-2012-PajaDPRG #named #requirements #security #social
- STS-tool: Socio-technical Security Requirements through social commitments (EP, FD, MP, PR, PG), pp. 331–332.
- CAiSE-2010-ChopraDGM #modelling #reasoning
- Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments (AKC, FD, PG, JM), pp. 113–128.
- CAiSE-2009-DalpiazGM #architecture #configuration management #self
- An Architecture for Requirements-Driven Self-reconfiguration (FD, PG, JM), pp. 246–260.
- CAiSE-2008-AliDG #information management #mobile #variability
- Location-Based Variability for Mobile Information Systems (RA, FD, PG), pp. 575–578.
- RE-2007-AsnarGBMR #approach #empirical
- Secure and Dependable Patterns in Organizations: An Empirical Approach (YA, PG, RB, VM, CR), pp. 287–292.
- SAC-2007-BirukouBDGKM #approach #development #named #recommendation
- IC-service: a service-oriented approach to the development of recommendation systems (AB, EB, VD, PG, NK, AM), pp. 1683–1688.
- RE-2006-GiorginiMMZ #detection
- Detecting Conflicts of Interest (PG, FM, JM, NZ), pp. 308–311.
- RE-2005-GiorginiMMZ #modelling #requirements #security
- Modeling Security Requirements Through Ownership, Permission and Delegation (PG, FM, JM, NZ), pp. 167–176.
- RE-2005-GiorginiMMZ05a #automation #named #requirements #security
- ST-Tool: A CASE Tool for Security Requirements Engineering (PG, FM, JM, NZ), pp. 451–452.
- CAiSE-2004-SebastianiGM #low cost #modelling #satisfiability
- Simple and Minimum-Cost Satisfiability for Goal Models (RS, PG, JM), pp. 20–35.
- ICEIS-v3-2004-MouratidisGM #design #information management #security #using
- Using Security Attack Scenarios to Analyse Security During Information Systems Design (HM, PG, GAM), pp. 10–17.
- CAiSE-2003-KolpGM #analysis #requirements
- Organizational Patterns for Early Requirements Analysis (MK, PG, JM), pp. 617–632.
- CAiSE-2003-MouratidisGM #information management #modelling #security #towards
- Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems (HM, PG, GAM), pp. 63–78.
- ICEIS-v3-2003-MouratidisMGG #information management #requirements #security #using
- Analysing Security Requirements of Information Systems Using Tropos (HM, GAM, AG, PG), pp. 623–626.
- SEKE-2002-KolpGM #development #information management #social
- Information systems development through social structures (MK, PG, JM), pp. 183–190.
- CIKM-2001-BlanzieriGMR #framework #information management
- Information Access in Implicit Culture Framework (EB, PG, PM, SR), pp. 565–567.
- SEKE-2001-GiorginiPMGB #case study #development
- Agent- Oriented Software Development: A Case Study (PG, AP, JM, FG, PB), pp. 283–290.
- CIKM-1997-DragoniGP #distributed #integration
- Distributed Knowledge Revision/Integration (AFD, PG, PP), pp. 121–127.
- MoDELS-2017-RamadanS0JG #modelling #process #security #verification
- From Secure Business Process Modeling to Design-Level Security Verification (QR, MS, DS, JJ, PG), pp. 123–133.