BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Argentina
1 × Austria
1 × Germany
1 × India
1 × Italy
1 × Korea
1 × Latvia
1 × Poland
1 × Portugal
1 × Sweden
1 × The Netherlands
1 × Tunisia
3 × France
5 × USA
Collaborated with:
J.Mylopoulos F.Dalpiaz H.Mouratidis G.A.Manson F.Massacci N.Zannone R.Ali M.Kolp M.Gharib A.K.Chopra E.Blanzieri R.Sebastiani A.F.Dragoni P.Puliti A.Gani P.Massa S.Recla E.Paja M.Poggianella P.Roberti Y.Asnar R.Bonato V.Meduri C.Riccucci A.Perini F.Giunchiglia P.Bresciani Q.Ramadan M.Salnitri D.Strüber J.Jürjens F.B.Aydemir M.P.Singh A.Birukou V.D'Andrea N.Kokash A.Modena
Talks about:
secur (11) system (8) requir (7) inform (7) model (6) develop (3) servic (3) orient (3) engin (3) tool (3)

Person: Paolo Giorgini

DBLP DBLP: Giorgini:Paolo

Contributed to:

REFSQ 20152015
RE 20142014
CAiSE 20122012
RE 20122012
CAiSE 20102010
CAiSE 20092009
CAiSE 20082008
RE 20072007
SAC 20072007
RE 20062006
RE 20052005
CAiSE 20042004
ICEIS v3 20042004
CAiSE 20032003
ICEIS v3 20032003
SEKE 20022002
CIKM 20012001
SEKE 20012001
CIKM 19971997
MoDELS 20172017

Wrote 22 papers:

REFSQ-2015-GharibG #modelling #quality #reasoning #requirements
Modeling and Reasoning About Information Quality Requirements (MG, PG), pp. 49–64.
RE-2014-ChopraDAGMS #named
Protos: Foundations for engineering innovative sociotechnical systems (AKC, FD, FBA, PG, JM, MPS), pp. 53–62.
CAiSE-2012-DalpiazAG
Aligning Software Configuration with Business and IT Context (FD, RA, PG), pp. 206–221.
RE-2012-PajaDPRG #named #requirements #security #social
STS-tool: Socio-technical Security Requirements through social commitments (EP, FD, MP, PR, PG), pp. 331–332.
CAiSE-2010-ChopraDGM #modelling #reasoning
Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments (AKC, FD, PG, JM), pp. 113–128.
CAiSE-2009-DalpiazGM #architecture #configuration management #self
An Architecture for Requirements-Driven Self-reconfiguration (FD, PG, JM), pp. 246–260.
CAiSE-2008-AliDG #information management #mobile #variability
Location-Based Variability for Mobile Information Systems (RA, FD, PG), pp. 575–578.
RE-2007-AsnarGBMR #approach #empirical
Secure and Dependable Patterns in Organizations: An Empirical Approach (YA, PG, RB, VM, CR), pp. 287–292.
SAC-2007-BirukouBDGKM #approach #development #named #recommendation
IC-service: a service-oriented approach to the development of recommendation systems (AB, EB, VD, PG, NK, AM), pp. 1683–1688.
RE-2006-GiorginiMMZ #detection
Detecting Conflicts of Interest (PG, FM, JM, NZ), pp. 308–311.
RE-2005-GiorginiMMZ #modelling #requirements #security
Modeling Security Requirements Through Ownership, Permission and Delegation (PG, FM, JM, NZ), pp. 167–176.
RE-2005-GiorginiMMZ05a #automation #named #requirements #security
ST-Tool: A CASE Tool for Security Requirements Engineering (PG, FM, JM, NZ), pp. 451–452.
CAiSE-2004-SebastianiGM #low cost #modelling #satisfiability
Simple and Minimum-Cost Satisfiability for Goal Models (RS, PG, JM), pp. 20–35.
ICEIS-v3-2004-MouratidisGM #design #information management #security #using
Using Security Attack Scenarios to Analyse Security During Information Systems Design (HM, PG, GAM), pp. 10–17.
CAiSE-2003-KolpGM #analysis #requirements
Organizational Patterns for Early Requirements Analysis (MK, PG, JM), pp. 617–632.
CAiSE-2003-MouratidisGM #information management #modelling #security #towards
Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems (HM, PG, GAM), pp. 63–78.
ICEIS-v3-2003-MouratidisMGG #information management #requirements #security #using
Analysing Security Requirements of Information Systems Using Tropos (HM, GAM, AG, PG), pp. 623–626.
SEKE-2002-KolpGM #development #information management #social
Information systems development through social structures (MK, PG, JM), pp. 183–190.
CIKM-2001-BlanzieriGMR #framework #information management
Information Access in Implicit Culture Framework (EB, PG, PM, SR), pp. 565–567.
SEKE-2001-GiorginiPMGB #case study #development
Agent- Oriented Software Development: A Case Study (PG, AP, JM, FG, PB), pp. 283–290.
CIKM-1997-DragoniGP #distributed #integration
Distributed Knowledge Revision/Integration (AFD, PG, PP), pp. 121–127.
MoDELS-2017-RamadanS0JG #modelling #process #security #verification
From Secure Business Process Modeling to Design-Level Security Verification (QR, MS, DS, JJ, PG), pp. 123–133.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.