An Access-Control Framework for WS-BPEL

Frederica Paci , Elisa Bertino , Jason Crampton
International Journal of Web Services Research 5 ( 3) 20 -43

49
2008
Privacy-preserving Digital Identity Management for Cloud Computing.

Elisa Bertino , Ning Shang , Rodolfo Ferrini , Federica Paci
IEEE Data(base) Engineering Bulletin 32 21 -27

260
2009
ABSTRACT Access Control Enforcement for Conversation-based Web Services

Mourad Ouzzani , Elisa Bertino , Massimo Mecella , Federica Paci

2006
Dynamic resiliency to user assignment

Olga Gadyatskaya , Fabio Massacci , Federica Paci

1
2010
Security requirement patterns for Future Internet applications, and improved modelling of the scenarios

Federica Paci , Le Minh Sang Tran , Kristian Becker , Francisco Moyano

2013
[Journal First] Model Comprehension for Security Risk Assessment: An Empirical Comparison of Tabular vs. Graphical Representations

Katsiaryna Labunets , Flavio Moreira de Oliveira , Sabrina Marczak , Federica Paci
international conference on software engineering

2018
IFTTT Privacy Checker.

Elisa Quintarelli , Nicola Zannone , Federica Paci , Davide Bianchin
ETAA@ESORICS 90 -107

2020
Verification of Access Control Requirements in Web Services Choreography

Federica Paci , Mourad Ouzzani , Massimo Mecella ,
ieee international conference on services computing 1 5 -12

23
2008
ACConv -- An Access Control Model for Conversational Web Services

Federica Paci , Massimo Mecella , Mourad Ouzzani , Elisa Bertino
ACM Transactions on The Web 5 ( 3) 13

12
2011
PERSONA - A Personalized Data Protection Framework

Marina Egea , Federica Paci , Marinella Petrocchi , Nicola Zannone
international conference on trust management 272 -280

2
2013
PriMa: A comprehensive approach to privacy protection in social network sites

Anna C. Squicciarini , Federica Paci , Smitha Sundareswaran
Annales Des Télécommunications 69 ( 1) 21 -36

26
2014
Managing changes with legacy security engineering processes

Edith Felix , Olivier Delande , Fabio Massacci , Federica Paci
intelligence and security informatics 137 -142

2
2011
Evolution of Security Engineering Artifacts: A State of the Art Survey

Michael Felderer , Basel Katt , Philipp Kalb , Jan Jürjens
International Journal of Secure Software Engineering 5 ( 4) 48 -98

10
2014
SeCMER: A Tool to Gain Control of Security Requirements Evolution

Gábor Bergmann , Fabio Massacci , Federica Paci , Thein Than Tun
Towards a Service-Based Internet 321 -322

2
2011
An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices

Federica Paci , Elisa Bertino , Sam Kerr , Anna Squicciarini
Journal of Software 4 ( 7) 696 -706

6
2009
A secure framework for publishing virtual community contracts

Anna Cinzia Squicciarini , Federica Paci , Elisa Bertino
web based communities 2 ( 2) 237 -255

1
2006
An Extended Ontology for Security Requirements

Fabio Massacci , John Mylopoulos , Federica Paci , Thein Thun Tun
conference on advanced information systems engineering 622 -636

32
2011
Access Control and Authorization Constraints for WS-BPEL

Elisa Bertino , Jason Crampton , Federica Paci
international conference on web services 275 -284

69
2006
An Experimental Comparison of Two Risk-Based Security Methods

Katsiaryna Labunets , Fabio Massacci , Federica Paci , Le Minh Sang Tran
empirical software engineering and measurement 163 -172

26
2013
How to select a security requirements method? a comparative study with students and practitioners

Fabio Massacci , Federica Paci
nordic conference on secure it systems 89 -104

20
2012