Zannone, Nicola
 Distribuzione geografica
Continente #
NA - Nord America 2.994
AS - Asia 463
EU - Europa 415
SA - Sud America 2
AF - Africa 1
OC - Oceania 1
Totale 3.876
Nazione #
US - Stati Uniti d'America 2.989
SG - Singapore 208
CN - Cina 198
UA - Ucraina 171
FI - Finlandia 73
GB - Regno Unito 40
SE - Svezia 35
BG - Bulgaria 28
DE - Germania 28
KR - Corea 19
ID - Indonesia 14
IT - Italia 14
JO - Giordania 10
RU - Federazione Russa 10
IN - India 6
CA - Canada 5
FR - Francia 5
NL - Olanda 4
TR - Turchia 4
AT - Austria 2
RO - Romania 2
AE - Emirati Arabi Uniti 1
CL - Cile 1
CO - Colombia 1
ES - Italia 1
IE - Irlanda 1
KG - Kirghizistan 1
KH - Cambogia 1
LT - Lituania 1
NZ - Nuova Zelanda 1
SA - Arabia Saudita 1
SC - Seychelles 1
Totale 3.876
Città #
Fairfield 433
Jacksonville 353
Chandler 338
Ashburn 213
Woodbridge 190
Seattle 183
Houston 170
Singapore 169
Wilmington 150
Cambridge 129
Columbus 117
San Mateo 94
Hangzhou 88
Ann Arbor 86
Princeton 72
Beijing 60
Dearborn 40
Sofia 28
New York 27
Boardman 26
Helsinki 26
Lawrence 25
San Diego 20
Düsseldorf 14
Jakarta 14
London 11
Santa Clara 11
Falls Church 8
Hefei 8
Moscow 7
Kilburn 6
Kunming 6
Des Moines 5
Jinan 5
Los Angeles 5
Norwalk 5
Verona 5
Dallas 4
Washington 4
Angri 3
Izmir 3
Nanchang 3
San Paolo di Civitate 3
Toronto 3
Andover 2
Bonndorf 2
Chongqing 2
Eindhoven 2
Nanjing 2
Redmond 2
Vienna 2
Wuhan 2
Altamura 1
Auckland 1
Berlin 1
Birmingham 1
Bishkek 1
Bogotá 1
Bremen 1
Chengdu 1
Chiswick 1
Clearwater 1
Costa Mesa 1
Council Bluffs 1
Dublin 1
Frankfurt am Main 1
Fuzhou 1
Giessen 1
Hebei 1
Hounslow 1
Hyderabad 1
Jiaxing 1
Langfang 1
Lanzhou 1
Madrid 1
McMinnville 1
Montréal 1
Mountain View 1
Naaldwijk 1
North Bergen 1
Ottawa 1
Phnom Penh 1
Pitesti 1
Prescot 1
Qinhuangdao 1
Rome 1
San Francisco 1
San Jose 1
Santiago 1
Shanghai 1
Shaoxing 1
Shenyang 1
Shenzhen 1
Southwark 1
Staten Island 1
Timisoara 1
Wenzhou 1
Xian 1
Totale 3.232
Nome #
Towards the Development of Privacy-Aware Systems 223
An evaluation of business solutions in manufacturing enterprises 133
Formal Analysis of BPMN Via a Translation into COWS 116
Security requirements engineering: The si*modeling language and the Secure Tropos methodology 104
A Model-Driven Approach for the Specification and Analysis of Access Control Policies 101
From Trust to Dependability through Risk Analysis 99
From Hippocratic Databases to Secure Tropos: A Computer-Aided Re-engineering Approach 97
ST-Tool: a case tool for modeling and analyzing trust requirements 92
Designing Security Requirements Models through Planning 89
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures 89
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns 89
Detecting Conflicts of Interest 88
Maintaining Privacy on Derived Objects 88
Privacy is linking permission to purpose 87
Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations 87
Organizational Patterns for Security and Dependability: From Design to Application. 87
Creating Objects in the Flexible Authorization Framework 86
Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation 86
Reasoning about Risk in Agents Deliberation Process: a Jadex Implementation 84
Modelling Security and Trust with Secure Tropos 83
Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach 82
Modeling Social and Individual Trust in Requirements Engineering Methodologies 82
From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach 81
From security-by-design to the identification of security-critical deviations in process executions 81
An Ontology for Secure Socio-Technical Systems 80
Goal-equivalent secure business process re-engineering 79
Computer-aided Support for Secure Tropos 79
Modeling security requirements through ownership, permission and delegation 78
An Ontology for Secure Socio-Technical Systems 77
Purpose Control: Did You Process the Data for the Intended Purpose? 76
Security and Trust Requirements Engineering 73
ST-Tool: A CASE Tool for Security Requirements Engineering 73
Requirements Engineering for Trust Management: Model, Methodology, and Reasoning 73
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation 72
A Privacy Model to Support Minimal Disclosure in Virtual Organizations 65
Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank 55
How to capture, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach 53
Minimal disclosure in hierarchical hippocratic databases for virtual organizations 50
Extending Agent-oriented Requirements with Declarative Business Processes: a Computational Logic-based Approach 50
An enhanced CFA for security policies 49
E-Government and On-line Services: Security and Legal Patterns 49
Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank 48
Modeling Security Requirements Models through Planning 48
Goal-Equivalent Business Process Re-engineering 47
Engineering Secure Software and Systems: First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009: Proceedings 46
Engineering Secure Software and Systems: Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010: Proceedings 43
Modelling Security Requirements Through Ownership, Permissions and Delegations 42
Requirements engineering meets trust management: model, methodology, and reasoning 38
Using Semantic Annotation for Mining Privacy and Security Requirements from European Union Directives 13
Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank 12
Designing Security Requirements Models through Planning 12
Privacy is Linking Permission to Purpose 10
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation 10
Modeling Security Requirements Through Ownership, Permission and Delegation 9
Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation 9
Requirements Engineering meets Trust Management: Model, Methodology, and Reasoning 9
Reasoning about Risk in Agent's Deliberation Process: a Jadex Implementation 8
Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations 8
Modeling Social and Individual Trust in Requirements Engineering Methodologies 8
Filling the gap between Requirements Engineering and Public Key/Trust Management Infrastructures 8
From Trust to Dependability through Risk Analysis 8
Totale 3.901
Categoria #
all - tutte 18.175
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 2.261
Totale 20.436


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020769 0 0 0 0 141 83 152 94 139 51 35 74
2020/2021572 39 71 61 69 58 35 48 30 50 31 56 24
2021/2022447 26 105 0 7 6 17 38 92 16 25 24 91
2022/2023623 90 65 7 96 71 109 0 47 94 3 18 23
2023/2024238 17 26 9 7 24 62 20 21 2 9 10 31
2024/2025348 2 3 43 265 35 0 0 0 0 0 0 0
Totale 3.901