Zannone, Nicola
 Distribuzione geografica
Continente #
NA - Nord America 2.877
EU - Europa 406
AS - Asia 369
SA - Sud America 2
AF - Africa 1
OC - Oceania 1
Totale 3.656
Nazione #
US - Stati Uniti d'America 2.872
CN - Cina 197
UA - Ucraina 171
SG - Singapore 116
FI - Finlandia 73
GB - Regno Unito 40
SE - Svezia 35
BG - Bulgaria 28
DE - Germania 27
KR - Corea 19
ID - Indonesia 14
IT - Italia 14
JO - Giordania 10
CA - Canada 5
FR - Francia 5
IN - India 5
NL - Olanda 4
TR - Turchia 4
RU - Federazione Russa 3
AT - Austria 2
RO - Romania 2
AE - Emirati Arabi Uniti 1
CL - Cile 1
CO - Colombia 1
ES - Italia 1
IE - Irlanda 1
KG - Kirghizistan 1
KH - Cambogia 1
NZ - Nuova Zelanda 1
SA - Arabia Saudita 1
SC - Seychelles 1
Totale 3.656
Città #
Fairfield 433
Jacksonville 353
Chandler 338
Ashburn 213
Woodbridge 190
Seattle 183
Houston 170
Wilmington 150
Cambridge 129
San Mateo 94
Hangzhou 88
Ann Arbor 86
Singapore 81
Princeton 72
Beijing 60
Dearborn 40
Sofia 28
New York 27
Boardman 26
Helsinki 26
Lawrence 25
San Diego 20
Düsseldorf 14
Jakarta 14
London 11
Santa Clara 11
Falls Church 8
Hefei 8
Kilburn 6
Kunming 6
Des Moines 5
Jinan 5
Los Angeles 5
Norwalk 5
Verona 5
Dallas 4
Washington 4
Angri 3
Izmir 3
Nanchang 3
San Paolo di Civitate 3
Toronto 3
Andover 2
Bonndorf 2
Chongqing 2
Eindhoven 2
Nanjing 2
Redmond 2
Vienna 2
Wuhan 2
Altamura 1
Auckland 1
Berlin 1
Birmingham 1
Bishkek 1
Bogotá 1
Bremen 1
Chengdu 1
Chiswick 1
Clearwater 1
Costa Mesa 1
Council Bluffs 1
Dublin 1
Fuzhou 1
Giessen 1
Hebei 1
Hounslow 1
Jiaxing 1
Langfang 1
Lanzhou 1
Madrid 1
McMinnville 1
Montréal 1
Mountain View 1
Naaldwijk 1
North Bergen 1
Ottawa 1
Phnom Penh 1
Pitesti 1
Prescot 1
Qinhuangdao 1
Rome 1
San Francisco 1
San Jose 1
Santiago 1
Shanghai 1
Shaoxing 1
Shenyang 1
Shenzhen 1
Southwark 1
Staten Island 1
Timisoara 1
Xian 1
Totale 3.017
Nome #
Towards the Development of Privacy-Aware Systems 219
An evaluation of business solutions in manufacturing enterprises 130
Formal Analysis of BPMN Via a Translation into COWS 111
Security requirements engineering: The si*modeling language and the Secure Tropos methodology 100
A Model-Driven Approach for the Specification and Analysis of Access Control Policies 96
From Hippocratic Databases to Secure Tropos: A Computer-Aided Re-engineering Approach 94
From Trust to Dependability through Risk Analysis 94
ST-Tool: a case tool for modeling and analyzing trust requirements 88
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures 87
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns 87
Detecting Conflicts of Interest 85
Maintaining Privacy on Derived Objects 85
Privacy is linking permission to purpose 84
Designing Security Requirements Models through Planning 84
Creating Objects in the Flexible Authorization Framework 83
Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation 83
Organizational Patterns for Security and Dependability: From Design to Application. 82
Reasoning about Risk in Agents Deliberation Process: a Jadex Implementation 81
Modelling Security and Trust with Secure Tropos 79
Modeling Social and Individual Trust in Requirements Engineering Methodologies 78
Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations 77
Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach 77
From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach 77
From security-by-design to the identification of security-critical deviations in process executions 77
An Ontology for Secure Socio-Technical Systems 76
Computer-aided Support for Secure Tropos 76
Modeling security requirements through ownership, permission and delegation 75
Goal-equivalent secure business process re-engineering 75
An Ontology for Secure Socio-Technical Systems 74
Purpose Control: Did You Process the Data for the Intended Purpose? 73
Security and Trust Requirements Engineering 70
ST-Tool: A CASE Tool for Security Requirements Engineering 70
Requirements Engineering for Trust Management: Model, Methodology, and Reasoning 70
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation 69
A Privacy Model to Support Minimal Disclosure in Virtual Organizations 61
Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank 52
How to capture, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach 50
Minimal disclosure in hierarchical hippocratic databases for virtual organizations 47
Extending Agent-oriented Requirements with Declarative Business Processes: a Computational Logic-based Approach 46
E-Government and On-line Services: Security and Legal Patterns 46
An enhanced CFA for security policies 45
Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank 44
Goal-Equivalent Business Process Re-engineering 43
Engineering Secure Software and Systems: First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009: Proceedings 43
Modeling Security Requirements Models through Planning 43
Engineering Secure Software and Systems: Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010: Proceedings 40
Modelling Security Requirements Through Ownership, Permissions and Delegations 38
Requirements engineering meets trust management: model, methodology, and reasoning 35
Using Semantic Annotation for Mining Privacy and Security Requirements from European Union Directives 10
Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank 9
Designing Security Requirements Models through Planning 8
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation 7
Privacy is Linking Permission to Purpose 6
Modeling Security Requirements Through Ownership, Permission and Delegation 6
Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation 6
Reasoning about Risk in Agent's Deliberation Process: a Jadex Implementation 5
Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations 5
Modeling Social and Individual Trust in Requirements Engineering Methodologies 5
Filling the gap between Requirements Engineering and Public Key/Trust Management Infrastructures 5
Requirements Engineering meets Trust Management: Model, Methodology, and Reasoning 5
From Trust to Dependability through Risk Analysis 5
Totale 3.681
Categoria #
all - tutte 17.538
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 2.182
Totale 19.720


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020863 0 0 0 94 141 83 152 94 139 51 35 74
2020/2021572 39 71 61 69 58 35 48 30 50 31 56 24
2021/2022447 26 105 0 7 6 17 38 92 16 25 24 91
2022/2023623 90 65 7 96 71 109 0 47 94 3 18 23
2023/2024238 17 26 9 7 24 62 20 21 2 9 10 31
2024/2025128 2 3 43 80 0 0 0 0 0 0 0 0
Totale 3.681