@inproceedings{SalnitriAGZG18, title = {From Security-by-Design to the Identification of Security-Critical Deviations in Process Executions}, author = {Mattia Salnitri and Mahdi Alizadeh and Daniele Giovanella and Nicola Zannone and Paolo Giorgini}, year = {2018}, doi = {10.1007/978-3-319-92901-9_19}, url = {https://doi.org/10.1007/978-3-319-92901-9_19}, researchr = {https://researchr.org/publication/SalnitriAGZG18}, cites = {0}, citedby = {0}, pages = {218-234}, booktitle = {caise}, } @incollection{AhmadianPJSGMR20, title = {The Architecture of VisiOn Privacy Platform}, author = {Amir Shayan Ahmadian and Sven Peldszus and Jan Jürjens and Mattia Salnitri and Paolo Giorgini and Haralambos Mouratidis and José Fran. Ruiz}, year = {2020}, doi = {10.1007/978-3-030-59944-7_3}, url = {https://doi.org/10.1007/978-3-030-59944-7_3}, researchr = {https://researchr.org/publication/AhmadianPJSGMR20}, cites = {0}, citedby = {0}, pages = {54-76}, booktitle = {Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform}, editor = {Mattia Salnitri and Jan Jürjens and Haralambos Mouratidis and Loredana Mancini and Paolo Giorgini}, volume = {12030}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-030-59944-7}, } @inproceedings{HorkoffLLSCGMP14, title = {Taking goal models downstream: A systematic roadmap}, author = {Jennifer Horkoff and Tong Li and Feng-Lin Li and Mattia Salnitri and Evellin Cardoso and Paolo Giorgini and John Mylopoulos and João Pimentel}, year = {2014}, doi = {10.1109/RCIS.2014.6861036}, url = {http://dx.doi.org/10.1109/RCIS.2014.6861036}, researchr = {https://researchr.org/publication/HorkoffLLSCGMP14}, cites = {0}, citedby = {0}, pages = {1-12}, booktitle = {rcis}, } @article{RamadanSSJRS20, title = {A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements}, author = {Qusai Ramadan and Daniel Strüber 0001 and Mattia Salnitri and Jan Jürjens and Volker Riediger and Steffen Staab}, year = {2020}, doi = {10.1007/s10270-020-00781-x}, url = {https://doi.org/10.1007/s10270-020-00781-x}, researchr = {https://researchr.org/publication/RamadanSSJRS20}, cites = {0}, citedby = {0}, journal = {SoSyM}, volume = {19}, number = {5}, pages = {1191-1227}, } @inproceedings{SalnitriPG14, title = {Preserving Compliance with Security Requirements in Socio-Technical Systems}, author = {Mattia Salnitri and Elda Paja and Paolo Giorgini}, year = {2014}, doi = {10.1007/978-3-319-12574-9_5}, url = {http://dx.doi.org/10.1007/978-3-319-12574-9_5}, researchr = {https://researchr.org/publication/SalnitriPG14}, cites = {0}, citedby = {0}, pages = {49-61}, booktitle = {cspf}, } @incollection{GharibGSPMPR20, title = {A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study}, author = {Mohamad Gharib and Paolo Giorgini and Mattia Salnitri and Elda Paja and Haralambos Mouratidis and Michalis Pavlidis and José Fran. Ruiz}, year = {2020}, doi = {10.1007/978-3-030-59944-7_2}, url = {https://doi.org/10.1007/978-3-030-59944-7_2}, researchr = {https://researchr.org/publication/GharibGSPMPR20}, cites = {0}, citedby = {0}, pages = {22-53}, booktitle = {Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform}, editor = {Mattia Salnitri and Jan Jürjens and Haralambos Mouratidis and Loredana Mancini and Paolo Giorgini}, volume = {12030}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-030-59944-7}, } @inproceedings{AngelopoulosDMP17, title = {A Holistic Approach for Privacy Protection in E-Government}, author = {Konstantinos Angelopoulos and Vasiliki Diamantopoulou and Haralambos Mouratidis and Michalis Pavlidis and Mattia Salnitri and Paolo Giorgini and José F. Ruiz}, year = {2017}, doi = {10.1145/3098954.3098960}, url = {http://doi.acm.org/10.1145/3098954.3098960}, researchr = {https://researchr.org/publication/AngelopoulosDMP17}, cites = {0}, citedby = {0}, booktitle = {IEEEares}, } @inproceedings{SalnitriDG14, title = {Modeling and Verifying Security Policies in Business Processes}, author = {Mattia Salnitri and Fabiano Dalpiaz and Paolo Giorgini}, year = {2014}, doi = {10.1007/978-3-662-43745-2_14}, url = {http://dx.doi.org/10.1007/978-3-662-43745-2_14}, researchr = {https://researchr.org/publication/SalnitriDG14}, cites = {0}, citedby = {0}, pages = {200-214}, booktitle = {caise}, } @inproceedings{SalnitriPPG15, title = {STS-Tool 3.0: Maintaining Security in Socio-Technical Systems}, author = {Mattia Salnitri and Elda Paja and Mauro Poggianella and Paolo Giorgini}, year = {2015}, url = {http://ceur-ws.org/Vol-1367/paper-27.pdf}, researchr = {https://researchr.org/publication/SalnitriPPG15}, cites = {0}, citedby = {0}, pages = {205-212}, booktitle = {caise}, } @inproceedings{SalnitriPG16, title = {Maintaining Secure Business Processes in Light of Socio-Technical Systems' Evolution}, author = {Mattia Salnitri and Elda Paja and Paolo Giorgini}, year = {2016}, doi = {10.1109/REW.2016.038}, url = {http://doi.ieeecomputersociety.org/10.1109/REW.2016.038}, researchr = {https://researchr.org/publication/SalnitriPG16}, cites = {0}, citedby = {0}, pages = {155-164}, booktitle = {RE}, } @incollection{BonuttoCKMS20, title = {Empirical Evaluation of the VisiOn Privacy Platform}, author = {Dimitri Bonutto and Ilia Christantoni and Dimitris Kosmidis and Francesco Micucci and Mattia Salnitri}, year = {2020}, doi = {10.1007/978-3-030-59944-7_5}, url = {https://doi.org/10.1007/978-3-030-59944-7_5}, researchr = {https://researchr.org/publication/BonuttoCKMS20}, cites = {0}, citedby = {0}, pages = {109-148}, booktitle = {Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform}, editor = {Mattia Salnitri and Jan Jürjens and Haralambos Mouratidis and Loredana Mancini and Paolo Giorgini}, volume = {12030}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-030-59944-7}, } @inproceedings{SalnitriBG15, title = {From Secure Business Process Models to Secure Artifact-Centric Specifications}, author = {Mattia Salnitri and Achim D. Brucker and Paolo Giorgini}, year = {2015}, doi = {10.1007/978-3-319-19237-6_16}, url = {http://dx.doi.org/10.1007/978-3-319-19237-6_16}, researchr = {https://researchr.org/publication/SalnitriBG15}, cites = {0}, citedby = {0}, pages = {246-262}, booktitle = {caise}, } @inproceedings{RamadanS0JG18, title = {Integrating BPMN- and UML-based Security Engineering via Model Transformation}, author = {Qusai Ramadan and Mattia Salnitri and Daniel Strüber 0001 and Jan Jürjens and Paolo Giorgini}, year = {2018}, url = {https://dl.gi.de/20.500.12116/16320}, researchr = {https://researchr.org/publication/RamadanS0JG18}, cites = {0}, citedby = {0}, pages = {63-64}, booktitle = {se}, } @article{CappielloMPPSVT20, title = {Improving Health Monitoring With Adaptive Data Movement in Fog Computing}, author = {Cinzia Cappiello and Giovanni Meroni and Barbara Pernici and Pierluigi Plebani and Mattia Salnitri and Monica Vitali and Diana Trojaniello and Ilio Catallo and Alberto Sanna}, year = {2020}, doi = {10.3389/frobt.2020.00096}, url = {https://doi.org/10.3389/frobt.2020.00096}, researchr = {https://researchr.org/publication/CappielloMPPSVT20}, cites = {0}, citedby = {0}, journal = {firai}, volume = {7}, pages = {96}, } @incollection{RiosMIDS14, title = {From Consumer Requirements to Policies in Secure Services}, author = {Erkuden Rios and Francesco Malmignati and Eider Iturbe and Michela D'Errico and Mattia Salnitri}, year = {2014}, doi = {10.1007/978-3-319-13518-2_6}, url = {http://dx.doi.org/10.1007/978-3-319-13518-2_6}, researchr = {https://researchr.org/publication/RiosMIDS14}, cites = {0}, citedby = {0}, pages = {79-94}, booktitle = {Secure and Trustworthy Service Composition - The Aniketos Approach}, editor = {Achim D. Brucker and Fabiano Dalpiaz and Paolo Giorgini and Per Håkon Meland and Erkuden Rios}, volume = {8900}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-319-13517-5}, } @inproceedings{GharibSPGMPRFS16, title = {Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform}, author = {Mohamad Gharib and Mattia Salnitri and Elda Paja and Paolo Giorgini and Haralambos Mouratidis and Michalis Pavlidis and Jose F. Ruiz and Sandra Fernandez and Andrea Della Siria}, year = {2016}, doi = {10.1109/RE.2016.13}, url = {http://dx.doi.org/10.1109/RE.2016.13}, researchr = {https://researchr.org/publication/GharibSPGMPRFS16}, cites = {0}, citedby = {0}, pages = {256-265}, booktitle = {RE}, } @article{HorkoffLLSCGM15, title = {Using Goal Models Downstream: A Systematic Roadmap and Literature Review}, author = {Jennifer Horkoff and Tong Li and Feng-Lin Li and Mattia Salnitri and Evellin Cardoso and Paolo Giorgini and John Mylopoulos}, year = {2015}, doi = {10.4018/IJISMD.2015040101}, url = {http://dx.doi.org/10.4018/IJISMD.2015040101}, researchr = {https://researchr.org/publication/HorkoffLLSCGM15}, cites = {0}, citedby = {0}, journal = {ijismd}, volume = {6}, number = {2}, pages = {1-42}, } @incollection{PeldszusASJPM20, title = {Visual Privacy Management}, author = {Sven Peldszus and Amir Shayan Ahmadian and Mattia Salnitri and Jan Jürjens and Michalis Pavlidis and Haralambos Mouratidis}, year = {2020}, doi = {10.1007/978-3-030-59944-7_4}, url = {https://doi.org/10.1007/978-3-030-59944-7_4}, researchr = {https://researchr.org/publication/PeldszusASJPM20}, cites = {0}, citedby = {0}, pages = {77-108}, booktitle = {Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform}, editor = {Mattia Salnitri and Jan Jürjens and Haralambos Mouratidis and Loredana Mancini and Paolo Giorgini}, volume = {12030}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-030-59944-7}, } @inproceedings{PlebaniSV18, title = {Fog Computing and Data as a Service: A Goal-Based Modeling Approach to Enable Effective Data Movements}, author = {Pierluigi Plebani and Mattia Salnitri and Monica Vitali}, year = {2018}, doi = {10.1007/978-3-319-91563-0_13}, url = {https://doi.org/10.1007/978-3-319-91563-0_13}, researchr = {https://researchr.org/publication/PlebaniSV18}, cites = {0}, citedby = {0}, pages = {203-219}, booktitle = {caise}, } @inproceedings{RobolPSG18, title = {Modeling and Reasoning About Privacy-Consent Requirements}, author = {Marco Robol and Elda Paja and Mattia Salnitri and Paolo Giorgini}, year = {2018}, doi = {10.1007/978-3-030-02302-7_15}, url = {https://doi.org/10.1007/978-3-030-02302-7_15}, researchr = {https://researchr.org/publication/RobolPSG18}, cites = {0}, citedby = {0}, pages = {238-254}, booktitle = {ifip8-1}, } @article{HorkoffACLMPSPM19, title = {Goal-oriented requirements engineering: an extended systematic mapping study}, author = {Jennifer Horkoff and Fatma Basak Aydemir and Evellin Cardoso and Tong Li 0001 and Alejandro Maté and Elda Paja and Mattia Salnitri and Luca Piras and John Mylopoulos and Paolo Giorgini}, year = {2019}, doi = {10.1007/s00766-017-0280-z}, url = {https://doi.org/10.1007/s00766-017-0280-z}, researchr = {https://researchr.org/publication/HorkoffACLMPSPM19}, cites = {0}, citedby = {0}, journal = {re}, volume = {24}, number = {2}, pages = {133-160}, } @incollection{PraitanoGDS20, title = {An Introduction to Privacy}, author = {Andrea Praitano and Luca Giovannetti and Vasiliki Diamantopoulou and Mattia Salnitri}, year = {2020}, doi = {10.1007/978-3-030-59944-7_1}, url = {https://doi.org/10.1007/978-3-030-59944-7_1}, researchr = {https://researchr.org/publication/PraitanoGDS20}, cites = {0}, citedby = {0}, pages = {1-21}, booktitle = {Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform}, editor = {Mattia Salnitri and Jan Jürjens and Haralambos Mouratidis and Loredana Mancini and Paolo Giorgini}, volume = {12030}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-030-59944-7}, } @inproceedings{Ki-AriesLS21, title = {Welcome to the Eighth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'21)}, author = {Duncan Ki-Aries and Seok-Won Lee and Mattia Salnitri}, year = {2021}, doi = {10.1109/REW53955.2021.00068}, url = {https://doi.org/10.1109/REW53955.2021.00068}, researchr = {https://researchr.org/publication/Ki-AriesLS21}, cites = {0}, citedby = {0}, pages = {387}, booktitle = {RE}, } @inproceedings{PlebaniSV19, title = {Strategies for Data and Computation Movements in Fog Computing}, author = {Pierluigi Plebani and Mattia Salnitri and Monica Vitali}, year = {2019}, doi = {10.1109/RE.2019.00077}, url = {https://doi.org/10.1109/RE.2019.00077}, researchr = {https://researchr.org/publication/PlebaniSV19}, cites = {0}, citedby = {0}, pages = {506-507}, booktitle = {RE}, } @article{SalnitriDG17, title = {Designing secure business processes with SecBPMN}, author = {Mattia Salnitri and Fabiano Dalpiaz and Paolo Giorgini}, year = {2017}, doi = {10.1007/s10270-015-0499-4}, url = {https://doi.org/10.1007/s10270-015-0499-4}, researchr = {https://researchr.org/publication/SalnitriDG17}, cites = {0}, citedby = {0}, journal = {SoSyM}, volume = {16}, number = {3}, pages = {737-757}, } @phdthesis{basesearch-6375, title = {Secure Business Process Engineering: a socio-technical approach}, author = {Mattia Salnitri}, year = {2016}, url = {https://www.base-search.net/Record/c8ad14d1a62307368efbc96a013c98c0770aed21f4ae500bdf01d8a5c6e68d14}, note = {base-search.net (ftutrentophd:oai:eprints-phd.biblio.unitn.it:1851)}, researchr = {https://researchr.org/publication/basesearch-6375}, cites = {0}, citedby = {0}, school = {University of Trento, Italy}, } @inproceedings{HorkoffACLMPSMG16, title = {Goal-Oriented Requirements Engineering: A Systematic Literature Map}, author = {Jennifer Horkoff and Fatma Basak Aydemir and Evellin Cardoso and Tong Li and Alejandro Maté and Elda Paja and Mattia Salnitri and John Mylopoulos and Paolo Giorgini}, year = {2016}, doi = {10.1109/RE.2016.41}, url = {http://dx.doi.org/10.1109/RE.2016.41}, researchr = {https://researchr.org/publication/HorkoffACLMPSMG16}, cites = {0}, citedby = {0}, pages = {106-115}, booktitle = {RE}, } @inproceedings{SalnitriDG12, title = {Aligning Service-Oriented Architectures with Security Requirements}, author = {Mattia Salnitri and Fabiano Dalpiaz and Paolo Giorgini}, year = {2012}, doi = {10.1007/978-3-642-33606-5_15}, url = {http://dx.doi.org/10.1007/978-3-642-33606-5_15}, researchr = {https://researchr.org/publication/SalnitriDG12}, cites = {0}, citedby = {0}, pages = {232-249}, booktitle = {otm}, } @inproceedings{Ramadan0SRJ18, title = {Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models}, author = {Qusai Ramadan and Daniel Strüber 0001 and Mattia Salnitri and Volker Riediger and Jan Jürjens}, year = {2018}, doi = {10.1007/978-3-319-92997-2_12}, url = {https://doi.org/10.1007/978-3-319-92997-2_12}, researchr = {https://researchr.org/publication/Ramadan0SRJ18}, cites = {0}, citedby = {0}, pages = {179-198}, booktitle = {ECMDA-FA}, } @inproceedings{RobolSG17, title = {Toward GDPR-Compliant Socio-Technical Systems: Modeling Language and Reasoning Framework}, author = {Marco Robol and Mattia Salnitri and Paolo Giorgini}, year = {2017}, doi = {10.1007/978-3-319-70241-4_16}, url = {https://doi.org/10.1007/978-3-319-70241-4_16}, researchr = {https://researchr.org/publication/RobolSG17}, cites = {0}, citedby = {0}, pages = {236-250}, booktitle = {ifip8-1}, } @article{SalnitriAPDMG20, title = {Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach}, author = {Mattia Salnitri and Konstantinos Angelopoulos and Michalis Pavlidis and Vasiliki Diamantopoulou and Haralambos Mouratidis and Paolo Giorgini}, year = {2020}, doi = {10.1007/s10270-019-00744-x}, url = {https://doi.org/10.1007/s10270-019-00744-x}, researchr = {https://researchr.org/publication/SalnitriAPDMG20}, cites = {0}, citedby = {0}, journal = {SoSyM}, volume = {19}, number = {2}, pages = {467-491}, } @inproceedings{SalnitriG14-0, title = {Modeling and verification of ATM security policies with SecBPMN}, author = {Mattia Salnitri and Paolo Giorgini}, year = {2014}, doi = {10.1109/HPCSim.2014.6903740}, url = {http://dx.doi.org/10.1109/HPCSim.2014.6903740}, researchr = {https://researchr.org/publication/SalnitriG14-0}, cites = {0}, citedby = {0}, pages = {588-591}, booktitle = {hpcs}, } @inproceedings{CantaruttiPS20, title = {Fast Replica of Polyglot Persistence in Microservice Architectures for Fog Computing}, author = {Michele Cantarutti and Pierluigi Plebani and Mattia Salnitri}, year = {2020}, doi = {10.1007/978-3-030-65310-1_4}, url = {https://doi.org/10.1007/978-3-030-65310-1_4}, researchr = {https://researchr.org/publication/CantaruttiPS20}, cites = {0}, citedby = {0}, pages = {45-55}, booktitle = {icsoc}, } @inproceedings{RamadanS0JG17, title = {From Secure Business Process Modeling to Design-Level Security Verification}, author = {Qusai Ramadan and Mattia Salnitri and Daniel Strüber 0001 and Jan Jürjens and Paolo Giorgini}, year = {2017}, doi = {10.1109/MODELS.2017.10}, url = {http://doi.ieeecomputersociety.org/10.1109/MODELS.2017.10}, researchr = {https://researchr.org/publication/RamadanS0JG17}, cites = {0}, citedby = {0}, pages = {123-133}, booktitle = {MoDELS}, } @inproceedings{SalnitriG14, title = {Transforming Socio-Technical Security Requirements in SecBPMN Security Policies}, author = {Mattia Salnitri and Paolo Giorgini}, year = {2014}, url = {http://ceur-ws.org/Vol-1157/paper24.pdf}, researchr = {https://researchr.org/publication/SalnitriG14}, cites = {0}, citedby = {0}, booktitle = {istar}, } @book{lncs-12030, title = {Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform}, year = {2020}, doi = {10.1007/978-3-030-59944-7}, url = {https://doi.org/10.1007/978-3-030-59944-7}, researchr = {https://researchr.org/publication/lncs-12030}, cites = {0}, citedby = {0}, editor = {Mattia Salnitri and Jan Jürjens and Haralambos Mouratidis and Loredana Mancini and Paolo Giorgini}, volume = {12030}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-030-59944-7}, }