R. Matulevicius, N. Mayer, H. Mouratidis, E. Dubois, P. Heymans, and N. Genon. Adapting Secure Tropos for Security Risk Management during Early Phases of the Information Systems Development. Proceedings of the 20th International Conference on Advanced Information Systems Engineering (CAiSE'08), 541-555, 2008.
P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Detecting Conflicts of Interest. In Proceedings of the 14th IEEE International Requirements Engineering Conference (RE'06). IEEE Computer Society Press, 2006. To appear.
V. Bryl, F. Massacci, J. Mylopoulos and N. Zannone. Designing Security Requirements Models through Planning. In Proceedings of the 18th Conference on Advanced Information Systems Engineering (CAiSE'06), 2006. To appear.
F. Massacci, M. Prest and N. Zannone. Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation. Computer Standards & Interfaces, 27(5):445-455, 2005.
N. Mayer, A. Rifaut, E. Dubois: Towards a Risk-Based Security Requirements Engineering Framework. 11th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'05), in conjunction with CAiSE'05, Porto, Portugal, June 2005.
P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Modeling Security Requirements Through Ownership, Permission and Delegation. In Proceedings of the 13th IEEE International Requirements Engineering Conference (RE'05), pages 167-176. IEEE Computer Society Press, 2005.
P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Filling the gap between Requirements Engineering and Public Key/Trust Management Infrastructures. In Proceedings of the 1st European PKI Workshop: Research and Applications (1st EuroPKI), LNCS 3093, pages 98-111. Springer-Verlag GmbH, 2004.
F. Massacci and N. Zannone. Privacy is Linking Permission to Purpose. In Proceedings of the Twelfth International Workshop on Security Protocols, 2004.
H. Mouratidis, P. Giorgini, M. Schumacher. Security Patterns for Agent Systems. In Proccedings of Eighth European Conference on Pattern Languages of Programs 25- 29, June 2003 Irsee, Germany.
P. Bresciani, P. Giorgini, and H. Mouratidis On Security Requirements Analysis for Multi-Agent Systems. Proceedings of 2nd International Workshop on Software Engineering for Large- Scale Multi- Agent Systems SELMAS 2003 in conjunction with the 25th International Conference on Software Engineering (ICSE 2003), Portland, Oregon, USA, in May 3-4, 2003.
H. Mouratidis, P. Giorgini, and G. Manson. An Ontology for Modelling Security: The Tropos Approach. Proceedings of the KES 2003 Invited Session Ontology and Multi- Agent Systems Design (OMASD'03), 3, 4 & 5 September 2003, University of Oxford, United Kingdom.
H. Mouratidis, P. Giorgini, G. Manson. Modelling Secure Multiagent Systems. In Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems, Melbourne, Australia, July 2003
H. Mouratidis, P. Giorgini, G. Manson, A. Gani. Analysing Security Requirements of Information Systems Using Tropos, (to appear) in the Proceedings of the 5th International Conference on Enterprise Information Systems, Angers - France, April 2003