Mattia Salnitri

Orcid: 0000-0002-9736-2774

According to our database1, Mattia Salnitri authored at least 41 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Designing secure business processes for blockchains with SecBPMN2BC.
Future Gener. Comput. Syst., April, 2023

Efficient Data as a Service in Fog Computing: An Adaptive Multi-Agent Based Approach.
IEEE Trans. Cloud Comput., 2023

Welcome to the Tenth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'23).
Proceedings of the 31st IEEE International Requirements Engineering Conference, RE 2023, 2023

Towards Designing Energy-Aware Cybersecurity Policies.
Proceedings of the Intelligent Information Systems, 2023

2022
Towards Assessing Data Bias in Clinical Trials.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2022

Enabling Real-World Medicine with Data Lake Federation: A Research Perspective.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2022

2021
Welcome to the Eighth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'21).
Proceedings of the 29th IEEE International Requirements Engineering Conference Workshops, 2021

2020
An Introduction to Privacy.
Proceedings of the Visual Privacy Management, 2020

Visual Privacy Management.
Proceedings of the Visual Privacy Management, 2020

A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study.
Proceedings of the Visual Privacy Management, 2020

Empirical Evaluation of the VisiOn Privacy Platform.
Proceedings of the Visual Privacy Management, 2020

The Architecture of VisiOn Privacy Platform.
Proceedings of the Visual Privacy Management, 2020

Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach.
Softw. Syst. Model., 2020

A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements.
Softw. Syst. Model., 2020

Improving Health Monitoring With Adaptive Data Movement in Fog Computing.
Frontiers Robotics AI, 2020

Fast Replica of Polyglot Persistence in Microservice Architectures for Fog Computing.
Proceedings of the Service-Oriented Computing - 18th International Conference, 2020

2019
Goal-oriented requirements engineering: an extended systematic mapping study.
Requir. Eng., 2019

Strategies for Data and Computation Movements in Fog Computing.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019

2018
Integrating BPMN- and UML-based Security Engineering via Model Transformation.
Proceedings of the Software Engineering und Software Management 2018, 2018

Modeling and Reasoning About Privacy-Consent Requirements.
Proceedings of the Practice of Enterprise Modeling - 11th IFIP WG 8.1. Working Conference, PoEM 2018, Vienna, Austria, October 31, 2018

Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models.
Proceedings of the Modelling Foundations and Applications - 14th European Conference, 2018

From Security-by-Design to the Identification of Security-Critical Deviations in Process Executions.
Proceedings of the Information Systems in the Big Data Era, 2018

Fog Computing and Data as a Service: A Goal-Based Modeling Approach to Enable Effective Data Movements.
Proceedings of the Advanced Information Systems Engineering, 2018

2017
Designing secure business processes with SecBPMN.
Softw. Syst. Model., 2017

From Secure Business Process Modeling to Design-Level Security Verification.
Proceedings of the 20th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2017

Toward GDPR-Compliant Socio-Technical Systems: Modeling Language and Reasoning Framework.
Proceedings of the Practice of Enterprise Modeling, 2017

A Holistic Approach for Privacy Protection in E-Government.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Secure Business Process Engineering: a socio-technical approach.
PhD thesis, 2016

Maintaining Secure Business Processes in Light of Socio-Technical Systems' Evolution.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Goal-Oriented Requirements Engineering: A Systematic Literature Map.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

2015
Using Goal Models Downstream: A Systematic Roadmap and Literature Review.
Int. J. Inf. Syst. Model. Des., 2015

STS-Tool 3.0: Maintaining Security in Socio-Technical Systems.
Proceedings of the CAiSE 2015 Forum at the 27th International Conference on Advanced Information Systems Engineering co-located with 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015

From Secure Business Process Models to Secure Artifact-Centric Specifications.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2015

2014
From Consumer Requirements to Policies in Secure Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Taking goal models downstream: A systematic roadmap.
Proceedings of the IEEE 8th International Conference on Research Challenges in Information Science, 2014

Transforming Socio-Technical Security Requirements in SecBPMN Security Policies.
Proceedings of the Seventh International i* Workshop co-located with the 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), 2014

Modeling and verification of ATM security policies with SecBPMN.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

Preserving Compliance with Security Requirements in Socio-Technical Systems.
Proceedings of the Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, 2014

Modeling and Verifying Security Policies in Business Processes.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2014

2012
Aligning Service-Oriented Architectures with Security Requirements.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012, 2012


  Loading...