Albin Zuccato

Orcid: 0000-0003-4496-7611

According to our database1, Albin Zuccato authored at least 13 papers between 2002 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Privacy-Preserving Identifiers for IoT: A Systematic Literature Review.
IEEE Access, 2020

2018
A MOOC on Privacy by Design and the GDPR.
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018

2012
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

2011
Service Security Requirement Profiles for Telecom: How Software Engineers May Tackle Security.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

2009
Report: Functional Security Testing Closing the Software - Security Testing Gap: A Case from a Telecom Provider.
Proceedings of the Engineering Secure Software and Systems, 2009

2008
Methodology for Service-Oriented Management of Security Assurance in Communication Infrastructures.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Security Requirement Engineering at a Telecom Provider.
Proceedings of the The Third International Conference on Availability, 2008

2007
Holistic security management framework applied in electronic commerce.
Comput. Secur., 2007

Identity Deployment and Management in Wireless Mesh Networks.
Proceedings of the Future of Identity in the Information Society, 2007

2005
A Decision Matrix Approach.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

2004
Holistic security requirement engineering for electronic commerce.
Comput. Secur., 2004

2002
A modified mean value approach to assess security risk.
Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 2002


  Loading...