Federica Paci
Orcid: 0000-0003-3122-0236Affiliations:
- University of Verona, Italy
According to our database1,
Federica Paci
authored at least 79 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Access, 2024
2023
Empir. Softw. Eng., 2023
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2021
Connecting Regulatory Requirements to Audit Outcomes: A Model-driven Approach to Auditable Compliance.
Proceedings of the ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
2020
Inf., 2020
Comput. Secur., 2020
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
2018
ACM Comput. Surv., 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
2017
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations.
Empir. Softw. Eng., 2017
On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
EEVi - framework for evaluating the effectiveness of visualization in cyber-security.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2015
Proceedings of the 2015 IEEE Fifth International Workshop on Empirical Requirements Engineering, 2015
2014
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
Assessing a requirements evolution approach: Empirical studies in the air traffic management domain.
J. Syst. Softw., 2014
Int. J. Secur. Softw. Eng., 2014
Ann. des Télécommunications, 2014
An experiment on comparing textual vs. visual industrial methods for security risk assessment.
Proceedings of the 4th IEEE International Workshop on Empirical Requirements Engineering, 2014
Security triage: A report of a lean security requirements methodology for cost-effective security analysis.
Proceedings of the 4th IEEE International Workshop on Empirical Requirements Engineering, 2014
Security triage: an industrial case study on the effectiveness of a lean methodology to identify security requirements.
Proceedings of the 2014 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
Proceedings of the 2013 ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the Availability, Reliability, and Security in Information Systems and HCI, 2013
2012
Assessing a requirements evolution approach: Empirical studies in the Air Traffic Management domain.
Proceedings of the Second IEEE International Workshop on Empirical Requirements Engineering, 2012
How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners.
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012
2011
ACM Trans. Web, 2011
Comput. Stand. Interfaces, 2011
Proceedings of the 13th IEEE Conference on Commerce and Enterprise Computing, 2011
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011
Proceedings of the POLICY 2011, 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
Proceedings of the Advanced Information Systems Engineering Workshops, 2011
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011
2010
IEEE Trans. Parallel Distributed Syst., 2010
Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications.
Proceedings of the Information Security Technology for Applications, 2010
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010
Proceedings of the 26th International Conference on Data Engineering, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Springer, ISBN: 978-3-540-87741-7, 2010
2009
An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices.
J. Softw., 2009
IEEE Data Eng. Bull., 2009
Proceedings of the 18th International Conference on World Wide Web, 2009
VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices.
Proceedings of the MDM 2009, 2009
Proceedings of the IDtrust 2009, 2009
Proceedings of the IEEE International Conference on Web Services, 2009
2008
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008
Proceedings of the Service-Oriented Computing, 2008
Proceedings of the 4th Workshop on Digital Identity Management, 2008
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008
2007
ACM Trans. Inf. Syst. Secur., 2007
Int. J. Inf. Sec., 2007
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007
2006
Int. J. Web Based Communities, 2006
Proceedings of the 15th international conference on World Wide Web, 2006
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006