


default search action
Federica Paci
Person information
- affiliation: University of Verona, Italy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Federico Cunico
, Stefano Aldegheri
, Andrea Avogaro, Michele Boldo
, Nicola Bombieri
, Luigi Capogrosso
, Ariel Caputo, Damiano Carra
, Stefano Centomo, Dong Seon Cheng
, Ettore Cinquetti, Marco Cristani
, Mirco De Marchi
, Florenc Demrozi
, Marco Emporio
, Franco Fummi
, Luca Geretti
, Samuele Germiniani
, Andrea Giachetti, Federico Girella
, Enrico Martini
, Gloria Menegaz
, Niek Muijs, Federica Paci, Marco Panato, Graziano Pravadelli
, Elisa Quintarelli, Ilaria Siviero
, Silvia Francesca Storti
, Carlo Tadiello, Cristian Turetta
, Tiziano Villa
, Nicola Zannone
, Davide Quaglia
:
Enhancing Safety and Privacy in Industry 4.0: The ICE Laboratory Case Study. IEEE Access 12: 154570-154599 (2024) - [i1]Mila Dalla Preda, Niccolò Marastoni, Federica Paci:
Next Generation Vulnerability Detection with LLMs. ERCIM News 139(138) (2024) - 2023
- [j23]Katsiaryna Labunets
, Fabio Massacci, Federica Paci, Katja Tuma
:
A new, evidence-based, theory for knowledge reuse in security risk analysis. Empir. Softw. Eng. 28(4): 90 (2023) - [c57]Federica Paci
, Jacopo Pizzoli
, Nicola Zannone
:
A Comprehensive Study on Third-Party User Tracking in Mobile Applications. ARES 2023: 97:1-97:8 - [c56]Marco Lucchese
, Francesco Lupia
, Massimo Merro
, Federica Paci
, Nicola Zannone
, Angelo Furfaro
:
HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems. ARES 2023: 113:1-113:10 - [c55]Gelareh Hasel Mehri
, Inez L. Wester
, Federica Paci
, Nicola Zannone
:
Mitigating Privilege Misuse in Access Control through Anomaly Detection. ARES 2023: 139:1-139:10 - [c54]Marco Lucchese
, Massimo Merro
, Federica Paci
, Nicola Zannone
:
Towards A High-interaction Physics-aware Honeynet for Industrial Control Systems. SAC 2023: 76-79 - 2021
- [c53]Anna Lisa Ferrara, Federica Paci, Chiara Ricciardi:
Verifiable Hierarchical Key Assignment Schemes. DBSec 2021: 357-376 - [c52]Robert Thorburn
, Federica Paci, Vladimiro Sassone, Sophie Stalla-Bourdillon
:
Connecting Regulatory Requirements to Audit Outcomes: A Model-driven Approach to Auditable Compliance. MoDELS (Companion) 2021: 641-642 - 2020
- [j22]Stephen Hart
, Andrea Margheri
, Federica Paci
, Vladimiro Sassone:
Riskio: A Serious Game for Cyber Security Awareness and Education. Comput. Secur. 95: 101827 (2020) - [j21]Sebastian Pape
, Federica Paci
, Jan Jürjens
, Fabio Massacci
:
Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach. Inf. 11(5): 261 (2020) - [j20]Stephen Hart, Anna Lisa Ferrara, Federica Paci
:
Fuzzy-based approach to assess and prioritize privacy risks. Soft Comput. 24(3): 1553-1563 (2020) - [c51]Marco De Bona, Federica Paci:
A real world study on employees' susceptibility to phishing attacks. ARES 2020: 4:1-4:10 - [c50]Federica Paci
, Davide Bianchin, Elisa Quintarelli
, Nicola Zannone
:
IFTTT Privacy Checker. ETAA@ESORICS 2020: 90-107
2010 – 2019
- 2019
- [j19]Sowmya Ravidas, Alexios Lekidis
, Federica Paci, Nicola Zannone
:
Access control in Internet-of-Things: A survey. J. Netw. Comput. Appl. 144: 79-101 (2019) - 2018
- [j18]Federica Paci
, Anna Cinzia Squicciarini
, Nicola Zannone
:
Survey on Access Control for Community-Centered Collaborative Systems. ACM Comput. Surv. 51(1): 6:1-6:38 (2018) - [c49]Luciano Argento
, Andrea Margheri
, Federica Paci
, Vladimiro Sassone
, Nicola Zannone
:
Towards Adaptive Access Control. DBSec 2018: 99-109 - [c48]Katsiaryna Labunets, Fabio Massacci, Federica Paci, Sabrina Marczak, Flávio Moreira de Oliveira:
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations. ICSE 2018: 395 - 2017
- [j17]Katsiaryna Labunets, Fabio Massacci
, Federica Paci
, Sabrina Marczak, Flávio Moreira de Oliveira:
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations. Empir. Softw. Eng. 22(6): 3017-3056 (2017) - [c47]Shorouq Alansari, Federica Paci
, Andrea Margheri
, Vladimiro Sassone:
Privacy-Preserving Access Control in Cloud Federations. CLOUD 2017: 757-760 - [c46]Shorouq Alansari, Federica Paci
, Vladimiro Sassone:
A Distributed Access Control System for Cloud Federations. ICDCS 2017: 2131-2136 - [c45]Md. Sadek Ferdous
, Andrea Margheri
, Federica Paci
, Mu Yang, Vladimiro Sassone:
Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations. ICDCS 2017: 2632-2633 - [c44]Katsiaryna Labunets, Fabio Massacci
, Federica Paci
:
On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment. REFSQ 2017: 191-208 - 2016
- [j16]Fatimah Y. Akeel, Asieh Salehi Fathabadi
, Federica Paci, Andrew M. Gravell, Gary B. Wills
:
Formal Modelling of Data Integration Systems Security Policies. Data Sci. Eng. 1(3): 139-148 (2016) - [c43]Olga Gadyatskaya, Katsiaryna Labunets, Federica Paci
:
Towards Empirical Evaluation of Automated Risk Assessment Methods. CRiSIS 2016: 77-86 - [c42]Aneesha Sethi
, Federica Paci
, Gary B. Wills
:
EEVi - framework for evaluating the effectiveness of visualization in cyber-security. ICITST 2016: 340-345 - 2015
- [c41]Katsiaryna Labunets, Federica Paci
, Fabio Massacci
:
Which security catalogue is better for novices? EmpiRE 2015: 25-32 - [c40]Martina de Gramatica, Katsiaryna Labunets
, Fabio Massacci
, Federica Paci
, Alessandra Tedeschi:
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals. REFSQ 2015: 98-114 - [c39]Federica Paci
, Nicola Zannone
:
Preventing Information Inference in Access Control. SACMAT 2015: 87-97 - 2014
- [j15]Anna Cinzia Squicciarini
, Federica Paci
, Smitha Sundareswaran:
PriMa: a comprehensive approach to privacy protection in social network sites. Ann. des Télécommunications 69(1-2): 21-36 (2014) - [j14]Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout
, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
Evolution of Security Engineering Artifacts: A State of the Art Survey. Int. J. Secur. Softw. Eng. 5(4): 48-98 (2014) - [j13]Fabio Massacci
, Federica Paci
, Le Minh Sang Tran, Alessandra Tedeschi:
Assessing a requirements evolution approach: Empirical studies in the air traffic management domain. J. Syst. Softw. 95: 70-88 (2014) - [c38]Fabio Massacci
, Federica Paci
, Bjørnar Solhaug, Alessandra Tedeschi:
EMFASE - An Empirical Framework for Security Design and Economic Trade-off. ARES 2014: 537-543 - [c37]Matteo Giacalone, Federica Paci
, Rocco Mammoliti, Rodolfo Perugino, Fabio Massacci
, Claudio Selli:
Security triage: an industrial case study on the effectiveness of a lean methodology to identify security requirements. ESEM 2014: 24:1-24:8 - [c36]Matteo Giacalone, Rocco Mammoliti, Fabio Massacci
, Federica Paci
, Rodolfo Perugino, Claudio Selli:
Security triage: A report of a lean security requirements methodology for cost-effective security analysis. EmpiRE 2014: 25-27 - [c35]Katsiaryna Labunets
, Federica Paci
, Fabio Massacci
, Raminder S. Ruprai:
An experiment on comparing textual vs. visual industrial methods for security risk assessment. EmpiRE 2014: 28-35 - [p1]Riccardo Scandariato, Federica Paci, Le Minh Sang Tran, Katsiaryna Labunets, Koen Yskout
, Fabio Massacci
, Wouter Joosen:
Empirical Assessment of Security Requirements and Architecture: Lessons Learned. Engineering Secure Future Internet Services and Systems 2014: 35-64 - 2013
- [j12]Elisa Costante, Federica Paci
, Nicola Zannone
:
Privacy-Aware Web Service Composition and Ranking. Int. J. Web Serv. Res. 10(3): 1-23 (2013) - [c34]Federica Paci
, M. Carmen Fernández Gago, Francisco Moyano
:
Detecting Insider Threats: A Trust-Aware Framework. ARES 2013: 121-130 - [c33]Kristian Beckers, Stephan Faßbender, Maritta Heisel, Federica Paci
:
Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods. CD-ARES 2013: 178-194 - [c32]Katsiaryna Labunets
, Fabio Massacci
, Federica Paci
, Le Minh Sang Tran:
An Experimental Comparison of Two Risk-Based Security Methods. ESEM 2013: 163-172 - [c31]Elisa Costante, Federica Paci
, Nicola Zannone
:
Privacy-Aware Web Service Composition and Ranking. ICWS 2013: 131-138 - [c30]Marina Egea, Federica Paci, Marinella Petrocchi, Nicola Zannone
:
PERSONA - A Personalized Data Protection Framework. IFIPTM 2013: 272-280 - 2012
- [c29]Federica Paci
, Fabio Massacci
, Fabrice Bouquet
, Stephane Debricon:
Managing Evolution by Orchestrating Requirements and Testing Engineering Processes. ICST 2012: 834-841 - [c28]Fabio Massacci
, Federica Paci
:
How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners. NordSec 2012: 89-104 - [c27]Fabio Massacci
, Deepa Nagaraj, Federica Paci
, Le Minh Sang Tran, Alessandra Tedeschi:
Assessing a requirements evolution approach: Empirical studies in the Air Traffic Management domain. EmpiRE 2012: 49-56 - 2011
- [j11]Anna Cinzia Squicciarini
, Federica Paci
, Elisa Bertino:
Trust establishment in the formation of Virtual Organizations. Comput. Stand. Interfaces 33(1): 13-23 (2011) - [j10]Federica Paci
, Massimo Mecella
, Mourad Ouzzani, Elisa Bertino:
ACConv - An Access Control Model for Conversational Web Services. ACM Trans. Web 5(3): 13:1-13:33 (2011) - [c26]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu:
A Tool for Managing Evolving Security Requirements. CAiSE Forum 2011: 49-56 - [c25]Gábor Bergmann
, Fabio Massacci
, Federica Paci
, Thein Than Tun, Dániel Varró
, Yijun Yu:
A Tool for Managing Evolving Security Requirements. CAiSE Forum (Selected Papers) 2011: 110-125 - [c24]Fabio Massacci
, John Mylopoulos, Federica Paci
, Thein Than Tun, Yijun Yu
:
An Extended Ontology for Security Requirements. CAiSE Workshops 2011: 622-636 - [c23]Edith Felix, Olivier Delande, Fabio Massacci
, Federica Paci
:
Managing changes with legacy security engineering processes. ISI 2011: 137-142 - [c22]Nicola Dragoni
, Eduardo Lostal, Olga Gadyatskaya, Fabio Massacci
, Federica Paci
:
A Load Time Policy Checker for Open Multi-application Smart Cards. POLICY 2011: 153-156 - [c21]Fabio Massacci
, Fabrice Bouquet
, Elizabeta Fourneret, Jan Jürjens, Mass Soldal Lund, Sébastien Madelénat, Jan Tobias Mühlberg
, Federica Paci
, Stéphane Paul
, Frank Piessens, Bjørnar Solhaug, Sven Wenzel:
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper). ServiceWave 2011: 134-143 - [c20]Gábor Bergmann
, Fabio Massacci
, Federica Paci
, Thein Than Tun, Dániel Varró
, Yijun Yu
:
SeCMER: A Tool to Gain Control of Security Requirements Evolution. ServiceWave 2011: 321-322 - [c19]Yudistira Asnar, Tong Li, Fabio Massacci
, Federica Paci
:
Computer Aided Threat Identification. CEC 2011: 145-152 - 2010
- [b1]Elisa Bertino, Lorenzo Martino, Federica Paci
, Anna Cinzia Squicciarini
:
Security for Web Services and Service-Oriented Architectures. Springer 2010, ISBN 978-3-540-87741-7, pp. I-XII, 1-226 - [j9]Anna Cinzia Squicciarini
, Federica Paci
, Elisa Bertino, Alberto Trombetta
, Stefano Braghin
:
Group-Based Negotiations in P2P Systems. IEEE Trans. Parallel Distributed Syst. 21(10): 1473-1486 (2010) - [c18]Anna Cinzia Squicciarini
, Federica Paci
, Smitha Sundareswaran:
PriMa: an effective privacy protection mechanism for social networks. AsiaCCS 2010: 320-323 - [c17]Ning Shang, Mohamed Nabeel, Federica Paci
, Elisa Bertino:
A privacy-preserving approach to policy-based content dissemination. ICDE 2010: 944-955 - [c16]Ning Shang, Federica Paci
, Elisa Bertino:
Efficient and privacy-preserving enforcement of attribute-based access control. IDtrust 2010: 63-68 - [c15]Olga Gadyatskaya, Fabio Massacci
, Federica Paci
, Sergey A. Stankevich
:
Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications. NordSec 2010: 187-192
2000 – 2009
- 2009
- [j8]Federica Paci
, Rodolfo Ferrini, Andrea Musci, Kevin Steuer Jr., Elisa Bertino:
An Interoperable Approach to Multifactor Identity Verification. Computer 42(5): 50-57 (2009) - [j7]Elisa Bertino, Federica Paci, Rodolfo Ferrini, Ning Shang:
Privacy-preserving Digital Identity Management for Cloud Computing. IEEE Data Eng. Bull. 32(1): 21-27 (2009) - [j6]Federica Paci
, Elisa Bertino, Sam Kerr, Anna Cinzia Squicciarini
, Jungha Woo
:
An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices. J. Softw. 4(7): 696-706 (2009) - [c14]Federica Paci
, Rodolfo Ferrini, Elisa Bertino:
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. ICWS 2009: 535-542 - [c13]Federica Paci
, Ning Shang, Sam Kerr, Kevin Steuer Jr., Jungha Woo
, Elisa Bertino:
Privacy-preserving management of transactions' receipts for mobile environments. IDtrust 2009: 73-84 - [c12]Federica Paci
, Ning Shang, Kevin Steuer Jr., Ruchith Fernando, Elisa Bertino:
VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices. Mobile Data Management 2009: 367-368 - [c11]Anna Cinzia Squicciarini
, Mohamed Shehab
, Federica Paci
:
Collective privacy management in social networks. WWW 2009: 521-530 - 2008
- [j5]Federica Paci
, Elisa Bertino, Jason Crampton:
An Access-Control Framework for WS-BPEL. Int. J. Web Serv. Res. 5(3): 20-43 (2008) - [c10]Federica Paci
, Mourad Ouzzani, Massimo Mecella
:
Verification of Access Control Requirements in Web Services Choreography. IEEE SCC (1) 2008: 5-12 - [c9]Elisa Bertino, Rodolfo Ferrini, Andrea Musci, Federica Paci
, Kevin J. Steuer:
A Federated Digital Identity Management Approach for Business Processes. CollaborateCom 2008: 194-206 - [c8]Anna Cinzia Squicciarini
, Federica Paci
:
Monitoring Contract Enforcement within Virtual Organizations. CollaborateCom 2008: 563-577 - [c7]Federica Paci
, David Bauer, Elisa Bertino, Douglas M. Blough, Anna Cinzia Squicciarini
:
Minimal credential disclosure in trust negotiations. Digital Identity Management 2008: 89-96 - [c6]Anna Cinzia Squicciarini
, Federica Paci
, Elisa Bertino:
Trust establishment in the formation of Virtual Organizations. ICDE Workshops 2008: 454-461 - [c5]Federica Paci, Rodolfo Ferrini, Yuqing Sun, Elisa Bertino:
Authorization and User Failure Resiliency for WS-BPEL Business Processes. ICSOC 2008: 116-131 - [c4]Federica Paci
, Elisa Bertino, Sam Kerr, Aaron Lint, Anna Cinzia Squicciarini
, Jungha Woo:
VeryIDX - A Digital Identity Management System for Pervasive Computing Environments. SEUS 2008: 268-279 - 2007
- [j4]Elisa Bertino, Elena Ferrari
, Federica Paci
, Loredana Parasiliti Provenza:
A system for securing push-based distribution of XML documents. Int. J. Inf. Sec. 6(4): 255-284 (2007) - [j3]Anna Cinzia Squicciarini
, Elisa Bertino, Elena Ferrari
, Federica Paci
, Bhavani Thuraisingham:
PP-trust-X: A system for privacy preserving trust negotiations. ACM Trans. Inf. Syst. Secur. 10(3): 12 (2007) - [c3]Jacques Thomas, Federica Paci
, Elisa Bertino, Patrick Eugster:
User Tasks and Access Control overWeb Services. ICWS 2007: 60-69 - 2006
- [j2]Anna Cinzia Squicciarini, Federica Paci
, Elisa Bertino:
A secure framework for publishing virtual community contracts. Int. J. Web Based Communities 2(2): 237-255 (2006) - [j1]Elisa Bertino, Anna Cinzia Squicciarini
, Lorenzo Martino, Federica Paci
:
An Adaptive Access Control Model for Web Services. Int. J. Web Serv. Res. 3(3): 27-60 (2006) - [c2]Elisa Bertino, Jason Crampton, Federica Paci
:
Access Control and Authorization Constraints for WS-BPEL. ICWS 2006: 275-284 - [c1]Massimo Mecella
, Mourad Ouzzani, Federica Paci
, Elisa Bertino:
Access control enforcement for conversation-based web services. WWW 2006: 257-266
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint