Mattia Salnitri
Mattia Salnitri
Postdoctoral Research Fellow at Politecnico di Milano
Verified email at polimi.it - Homepage
TitleCited byYear
Modeling and verifying security policies in business processes
M Salnitri, F Dalpiaz, P Giorgini
Enterprise, Business-Process and Information Systems Modeling, 200-214, 2014
442014
Goal-oriented requirements engineering: a systematic literature map
J Horkoff, FB Aydemir, E Cardoso, T Li, A Maté, E Paja, M Salnitri, ...
2016 IEEE 24th International Requirements Engineering Conference (RE), 106-115, 2016
392016
Goal-oriented requirements engineering: an extended systematic mapping study
J Horkoff, FB Aydemir, E Cardoso, T Li, A Maté, E Paja, M Salnitri, L Piras, ...
Requirements engineering 24 (2), 133-160, 2019
342019
Taking goal models downstream: a systematic roadmap
J Horkoff, T Li, FL Li, M Salnitri, E Cardoso, P Giorgini, J Mylopoulos, ...
2014 IEEE Eighth International Conference on Research Challenges in …, 2014
312014
Designing secure business processes with SecBPMN
M Salnitri, F Dalpiaz, P Giorgini
Software & Systems Modeling 16 (3), 737-757, 2017
212017
Using goal models downstream: a systematic roadmap and literature review
J Horkoff, T Li, FL Li, M Salnitri, E Cardoso, P Giorgini, J Mylopoulos
International Journal of Information System Modeling and Design (IJISMD) 6 …, 2015
202015
Toward GDPR-compliant socio-technical systems: modeling language and reasoning framework
M Robol, M Salnitri, P Giorgini
IFIP Working Conference on The Practice of Enterprise Modeling, 236-250, 2017
102017
Maintaining secure business processes in light of socio-technical systems' evolution
M Salnitri, E Paja, P Giorgini
2016 IEEE 24th International Requirements Engineering Conference Workshops …, 2016
102016
Privacy requirements: findings and lessons learned in developing a privacy platform
M Gharib, M Salnitri, E Paja, P Giorgini, H Mouratidis, M Pavlidis, JF Ruiz, ...
2016 IEEE 24th International Requirements Engineering Conference (RE), 256-265, 2016
92016
From secure business process models to secure artifact-centric specifications
M Salnitri, AD Brucker, P Giorgini
Enterprise, Business-Process and Information Systems Modeling, 246-262, 2015
82015
From socio-technical requirements to technical security design: an sts-based framework
M Salnitri, E Paja, P Giorgini
DISI-University of Trento, 2015
82015
Preserving compliance with security requirements in socio-technical systems
M Salnitri, E Paja, P Giorgini
Cyber Security and Privacy Forum, 49-61, 2014
82014
Transforming Socio-Technical Security Requirements in SecBPMN Security Policies.
M Salnitri, P Giorgini
iStar, 2014
72014
Aligning service-oriented architectures with security requirements
M Salnitri, F Dalpiaz, P Giorgini
OTM Confederated International Conferences" On the Move to Meaningful …, 2012
72012
From secure business process modeling to design-level security verification
Q Ramadan, M Salnitriy, D Strüber, J Jürjens, P Giorgini
2017 ACM/IEEE 20th International Conference on Model Driven Engineering …, 2017
62017
Detecting Conflicts Between Data-Minimization and Security Requirements in Business Process Models
Q Ramadan, D Strüber, M Salnitri, V Riediger, J Jürjens
European Conference on Modelling Foundations and Applications, 179-198, 2018
52018
Modeling and verification of ATM security policies with SecBPMN
M Salnitri, P Giorgini
2014 International Conference on High Performance Computing & Simulation …, 2014
52014
STS-Tool 3.0: Maintaining Security in Socio-Technical Systems.
M Salnitri, E Paja, M Poggianella, P Giorgini
CAiSE Forum, 205-212, 2015
42015
A holistic approach for privacy protection in E-government
K Angelopoulos, V Diamantopoulou, H Mouratidis, M Pavlidis, M Salnitri, ...
Proceedings of the 12th International Conference on Availability …, 2017
32017
From security-by-design to the identification of security-critical deviations in process executions
M Salnitri, M Alizadeh, D Giovanella, N Zannone, P Giorgini
International Conference on Advanced Information Systems Engineering, 218-234, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20