List of Publications:
Here is the list of publications, organized by type and displayed in reverse chronological order.
Additional material, dataset, source-code or details may be provided upon request via e-mail.
You may find more information on my Google Scholar citations page
Books
Security Requirements Engineering: Designing Secure Socio-Technical Systems
Fabiano Dalpiaz, Elda Paja, Paolo Giorgini
MIT Press, 2016.
International Journals
Consent verification monitoring
(PDF)
Marco Robol, Travis D Breaux, Elda Paja, Paolo Giorgini
ACM Transactions on Software Engineering and Methodology, 2023.
A Data-Driven, Goal-Oriented Framework for Process-Focused Enterprise Re-engineering
(PDF)
Minh Truong Thi Thai, Lam-Son Lê, Paolo Giorgini and Elda Paja
Information Systems and e-Business Management, 2021, To appear.
Goal-oriented requirements engineering: an extended systematic mapping study
Jennifer Horkoff, Fatma Başak Aydemir, Evellin Cardoso, Tong Li, Alejandro Maté, Elda Paja, Mattia Salnitri, Luca Piras, John Mylopoulos, and Paolo Giorgini
Requirements Engineering Journal, 2017, pages 1-28.
Modelling and Reasoning about Security Requirements in Socio-Technical Systems
Elda Paja, Fabiano Dalpiaz, and Paolo Giorgini
Data and Knowledge Engineering (DKE), 2015, pages 123-143.
Threat Analysis in Goal-Oriented Security Requirements Modelling
Per Håkon Meland, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, and Paolo Giorgini
International Journal of Secure Software Engineering, Volume 5(2), 2014, pages 1–19.
Trust-based Specification of Sociotechnical Systems
Elda Paja, Amit K. Chopra, and Paolo Giorgini
Data and Knowledge Engineering (DKE) Volume 87, September, 2013, pages 339–353.
Formative User-Centered Evaluation of Security Modeling: Results from a Case Study
Sandra Trösterer, Elke Beck, Fabiano Dalpiaz, Elda Paja, Paolo Giorgini, and Manfred Tscheligi
International Journal of Secure Software Engineering, Volume 3 (1), 2012, pages 1–19.
International Conferences
Consent verification under evolving privacy policies
Marco Robol, Travis D Breaux, Elda Paja, and Paolo Giorgini
In Proceedings of the 27th IEEE International Requirements Engineering Conference, RE 2019, pages 422-427, Jelu Island, South Korea.
Modeling and reasoning about privacy-consent requirements
Marco Robol, Elda Paja, Mattia Salnitri, and Paolo Giorgini
In Proceedings of the 11th IFIP WG 8.1 working conference on the Practice of Enterprise Modelling, PoEM 2018, To Appear, Vienna, Austria.
Goal Models for Acceptance Requirements Analysis and Gamification Design
Luca Piras, Elda Paja, Paolo Giorgini, and John Mylopoulos
In Proceedings of the 36th International Conference on Conceptual Modeling, ER 2017, pages 223-230, Valencia, Spain.
Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniques
Luca Piras, Elda Paja, Paolo Giorgini, John Mylopoulos, Roberta Cuel, and Diego Ponte
In Proceedings of the IEEE Eleventh International Conference on Research Challenges in Information Science, RCIS 2017, pages 255-265, Brighton, UK.
Information Security Risk Management
Salimeh Dashti, Paolo Giorgini, and Elda Paja
In Proceedings of the 10th IFIP WG 8.1 working conference on the Practice of Enterprise Modelling, PoEM 2017, pages 18-33, Leuven, Belgium.
Can Goal Reasoning Techniques be used for Strategic Decision-Making?
Elda Paja, Alejandro Maté, Carson Woo, and John Mylopoulos
In Proceedings of the 35th International Conference on Conceptual Modeling, ER 2016, pages 530-543, Gifu, Japan.
Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform
Mohamad Gharib, Mattia Salnitri, Elda Paja, Paolo Giorgini, Haralambos Mouratidis, Michalis Pavlidis, Jose F. Ruizz, Sandra Fernandez, and Andrea Della Siria
In Proceedings of the 24th IEEE International Requirements Engineering Conference, RE 2016, pages 256-265, Beijing, China.
Goal-Oriented Requirements Engineering: A Systematic Literature Map
Jennifer Horkoff, Fatma Basak Aydemir, Evellin Cardoso, Tong Li, Alejandro Mate, Elda Paja, Mattia Salnitri, John Mylopoulos, and Paolo Giorgini
In Proceedings of the 24th IEEE International Requirements Engineering Conference, RE 2016, pages 106-115, Beijing, China.
Security Attack Analysis Using Attack Patterns
Tong Li, Jennifer Horkoff, Elda Paja, Kristian Beckers, and John Mylopoulos
In Proceedings of the IEEE Tenth International Conference on Research Challenges in Information Science, RCIS 2016, pages 1-13, Grenoble, France.
Analyzing Attack Strategies Through Anti-goal Refinement
Tong Li, Jennifer Horkoff, Elda Paja, Kristian Beckers, and John Mylopoulos
In Proceedings of the 8th IFIP WG 8.1 working conference on the Practice of Enterprise Modelling, PoEM 2015, pages 75–90, Valencia, Spain.
Analyzing Attack Strategies Through Anti-goal Refinement
Tong Li, Jennifer Horkoff, Elda Paja, Kristian Beckers, and John Mylopoulos
In Proceedings of the 8th IFIP WG 8.1 working conference on the Practice of Enterprise Modelling, PoEM 2015, pages 75–90, Valencia, Spain.
Managing Security Requirements Conflicts in Socio-Technical Systems
Elda Paja, Fabiano Dalpiaz, and Paolo Giorgini
In Proceedings of the 32nd International Conference on Conceptual Modeling, ER 2013, pages 270–283, Hong Kong.
Socio-Technical Trust: An Architectural Approach
Amit K. Chopra, Elda Paja, and Paolo Giorgini
In Proceedings of the 30th International Conference on Conceptual Modeling, ER 2011, pages 104–117, Brussels, Belgium.
Modeling Design Patterns with Description Logics
Yudistira Asnar, Elda Paja, and John Mylopoulos
In proceedings of the 23rd International Conference on Advanced Information Systems Engineering, CAISE 2011, pages169–183, London, UK.
International Workshops
Maintaining Secure Business Processes in Light of Socio-Technical Systems Evolution
Mattia Salnitri, Elda Paja and Paolo Giorgini
6th International Model-Driven Requirements Engineering (MoDRE'16), pages 155-164, Beijing, China.
The Importance of Teaching Systematic Analysis for Conceptual Models: An Experience Report
Elda Paja, Jennifer Horkoff, and John Mylopoulos
In Proceedings of the 3rd Symposium on Conceptual Modeling Education (SCME'15), pages 270–283, Stockholm, Sweden.
A Holistic Approach to Attack Modeling and Analysis
Tong Li, Jennifer Horkoff, Kristian Beckers, Elda Paja, and John Mylopoulos
8th International i* Workshop (iStar'15), pages 49-54, Ottawa, Canada.
The Importance of Teaching Goal-Oriented Analysis Techniques: an Experience Report
Elda Paja, Jennifer Horkoff, and John Mylopoulos
1st International i* Teaching Workshop (iStarT'15), pages 37–42, Stockholm, Sweden.
Preserving Compliance with Security Requirements in Socio-Technical Systems
Mattia Salnitri, Elda Paja, and Paolo Giorgini
3rd Cyber Security and Privacy Forum (CSP'14), pages 49–61, Athens, Greece.
Specifying and Reasoning over Socio-Technical Security Requirements with STS-Tool
Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, and Paolo Giorgini
In Proceedings of the 32nd International Conference in Conceptual Modelling - Workshops (ER'13 Workshops), pages 504–507, Hong Kong.
STS-Tool: Specifying and Reasoning over Socio-Technical Security Requirements
Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, and Paolo Giorgini
6th International i* Workshop (iStar'13), pages 131–133, Valencia, Spain.
Designing Secure Socio-Technical Systems with STS-ml
Elda Paja, Fabiano Dalpiaz, and Paolo Giorgini
6th International i* Workshop (iStar'13), pages 79–84, Valencia, Spain.
Modelling Security Requirements in Socio-Technical Systems with STS-Tool
Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, and Paolo Giorgini
In Forum of the 24th International Conference on Advanced Information Systems Engineering (CAiSE'12 Forum), pages 155–162, Gdańsk, Poland.
Security Requirements Engineering for Business Processes
Elda Paja, Paolo Giorgini, Stephane Paul, and Per Hakon Meland
In Proceedings of the 1st International Workshop on Alignment of Business Process and Security Modelling (ABPSM'11), BIR Workshop, pages 77–89, Riga, Latvia.
Security Requirements Engineering for Service-Oriented Applications
Fabiano Dalpiaz, Elda Paja, and Paolo Giorgini
5th International i* Workshop (iStar'11), pages 102–107, Trento, Italy.
Security Requirements Engineering via Commitments
Fabiano Dalpiaz, Elda Paja, and Paolo Giorgini
1st Workshop on Socio-Technical Aspects in Security and Trust (STAST'2011), pages 1–8, Milan, Italy.
Posters & Demonstrations
Holistic Security Requirements Analysis: An Attackers Perspective
Tong Li, Elda Paja, John Mylopoulos, Jennifer Horkoff, and Kristian Beckers
In Proceedings of the 23rd International IEEE Conference on Requirements Engineering, 2015, RE'15 Posters and Demo, pages 282-283, Ottawa, Canada.
STS-Tool 3.0: Maintaining Security in Socio-Technical Systems
Mattia Salnitri, Elda Paja, Mauro Poggianella, and Paolo Giorgini
In Forum of the 27th International Conference on Advanced Information Systems Engineering, (CAiSE'15 Forum), pages 205-212, Stockholm, Sweden.
Security requirements engineering for socio-technical systems with STS- Tool
Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, and Paolo Giorgini
3rd Cyber Security and Privacy Forum, 2014, Athens, Greece.
STS-Tool: Using Commitments to Specify Socio-Technical Security Requirements
Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, and Paolo Giorgini
In Proceedings of the 31st International Conference on Conceptual Modeling – Workshops, (ER'12 Demostrations), pages 396–399, Florence, Italy.
STS-Tool: Socio-Technical Security Requirements through Social Commitments
Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, and Paolo Giorgini
In Proceedings of the 20th International IEEE Conference on Requirements Engineering, (RE'12 Demo and Posters), pages 331–332, Chicago, IL, USA.
Modelling Trust and Security Requirements: the Air Traffic Management Experience
Elda Paja, Fabiano Dalpiaz, Paolo Giorgini, Stéphane Paul, and Per Håkon Meland
In Proceedings of iStar Showcase 2011, London, UK.
Book Chapters
STS-Tool: Security Requirements Engineering for Socio-Technical Systems
Elda Paja, Fabiano Dalpiaz, and Paolo Giorgini
In Advances in Engineering Secure Future Internet Services and Systems, volume 8431 of LNCS, 2014, pages 65–96.
The Socio-technical Security Requirements Modelling Language for Secure Composite Services
Elda Paja, Fabiano Dalpiaz, and Paolo Giorgini
Secure and Trustworthy Service Composition, Lecture Notes in Computer Science, Volume 8900, 2014, pages 63–78.
Security Requirements Engineering with STS-Tool
Elda Paja, Mauro Poggianella, Fabiano Dalpiaz, Pierluigi Roberti, and Paolo Giorgini
In Secure and Trustworthy Service Composition: The Aniketos Approach, 2014, pages 63–78.
Technical Reports
Identifying Conflicts in Security Requirements with STS-ml
(PDF)
Elda Paja, Fabiano Dalpiaz, and Paolo Giorgini
Dipartimento di Ingegneria e Scienza dell’Informazione, University of Trento.