Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Paja, Elda
add a person with the name Paja, Elda
 

Other publications of authors with the same name

STS-Tool: Using Commitments to Specify Socio-Technical Security Requirements., , , , and . ER Workshops, volume 7518 of Lecture Notes in Computer Science, page 396-399. Springer, (2012)Security Requirements Engineering for Service-Oriented Applications., , and . iStar, volume 766 of CEUR Workshop Proceedings, page 102-107. CEUR-WS.org, (2011)Preserving Compliance with Security Requirements in Socio-Technical Systems., , and . CSP Forum, volume 470 of Communications in Computer and Information Science, page 49-61. Springer, (2014)Formative User-Centered Evaluation of Security Modeling: Results from a Case Study., , , , , and . IJSSE, 3 (1): 1-19 (2012)Security Requirements Engineering for Secure Business Processes., , , and . BIR Workshops, volume 106 of Lecture Notes in Business Information Processing, page 77-89. Springer, (2011)Modeling Design Patterns with Description Logics: A Case Study., , and . CAiSE, volume 6741 of Lecture Notes in Computer Science, page 169-183. Springer, (2011)STS-Tool 3.0: Maintaining Security in Socio-Technical Systems., , , and . CAiSE Forum, volume 1367 of CEUR Workshop Proceedings, page 205-212. CEUR-WS.org, (2015)Modelling Security Requirements in Socio-Technical Systems with STS-Tool., , , , and . CAiSE Forum, volume 855 of CEUR Workshop Proceedings, page 155-162. CEUR-WS.org, (2012)Analyzing Attack Strategies Through Anti-goal Refinement., , , , and . PoEM, volume 235 of Lecture Notes in Business Information Processing, page 75-90. Springer, (2015)Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform., , , , , , , , and . RE, page 256-265. IEEE Computer Society, (2016)