List of Publications:

Here is the list of publications, organized by type and displayed in reverse chronological order. Additional material, dataset, source-code or details may be provided upon request by e-mail.

You may find more information on my Google Scholar citations page

Books

Security Requirements Engineering: Designing Secure Socio-Technical Systems

Fabiano Dalpiaz, Elda Paja, Paolo Giorgini
MIT Press, 2016.

International Journals

Goal-oriented requirements engineering: an extended systematic mapping study

Jennifer Horkoff, Fatma Başak Aydemir, Evellin Cardoso, Tong Li, Alejandro Maté, Elda Paja, Mattia Salnitri, Luca Piras, John Mylopoulos, and Paolo Giorgini
Requirements Engineering Journal, 2017, pages 1-28.

Modelling and Reasoning about Security Requirements in Socio-Technical Systems

Elda Paja, Fabiano Dalpiaz, and Paolo Giorgini
Data and Knowledge Engineering (DKE), 2015, pages 123-143.

Threat Analysis in Goal-Oriented Security Requirements Modelling

Per Håkon Meland, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, and Paolo Giorgini
International Journal of Secure Software Engineering, Volume 5(2), 2014, pages 1–19.

Trust-based Specification of Sociotechnical Systems

Elda Paja, Amit K. Chopra, and Paolo Giorgini
Data and Knowledge Engineering (DKE) Volume 87, September, 2013, pages 339–353.

Formative User-Centered Evaluation of Security Modeling: Results from a Case Study

Sandra Trösterer, Elke Beck, Fabiano Dalpiaz, Elda Paja, Paolo Giorgini, and Manfred Tscheligi
International Journal of Secure Software Engineering, Volume 3 (1), 2012, pages 1–19.

International Conferences

Modeling and reasoning about privacy-consent requirements

Marco Robol, Elda Paja, Mattia Salnitri, and Paolo Giorgini
In Proceedings of the 11th IFIP WG 8.1 working conference on the Practice of Enterprise Modelling, PoEM 2018, To Appear, Vienna, Austria.

Goal Models for Acceptance Requirements Analysis and Gamification Design

Luca Piras, Elda Paja, Paolo Giorgini, and John Mylopoulos
In Proceedings of the 36th International Conference on Conceptual Modeling, ER 2017, pages 223-230, Valencia, Spain.

Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniques

Luca Piras, Elda Paja, Paolo Giorgini, John Mylopoulos, Roberta Cuel, and Diego Ponte
In Proceedings of the IEEE Eleventh International Conference on Research Challenges in Information Science, RCIS 2017, pages 255-265, Brighton, UK.

Information Security Risk Management

Salimeh Dashti, Paolo Giorgini, and Elda Paja
In Proceedings of the 10th IFIP WG 8.1 working conference on the Practice of Enterprise Modelling, PoEM 2017, pages 18-33, Leuven, Belgium.

Can Goal Reasoning Techniques be used for Strategic Decision-Making?

Elda Paja, Alejandro Maté, Carson Woo, and John Mylopoulos
In Proceedings of the 35th International Conference on Conceptual Modeling, ER 2016, pages 530-543, Gifu, Japan.

Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform

Mohamad Gharib, Mattia Salnitri, Elda Paja, Paolo Giorgini, Haralambos Mouratidis, Michalis Pavlidis, Jose F. Ruizz, Sandra Fernandez, and Andrea Della Siria
In Proceedings of the 24th IEEE International Requirements Engineering Conference, RE 2016, pages 256-265, Beijing, China.

Goal-Oriented Requirements Engineering: A Systematic Literature Map

Jennifer Horkoff, Fatma Basak Aydemir, Evellin Cardoso, Tong Li, Alejandro Mate, Elda Paja, Mattia Salnitri, John Mylopoulos, and Paolo Giorgini
In Proceedings of the 24th IEEE International Requirements Engineering Conference, RE 2016, pages 106-115, Beijing, China.

Security Attack Analysis Using Attack Patterns

Tong Li, Jennifer Horkoff, Elda Paja, Kristian Beckers, and John Mylopoulos
In Proceedings of the IEEE Tenth International Conference on Research Challenges in Information Science, RCIS 2016, pages 1-13, Grenoble, France.

Analyzing Attack Strategies Through Anti-goal Refinement

Tong Li, Jennifer Horkoff, Elda Paja, Kristian Beckers, and John Mylopoulos
In Proceedings of the 8th IFIP WG 8.1 working conference on the Practice of Enterprise Modelling, PoEM 2015, pages 75–90, Valencia, Spain.

Analyzing Attack Strategies Through Anti-goal Refinement

Tong Li, Jennifer Horkoff, Elda Paja, Kristian Beckers, and John Mylopoulos
In Proceedings of the 8th IFIP WG 8.1 working conference on the Practice of Enterprise Modelling, PoEM 2015, pages 75–90, Valencia, Spain.

Managing Security Requirements Conflicts in Socio-Technical Systems

Elda Paja, Fabiano Dalpiaz, and Paolo Giorgini
In Proceedings of the 32nd International Conference on Conceptual Modeling, ER 2013, pages 270–283, Hong Kong.

Socio-Technical Trust: An Architectural Approach

Amit K. Chopra, Elda Paja, and Paolo Giorgini
In Proceedings of the 30th International Conference on Conceptual Modeling, ER 2011, pages 104–117, Brussels, Belgium.

Modeling Design Patterns with Description Logics

Yudistira Asnar, Elda Paja, and John Mylopoulos
In proceedings of the 23rd International Conference on Advanced Information Systems Engineering, CAISE 2011, pages169–183, London, UK.

International Workshops

Maintaining Secure Business Processes in Light of Socio-Technical Systems Evolution

Mattia Salnitri, Elda Paja and Paolo Giorgini
6th International Model-Driven Requirements Engineering (MoDRE'16), pages 155-164, Beijing, China.

The Importance of Teaching Systematic Analysis for Conceptual Models: An Experience Report

Elda Paja, Jennifer Horkoff, and John Mylopoulos
In Proceedings of the 3rd Symposium on Conceptual Modeling Education (SCME'15), pages 270–283, Stockholm, Sweden.

A Holistic Approach to Attack Modeling and Analysis

Tong Li, Jennifer Horkoff, Kristian Beckers, Elda Paja, and John Mylopoulos
8th International i* Workshop (iStar'15), pages 49-54, Ottawa, Canada.

The Importance of Teaching Goal-Oriented Analysis Techniques: an Experience Report

Elda Paja, Jennifer Horkoff, and John Mylopoulos
1st International i* Teaching Workshop (iStarT'15), pages 37–42, Stockholm, Sweden.

Preserving Compliance with Security Requirements in Socio-Technical Systems

Mattia Salnitri, Elda Paja, and Paolo Giorgini
3rd Cyber Security and Privacy Forum (CSP'14), pages 49–61, Athens, Greece.

Specifying and Reasoning over Socio-Technical Security Requirements with STS-Tool

Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, and Paolo Giorgini
In Proceedings of the 32nd International Conference in Conceptual Modelling - Workshops (ER'13 Workshops), pages 504–507, Hong Kong.

Designing Secure Socio-Technical Systems with STS-ml

Elda Paja, Fabiano Dalpiaz, and Paolo Giorgini
6th International i* Workshop (iStar'13), pages 79–84, Valencia, Spain.

STS-Tool: Specifying and Reasoning over Socio-Technical Security Requirements

Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, and Paolo Giorgini
6th International i* Workshop (iStar'13), pages 131–133, Valencia, Spain.

Modelling Security Requirements in Socio-Technical Systems with STS-Tool

Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, and Paolo Giorgini
In Forum of the 24th International Conference on Advanced Information Systems Engineering (CAiSE'12 Forum), pages 155–162, Gdańsk, Poland.

Security Requirements Engineering for Business Processes

Elda Paja, Paolo Giorgini, Stephane Paul, and Per Hakon Meland
In Proceedings of the 1st International Workshop on Alignment of Business Process and Security Modelling (ABPSM'11), BIR Workshop, pages 77–89, Riga, Latvia.

Security Requirements Engineering for Service-Oriented Applications

Fabiano Dalpiaz, Elda Paja, and Paolo Giorgini
5th International i* Workshop (iStar'11), pages 102–107, Trento, Italy.

Security Requirements Engineering via Commitments

Fabiano Dalpiaz, Elda Paja, and Paolo Giorgini
1st Workshop on Socio-Technical Aspects in Security and Trust (STAST'2011), pages 1–8, Milan, Italy.

Posters & Demonstrations

Holistic Security Requirements Analysis: An Attackers Perspective

Tong Li, Elda Paja, John Mylopoulos, Jennifer Horkoff, and Kristian Beckers
In Proceedings of the 23rd International IEEE Conference on Requirements Engineering, 2015, RE'15 Posters and Demo, pages 282-283, Ottawa, Canada.

STS-Tool 3.0: Maintaining Security in Socio-Technical Systems

Mattia Salnitri, Elda Paja, Mauro Poggianella, and Paolo Giorgini
In Forum of the 27th International Conference on Advanced Information Systems Engineering, (CAiSE'15 Forum), pages 205-212, Stockholm, Sweden.

Security requirements engineering for socio-technical systems with STS- Tool

Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, and Paolo Giorgini
3rd Cyber Security and Privacy Forum, 2014, Athens, Greece.

STS-Tool: Socio-Technical Security Requirements through Social Commitments

Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, and Paolo Giorgini
In Proceedings of the 20th International IEEE Conference on Requirements Engineering, (RE'12 Demo and Posters), pages 331–332, Chicago, IL, USA.

STS-Tool: Using Commitments to Specify Socio-Technical Security Requirements

Elda Paja, Fabiano Dalpiaz, Mauro Poggianella, Pierluigi Roberti, and Paolo Giorgini
In Proceedings of the 31st International Conference on Conceptual Modeling – Workshops, (ER'12 Demostrations), pages 396–399, Florence, Italy.

Modelling Trust and Security Requirements: the Air Traffic Management Experience

Elda Paja, Fabiano Dalpiaz, Paolo Giorgini, Stéphane Paul, and Per Håkon Meland
In Proceedings of iStar Showcase 2011, London, UK.

Book Chapters

STS-Tool: Security Requirements Engineering for Socio-Technical Systems

Elda Paja, Fabiano Dalpiaz, and Paolo Giorgini
In Advances in Engineering Secure Future Internet Services and Systems, volume 8431 of LNCS, 2014, pages 65–96.

The Socio-technical Security Requirements Modelling Language for Secure Composite Services

Elda Paja, Fabiano Dalpiaz, and Paolo Giorgini
Secure and Trustworthy Service Composition, Lecture Notes in Computer Science, Volume 8900, 2014, pages 63–78.

Security Requirements Engineering with STS-Tool

Elda Paja, Mauro Poggianella, Fabiano Dalpiaz, Pierluigi Roberti, and Paolo Giorgini
In Secure and Trustworthy Service Composition: The Aniketos Approach, 2014, pages 63–78.

Technical Reports

Identifying Conflicts in Security Requirements with STS-ml (PDF)

Elda Paja, Fabiano Dalpiaz, and Paolo Giorgini
Dipartimento di Ingegneria e Scienza dell’Informazione, University of Trento.