<?xml version="1.0" encoding="UTF-8"?>
<XML><RECORDS>
<RECORD>
	<REFERENCE_TYPE>31</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>G. Manson</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
	</AUTHORS>
	<YEAR>2005</YEAR>
	<TITLE>When Security Meets Software Engineering: A Case of Modeling Secure Information Systems.</TITLE>
	<SECONDARY_TITLE>Information System (2005)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub,</KEYWORD>
		<KEYWORD>pres</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>31</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Perini, A.</AUTHOR>
		<AUTHOR>Susi, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>Understanding the Requirements of a Decision Support System for Agriculture. An Agent-Oriented approach</TITLE>
	<SECONDARY_TITLE>PICO Project</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Asnar, Y.</AUTHOR>
		<AUTHOR>Bryl, V.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2007</YEAR>
	<TITLE>Using Risk Analysis to Evaluate Design Alternatives.</TITLE>
	<SECONDARY_TITLE>Agent-Oriented Software Engineering VII, Post-proceedings (invited paper)</SECONDARY_TITLE>
	<PUBLISHER>Springer</PUBLISHER>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>G. Manson</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
	</AUTHORS>
	<YEAR>2004</YEAR>
	<TITLE>Using Security Attack Scenarios to Analyse Security During Information Systems Design.</TITLE>
	<SECONDARY_TITLE>6th International Conference on Enterprise Information Systems (2004)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Porto, Portugal</PLACE_PUBLISHED>
	<DATE>13/04/2004</DATE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>G. Manson</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
		<AUTHOR>I. Philp</AUTHOR>
	</AUTHORS>
	<YEAR>2002</YEAR>
	<TITLE>Using Tropos Methodology to Model and integrated Health Assessment System.</TITLE>
	<SECONDARY_TITLE>Fourth International Bi-Conference Workshop on Agent-Oriented Information systems (AOIS-02)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Toronto, Canada</PLACE_PUBLISHED>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
		<AUTHOR>Kolp, M.</AUTHOR>
		<AUTHOR>Castro, J.</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>UML for Agent-Oriented Software Development: The Tropos Proposal</TITLE>
	<SECONDARY_TITLE>UML 2001</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
	<ABSTRACT>&lt;p&gt;We describe a software development methodology called Tropos for agent-oriented software systems. The methodology adopts the i&lt;sup&gt;*&lt;/sup&gt; modeling framework, which offers the notions of actor, goal and (actor) dependency, and uses these as a foundation to model early and late requirements, architectural and detailed design. The paper outlines the methodology, and shows how the concepts of Tropos can be accommodated within UML. In addition, we also adopt recent proposals for extensions of UML to support design specifications for agent software. Finally the paper compares Tropos to other research on aeent-oriented software development.&lt;/p&gt;</ABSTRACT>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>J. Castro</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>UML for Agent-Oriented Software Development: the Tropos Proposal.</TITLE>
	<SECONDARY_TITLE>Fourth International Conference on the Unified Modeling Language (2001)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
	<URL>files/UML01.pdf</URL>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Siena, A.</AUTHOR>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
		<AUTHOR>Susi, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>Towards a Framework for Law-Compliant Software Requirements.</TITLE>
	<SECONDARY_TITLE>31st International Conference on Software Engineering (ICSE09)</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Ali, R.</AUTHOR>
		<AUTHOR>Yu, Y.</AUTHOR>
		<AUTHOR>Chitchyan, R.</AUTHOR>
		<AUTHOR>Nhlabatsi, A.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>Towards a Unified Framework for Contextual Variability in Requirements</TITLE>
	<SECONDARY_TITLE>3rd International Workshop on Software Product Management (IWSPM09)</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Morandini, M.</AUTHOR>
		<AUTHOR>Penserini, L.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Towards goal-oriented development of self-adaptive systems</TITLE>
	<SECONDARY_TITLE>Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS`08)</SECONDARY_TITLE>
	<PUBLISHER>ACM</PUBLISHER>
	<PAGES>9--16</PAGES>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Qureshi, N.A.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Towards Seamless Adaptation: An Agent-Oriented Approach</TITLE>
	<SECONDARY_TITLE>2nd IEEE International Conference on Self-Adaptive and Self-Organizing Systems</SECONDARY_TITLE>
	<PUBLISHER>IEEE</PUBLISHER>
	<PAGES>471--472</PAGES>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Morandini, M</AUTHOR>
		<AUTHOR>Nguyen, D.C.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
		<AUTHOR>Siena, A.</AUTHOR>
		<AUTHOR>Susi, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Tool-Supported Development with Tropos: The Conference Management System Case Study</TITLE>
	<SECONDARY_AUTHORS>
		<SECONDARY_AUTHOR>Luck, Michael and Padgham, Lin</SECONDARY_AUTHOR>
	</SECONDARY_AUTHORS>
	<SECONDARY_TITLE>8th International Workshop, AOSE 2007, Honolulu, HI, USA, May 2007</SECONDARY_TITLE>
	<PUBLISHER>Springer</PUBLISHER>
	<VOLUME>4951</VOLUME>
	<PAGES>182--196</PAGES>
	<TERTIARY_TITLE>LNCS</TERTIARY_TITLE>
	<ISBN>978-3-540-79487-5</ISBN>
	<NOTES>8th International Workshop, AOSE 2007, Honolulu, HI, USA, May 2007</NOTES>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Qureshi, N.A.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Towards Seamless Adaptation: An Agent-Oriented Approach</TITLE>
	<SECONDARY_TITLE>SASO '08: Proceedings of the 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Washington, DC, USA</PLACE_PUBLISHED>
	<PUBLISHER>IEEE Computer Society</PUBLISHER>
	<PAGES>471--472</PAGES>
	<ISBN>978-0-7695-3404-6</ISBN>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>A. Perini</AUTHOR>
		<AUTHOR>A. Susi</AUTHOR>
	</AUTHORS>
	<YEAR>2005</YEAR>
	<TITLE>The Tropos Metamodel and its Use.</TITLE>
	<SECONDARY_TITLE>Informatical journal</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Bresciani, P.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
		<AUTHOR>Giunchiglia, F.</AUTHOR>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
	</AUTHORS>
	<YEAR>2004</YEAR>
	<TITLE>Tropos: An Agent-Oriented Software Development Methodology</TITLE>
	<SECONDARY_TITLE>Autonomous Agents and Multi-Agent Systems</SECONDARY_TITLE>
	<PUBLISHER>Springer</PUBLISHER>
	<VOLUME>8</VOLUME>
	<PAGES>203--236</PAGES>
	<KEYWORDS>
		<KEYWORD></KEYWORD>
		<KEYWORD></KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Bresciani</AUTHOR>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>F. Giunchiglia</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>A. Perini</AUTHOR>
	</AUTHORS>
	<YEAR>2004</YEAR>
	<TITLE>TROPOS: An Agent-Oriented Software Development Methodology.</TITLE>
	<SECONDARY_TITLE>Journal of Autonomous Agents and Multi-Agent Systems</SECONDARY_TITLE>
	<PUBLISHER>Kluwer Academic Publishers</PUBLISHER>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>31</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>M. Pistore</AUTHOR>
	</AUTHORS>
	<YEAR>2004</YEAR>
	<TITLE>The Tropos Methodology: an overview.</TITLE>
	<SECONDARY_TITLE>Methodologies And Software Engineering For Agent Systems</SECONDARY_TITLE>
	<PUBLISHER>Kluwer Academic Publishers</PUBLISHER>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>G. Manson</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
	</AUTHORS>
	<YEAR>2004</YEAR>
	<TITLE>Towards the Development of Secure Information Systems: Security Reference Diagrams and Security Attack Scenarios.</TITLE>
	<SECONDARY_TITLE>16th Conference On Advanced Information Systems Engineering (CAiSE*04)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>31</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Ariel Fuxman</AUTHOR>
		<AUTHOR>Raman Kazhamiakin</AUTHOR>
		<AUTHOR>Marco Pistore</AUTHOR>
		<AUTHOR>Marco Roveri</AUTHOR>
	</AUTHORS>
	<YEAR>2003</YEAR>
	<TITLE>Tropos: A Framework for Requirements-Driven Software Development.</TITLE>
	<SECONDARY_TITLE>Trento, 2003</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD></KEYWORD>
		<KEYWORD></KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>J. Castro</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2002</YEAR>
	<TITLE>Towards Requirements-Driven Information Systems Engineering: The Tropos Project.</TITLE>
	<SECONDARY_TITLE>Information Systems (2002)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Bresciani</AUTHOR>
		<AUTHOR>P. Giorgini</AUTHOR>
	</AUTHORS>
	<YEAR>2002</YEAR>
	<TITLE>The TROPOS Analysis Process as Graph Transformation System.</TITLE>
	<SECONDARY_TITLE>Workshop on Agent-oriented methodologies (2002)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Seattle, USA</PLACE_PUBLISHED>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>F. Giunchiglia</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>A. Perini</AUTHOR>
	</AUTHORS>
	<YEAR>2002</YEAR>
	<TITLE>The Tropos Software Development Methodology: Processes, Models and Diagrams.</TITLE>
	<SECONDARY_TITLE>AAMAS Conference (2002)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Bresciani</AUTHOR>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>F. Giunchiglia</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>A. Perini</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>Towards an Agent Oriented approach to Software Engineering.</TITLE>
	<SECONDARY_TITLE>Workshop Dagli oggetti agli agenti: tendenze evolutive dei sistemi software</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>L. Ellrich</AUTHOR>
		<AUTHOR>C. Funken</AUTHOR>
		<AUTHOR>G. Gans</AUTHOR>
		<AUTHOR>M. Jarke</AUTHOR>
		<AUTHOR>S. Kethers</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>Towards (Dis)Trust-Based Simulations of Agent Networks.</TITLE>
	<SECONDARY_TITLE>4th Workshop on Deception, Fraud, and Trust in Agent Societies (2001)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>31</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>J. Castro</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2000</YEAR>
	<TITLE>Towards Agent-Oriented Software Development.</TITLE>
	<SECONDARY_TITLE>Tropos Working Paper</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>J. Castro</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2000</YEAR>
	<TITLE>Tropos: Toward Agent-Oriented Information Systems Engineering.</TITLE>
	<SECONDARY_TITLE>Second International Bi-Conference Workshop on Agent-Oriented Information Systems (AOIS2000)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>31</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>J. Brinkkemper</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>A. Solvberg</AUTHOR>
		<AUTHOR>E. Yu</AUTHOR>
	</AUTHORS>
	<YEAR>2000</YEAR>
	<TITLE>Tropos: A Framework for Requirements-Driven Software Development.</TITLE>
	<SECONDARY_TITLE>Information Systems Engineering: State of the Art and Research Themes</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>E. Paja and F. Dalpiaz and M. Poggianella and P. Roberti and P. Giorgini</AUTHOR>
	</AUTHORS>
	<YEAR>2012</YEAR>
	<TITLE>STS-Tool: Using Commitments to Specify Socio-Technical Security Requirements</TITLE>
	<SECONDARY_TITLE>31st International Conference on Conceptual Modeling</SECONDARY_TITLE>
	<PUBLISHER>Springer</PUBLISHER>
	<VOLUME>7518</VOLUME>
	<PAGES>396--399</PAGES>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>E. Paja and F. Dalpiaz and M. Poggianella and P. Roberti and P. Giorgini</AUTHOR>
	</AUTHORS>
	<YEAR>2012</YEAR>
	<TITLE>STS-Tool: Socio-Technical Security Requirements through Social Commitments</TITLE>
	<SECONDARY_TITLE>Proceedings of the 20th International IEEE Conference on Requirements Engineering (RE'12)</SECONDARY_TITLE>
	<PUBLISHER>IEEE</PUBLISHER>
	<PAGES>331--332</PAGES>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>F. Dalpiaz and E. Paja and P. Giorgini</AUTHOR>
	</AUTHORS>
	<YEAR>2011</YEAR>
	<TITLE>Security Requirements Engineering for Service-Oriented Applications</TITLE>
	<SECONDARY_TITLE>Proceedings of the Fifth International i* Workshop (istar'11)</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>F. Dalpiaz and E. Paja and P. Giorgini</AUTHOR>
	</AUTHORS>
	<YEAR>2011</YEAR>
	<TITLE>Security Requirements Engineering via Commitments</TITLE>
	<SECONDARY_TITLE>Proceedings of the First Workshop on Socio-Technical Aspects in Security and Trust (STAST'11)</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>Software Self-Reconfiguration: a BDI-based approach (Extended Abstract).</TITLE>
	<SECONDARY_TITLE>8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009)</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Asnar, Y.</AUTHOR>
		<AUTHOR>Bonato, R.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
		<AUTHOR>Massacci, F.</AUTHOR>
		<AUTHOR>Meduri, V.</AUTHOR>
		<AUTHOR>Riccucci, C.</AUTHOR>
		<AUTHOR>Saydane, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2007</YEAR>
	<TITLE>Secure and Dependable Patterns in Organizations: An Empirical Approach.</TITLE>
	<SECONDARY_TITLE>15th IEEE International Requirements Engineering Conference (RE '07)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>New Delhi, India</PLACE_PUBLISHED>
	<DATE>15/10/2007</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Bryl, V.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2006</YEAR>
	<TITLE>Self-Configuring Socio-Technical Systems: Redesign at Runtime.</TITLE>
	<SECONDARY_TITLE>International Transactions on Systems Science and Applications</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>31</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>F. Massacci</AUTHOR>
		<AUTHOR>N. Zannone</AUTHOR>
	</AUTHORS>
	<YEAR>2005</YEAR>
	<TITLE>Security and Trust Requirements Engineering.</TITLE>
	<SECONDARY_TITLE>Foundations of Security Analysis and Design III</SECONDARY_TITLE>
	<PUBLISHER>Springer-Verlag</PUBLISHER>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
		<AUTHOR>M. Weiss</AUTHOR>
	</AUTHORS>
	<YEAR>2005</YEAR>
	<TITLE>Security patterns meet agent oriented software engineering: a complementary solution for developing security information systems.</TITLE>
	<SECONDARY_TITLE>24th International Conference on Conceptual Modelling (ER'05)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Klangenfurt, Austria</PLACE_PUBLISHED>
	<DATE>24/10/2005</DATE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
	</AUTHORS>
	<YEAR>2005</YEAR>
	<TITLE>Secure Tropos: A Security-Oriented Extension of the Tropos Methodology.</TITLE>
	<SECONDARY_TITLE>Journal of Autonomous Agents and Mult-Agent Systems</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>31</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>F. Massacci</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>A. Siena</AUTHOR>
		<AUTHOR>N. Zannone</AUTHOR>
	</AUTHORS>
	<YEAR>2005</YEAR>
	<TITLE>ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements</TITLE>
	<SECONDARY_TITLE>Third International Conference on Trust Management (iTrust 2005)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Ariel Fuxman</AUTHOR>
		<AUTHOR>Lin Liu</AUTHOR>
		<AUTHOR>John Mylopoulos</AUTHOR>
		<AUTHOR>Marco Pistore</AUTHOR>
		<AUTHOR>Marco Roveri</AUTHOR>
		<AUTHOR>Paolo Traverso</AUTHOR>
	</AUTHORS>
	<YEAR>2004</YEAR>
	<TITLE>Specifying and analyzing early requirements in Tropos</TITLE>
	<SECONDARY_TITLE>Requirements Engineering Journal</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>R. Sebastiani</AUTHOR>
	</AUTHORS>
	<YEAR>2004</YEAR>
	<TITLE>Simple and Minimum-Cost Satisfiability for Goal Models.</TITLE>
	<SECONDARY_TITLE>16th Conference On Advanced Information Systems Engineering (CAiSE*04)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Ariel Fuxman</AUTHOR>
		<AUTHOR>Lin Liu</AUTHOR>
		<AUTHOR>John Mylopoulos</AUTHOR>
		<AUTHOR>Marco Pistore</AUTHOR>
		<AUTHOR>Marco Roveri</AUTHOR>
	</AUTHORS>
	<YEAR>2003</YEAR>
	<TITLE>Specifying and Analyzing Early Requirements: Some Experimental Results.</TITLE>
	<SECONDARY_TITLE>RE-2003, the 11th IEEE International Requirements Engineering Conference</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Monterey Bay, California U.S.A.</PLACE_PUBLISHED>
	<DATE>08/09/2003</DATE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
		<AUTHOR>M. Schumacher</AUTHOR>
	</AUTHORS>
	<YEAR>2003</YEAR>
	<TITLE>Security Patterns for Agent Systems.</TITLE>
	<SECONDARY_TITLE>Eighth European Conference on Pattern Languages of Programs (2003)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2002</YEAR>
	<TITLE>Socio-Intentional Architectures for Multi-agent Systems: the Mobile Robot Control case.</TITLE>
	<SECONDARY_TITLE>Fourth International Bi-Conference Workshop on Agent-Oriented Information systems (AOIS-02)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>Software Architectures as Organizational Structures.</TITLE>
	<SECONDARY_TITLE>ASERC Workshop on &quot;The Role of Software Architectures in the Construction, Evolution, and Reuse of Software Systems&quot;</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Edmonton, Canada</PLACE_PUBLISHED>
	<DATE>24/08/2001</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Chopra, A.</AUTHOR>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
	</AUTHORS>
	<YEAR>2010</YEAR>
	<TITLE>Reasoning about Agents and Protocols via Goals and Commitments</TITLE>
	<SECONDARY_TITLE>Autonomous Agents and Multi-Agent Systems</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Asnar, Y.</AUTHOR>
		<AUTHOR>Moretti, R.</AUTHOR>
		<AUTHOR>Sebastianis M.</AUTHOR>
		<AUTHOR>Zannone, N.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach.</TITLE>
	<SECONDARY_TITLE>3rd International Workshop on Dependability Aspects on Data WArehousing and Mining applications (DAWAM 2008)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Barcelona, Spain</PLACE_PUBLISHED>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Morandini, M.</AUTHOR>
		<AUTHOR>Penserini, L.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
		<AUTHOR>Susi, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Refining Goal Models by Evaluating System Behaviour</TITLE>
	<SECONDARY_AUTHORS>
		<SECONDARY_AUTHOR>Luck, Michael and Padgham, Lin</SECONDARY_AUTHOR>
	</SECONDARY_AUTHORS>
	<SECONDARY_TITLE>8th International Workshop on Agent Oriented Software Engineering (AOSE '07)</SECONDARY_TITLE>
	<PUBLISHER>Springer</PUBLISHER>
	<VOLUME>4951</VOLUME>
	<PAGES>44--57</PAGES>
	<TERTIARY_TITLE>LNCS</TERTIARY_TITLE>
	<NOTES>8th International Workshop, AOSE 2007, Honolulu, HI, USA, May 2007</NOTES>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Asnar, Y.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
		<AUTHOR>Zannone, N.</AUTHOR>
	</AUTHORS>
	<YEAR>2007</YEAR>
	<TITLE>Reasoning about Risk in Agents Deliberation Process: a Jadex Implementation.</TITLE>
	<SECONDARY_TITLE>8th International Workshop on Agent Oriented Software Engineering (AOSE '07)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Honolulu, Hawai'i</PLACE_PUBLISHED>
	<DATE>14/05/2007</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>F. Massacci</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>N. Zannone</AUTHOR>
	</AUTHORS>
	<YEAR>2004</YEAR>
	<TITLE>Requirements Engineering meets Trust Management: Model, Methodology, and Reasoning.</TITLE>
	<SECONDARY_TITLE>Second International Conference on Trust Management (iTrust 2004)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Giorgini, P.</AUTHOR>
		<AUTHOR>Massacci, F.</AUTHOR>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
	</AUTHORS>
	<YEAR>2003</YEAR>
	<TITLE>Requirement Engineering meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard</TITLE>
	<SECONDARY_TITLE>22nd International Conference on Conceptual Modeling (ER 2003)</SECONDARY_TITLE>
	<PUBLISHER>Springer</PUBLISHER>
	<VOLUME>2813</VOLUME>
	<PAGES>263</PAGES>
	<KEYWORDS>
		<KEYWORD></KEYWORD>
		<KEYWORD></KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Bresciani</AUTHOR>
		<AUTHOR>F. SannicolÃ²</AUTHOR>
	</AUTHORS>
	<YEAR>2003</YEAR>
	<TITLE>Requirement analysis in TROPOS: a self referencing example.</TITLE>
	<SECONDARY_TITLE>Agent Technologies, Infrastructures, Tools, and Applications for e-Services (2003)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>E. Nicchiarelli</AUTHOR>
		<AUTHOR>R. Sebastiani</AUTHOR>
	</AUTHORS>
	<YEAR>2002</YEAR>
	<TITLE>Reasoning with Goal Models.</TITLE>
	<SECONDARY_TITLE>21st International Conference on conceptual Modeling (ER2002)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Tampere, Finland</PLACE_PUBLISHED>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Morandini, M.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
		<AUTHOR>Penserini, L.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>Operational Semantics of Goal Models in Adaptive Agents</TITLE>
	<SECONDARY_TITLE>8th International Conference on Autonomous Agents and Multiagent Systems</SECONDARY_TITLE>
	<PUBLISHER>IFAAMAS</PUBLISHER>
	<PAGES>129--136</PAGES>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Morandini, M.</AUTHOR>
		<AUTHOR>Penserini, L.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>Operational semantics of goal models in adaptive agents</TITLE>
	<SECONDARY_TITLE>Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2003</YEAR>
	<TITLE>Organizational Patterns for Early Requirements Analysis.</TITLE>
	<SECONDARY_TITLE>15th Conference On Advanced Information Systems Engineering (CAiSE*03)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>G. Manson</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
	</AUTHORS>
	<YEAR>2003</YEAR>
	<TITLE>On Security Requirements Analysis for Multi-Agent Systems.</TITLE>
	<SECONDARY_TITLE>2nd International Workshop on Software Engineering for Large-Scale Multi-Agent Systems SELMAS 2003 in conjunction with the 25th International Conference on Software Engineering (ICSE 2003)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Portland, Oregon, USA</PLACE_PUBLISHED>
	<DATE>03/05/2003</DATE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>E. Paja and F. Dalpiaz and M. Poggianella and P. Roberti and P. Giorgini</AUTHOR>
	</AUTHORS>
	<YEAR>2012</YEAR>
	<TITLE>Modelling Security Requirements in Socio-Technical Systems with STS-Tool</TITLE>
	<SECONDARY_TITLE>Forum of the Conference on Advanced Information Systems Engineering</SECONDARY_TITLE>
	<VOLUME>855</VOLUME>
	<PAGES>155--162</PAGES>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Asnar, Y.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2010</YEAR>
	<TITLE>Multi-Dimensional Uncertainty Analysis in Secure and Dependable Domain</TITLE>
	<SECONDARY_TITLE>Fifth International Conference on Availability, Reliability and Security (AReS 2010)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Krakow, Poland</PLACE_PUBLISHED>
	<PUBLISHER>IEEE Press</PUBLISHER>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>31</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Chopra, A.</AUTHOR>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments</TITLE>
	<SECONDARY_TITLE>DISI Technical Report 09-068</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Ali, R.</AUTHOR>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>Modeling and Analyzing Location-based Requirements: Goal-oriented Approach</TITLE>
	<SECONDARY_TITLE>International Journal of Computer Science and Software Technology (IJCSST)</SECONDARY_TITLE>
	<VOLUME>2</VOLUME>
	<NUMBER>2</NUMBER>
	<PAGES>7</PAGES>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>V. E. Silva Souza</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>Monitoring and Diagnosing Malicious Attacks with Autonomic Software</TITLE>
	<SECONDARY_AUTHORS>
		<SECONDARY_AUTHOR>Alberto Laender</SECONDARY_AUTHOR>
		<SECONDARY_AUTHOR>Silvana Castano</SECONDARY_AUTHOR>
		<SECONDARY_AUTHOR>Umeshwar Dayal</SECONDARY_AUTHOR>
		<SECONDARY_AUTHOR>Fabio Casati</SECONDARY_AUTHOR>
		<SECONDARY_AUTHOR>José de Oliveira</SECONDARY_AUTHOR>
	</SECONDARY_AUTHORS>
	<SECONDARY_TITLE>28th International Conference on Conceptual Modeling (ER 2009)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Gramado, RS, Brazil</PLACE_PUBLISHED>
	<PUBLISHER>Springer</PUBLISHER>
	<VOLUME>5829/2009</VOLUME>
	<PAGES>84-98</PAGES>
	<TERTIARY_TITLE>LNCS</TERTIARY_TITLE>
	<DATE>09/11/2009</DATE>
	<ABSTRACT>&lt;p&gt;Monitoring and diagnosing (M&amp;amp;amp;D) software based on requirement models is a problem that has recently received a lot of attention in field of Requirement Engineering. In this context, Wang et al. [1] propose a M&amp;amp;amp;D framework that uses goal models to diagnose failures in software at different levels of granularity. In this paper we extend Wang&amp;rsquo;s framework to monitor and diagnose malicious attacks. Our extensions include the addition of anti-goals to model attacker intentions, as well as context-based modeling of the domain within which our system operates. The extended framework has been implemented and evaluated through a series of experiments intended to test its scalability.&lt;/p&gt;</ABSTRACT>
	<URL>http://www.springerlink.com/content/t0346q5900210112/</URL>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Ali, R.</AUTHOR>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Modeling and Analyzing Variability for Mobile Information Systems.</TITLE>
	<SECONDARY_TITLE>International Conference on Computational Science and Its Applications (ICCSA 2008)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Perugia, Italy</PLACE_PUBLISHED>
	<PUBLISHER>Springer</PUBLISHER>
	<DATE>30/06/2008</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Morandini, M.</AUTHOR>
		<AUTHOR>Penserini, L.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Modelling Self-Adaptivity: A Goal-Oriented Approach</TITLE>
	<SECONDARY_TITLE>2nd IEEE International Conference on Self-Adaptive and Self-Organizing Systems</SECONDARY_TITLE>
	<PUBLISHER>IEEE</PUBLISHER>
	<NOTES>short paper</NOTES>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Asnar, Y.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2006</YEAR>
	<TITLE>Modelling Risk and Identifying Countermeasure in Organizations.</TITLE>
	<SECONDARY_TITLE>1st International Workshop on Critical Information Infrastructures Security (CRITIS '06)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Samos Island, Greece</PLACE_PUBLISHED>
	<DATE>30/08/2006</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>F. Massacci</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>N. Zannone</AUTHOR>
	</AUTHORS>
	<YEAR>2005</YEAR>
	<TITLE>Modeling Security Requirements Through Ownership, Permission and Delegation.</TITLE>
	<SECONDARY_TITLE>13th IEEE International Requirements Engineering Conference (RE'05)</SECONDARY_TITLE>
	<DATE>29/08/2005</DATE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
		<AUTHOR>M. Weiss</AUTHOR>
	</AUTHORS>
	<YEAR>2005</YEAR>
	<TITLE>Modeling Secure Systems Using An Agent-Oriented Approach and Security Patterns.</TITLE>
	<SECONDARY_TITLE>International Journal of Software Engineering and Knowledge Engineering (IJSEKE)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>F. Massacci</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>N. Zannone</AUTHOR>
	</AUTHORS>
	<YEAR>2005</YEAR>
	<TITLE>Modeling Social and Individual Trust in Requirements Engineering Methodologies.</TITLE>
	<SECONDARY_TITLE>Third International Conference on Trust Management (iTrust 2005)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>31</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Bresciani</AUTHOR>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>G. Manson</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
	</AUTHORS>
	<YEAR>2004</YEAR>
	<TITLE>Multi-Agent Systems and Security Requirements Analysis.</TITLE>
	<SECONDARY_TITLE>Software Engineering for Multi-Agent Systems II</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>G. Manson</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
	</AUTHORS>
	<YEAR>2003</YEAR>
	<TITLE>Modelling Secure Multiagent Systems.</TITLE>
	<SECONDARY_TITLE>2nd International Joint Conference on Autonomous Agents and Multiagent Systems (2003)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2002</YEAR>
	<TITLE>Multi-Agent and Software Architecture: A Comparative Case Study.</TITLE>
	<SECONDARY_TITLE>1st International Conference on Autonomous Agent and Multi Agent Systems (AAMAS'02)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Bologna, Italy</PLACE_PUBLISHED>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2002</YEAR>
	<TITLE>Multi-Agent Architectures as Organizational Structures.</TITLE>
	<SECONDARY_TITLE>Internation Journal of Cooperative Information Systems</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>G. Manson</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
		<AUTHOR>I. Philp</AUTHOR>
	</AUTHORS>
	<YEAR>2002</YEAR>
	<TITLE>Modelling an agent-based integrated health and social care information system for older people.</TITLE>
	<SECONDARY_TITLE>International Workshop on Agents Applied in Health Care (2002)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Lyon, France</PLACE_PUBLISHED>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Ariel Fuxman</AUTHOR>
		<AUTHOR>John Mylopoulos</AUTHOR>
		<AUTHOR>Marco Pistore</AUTHOR>
		<AUTHOR>Paolo Traverso</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>Model Checking Early Requirements Specifications in Tropos.</TITLE>
	<SECONDARY_TITLE>RE-2001, the 9th IEEE International Requirements Engineering Conference.</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Toronto, Canada</PLACE_PUBLISHED>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Paolo Bresciani</AUTHOR>
		<AUTHOR>Paolo Giorgini</AUTHOR>
		<AUTHOR>Fausto Giunchiglia</AUTHOR>
		<AUTHOR>John Mylopoulos</AUTHOR>
		<AUTHOR>Anna Perini</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>Modeling early requirements in Tropos: a transformation based approach.</TITLE>
	<SECONDARY_TITLE>Second International Workshop on Agent-Oriented Software Engineering (AOSE-2001)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>G. Gans</AUTHOR>
		<AUTHOR>M. Jarke</AUTHOR>
		<AUTHOR>S. Kethers</AUTHOR>
		<AUTHOR>G. Lakemeyer</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>Modeling the Impact of Trust and Distrust in Agent Networks.</TITLE>
	<SECONDARY_TITLE>3rd Workshop on Agent-Oriented Information Systems (AOIS-2001)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Ali, R.</AUTHOR>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Location-based Software Modeling and Analysis: Tropos-based Approach.</TITLE>
	<SECONDARY_TITLE>27th International Conference on Conceptual Modeling (ER 08)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Barcelona, Spain</PLACE_PUBLISHED>
	<PUBLISHER>Springer</PUBLISHER>
	<DATE>20/10/2008</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Ali, R.</AUTHOR>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Location-based Variability for Mobile Information Systems.</TITLE>
	<SECONDARY_TITLE>20th International Conference on Advanced Information Systems Engineering (CAiSE 08)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Montpellier, France</PLACE_PUBLISHED>
	<PUBLISHER>Springer</PUBLISHER>
	<DATE>16/06/2008</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>F. Giunchiglia</AUTHOR>
		<AUTHOR>A. Perini</AUTHOR>
		<AUTHOR>F. SannicolÃ²</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>Knowledge level software engineering.</TITLE>
	<SECONDARY_TITLE>Atal conference (2001)</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>G. Manson</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
	</AUTHORS>
	<YEAR>2003</YEAR>
	<TITLE>Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems.</TITLE>
	<SECONDARY_TITLE>15th Conference On Advanced Information Systems Engineering (CAiSE*03)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Austria</PLACE_PUBLISHED>
	<DATE>16/06/2003</DATE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
		<AUTHOR>M. Weiss</AUTHOR>
	</AUTHORS>
	<YEAR>2003</YEAR>
	<TITLE>Integrating Patterns and Agent-Oriented Methodologies to Provide Better Solutions for the Development of Secure Agent Systems.</TITLE>
	<SECONDARY_TITLE>Workshop on Expressiveness of Pattern Languages 2003, at ChiliPLoP (2003)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Carefree, Arizona</PLACE_PUBLISHED>
	<DATE>11/03/2003</DATE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
	</AUTHORS>
	<YEAR>2002</YEAR>
	<TITLE>Information Systems Development through Social Structures.</TITLE>
	<SECONDARY_TITLE>14th International Conference on Advanced Information Systems Engineering (CAiSE'02)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Toronto, Canada</PLACE_PUBLISHED>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2002</YEAR>
	<TITLE>Information Systems Development trhough Social Structures.</TITLE>
	<SECONDARY_TITLE>Fourteenth International Conference on Software Engineering and Knowledge Engineering (SEKE2002)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>A. Fuxman</AUTHOR>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>Information Systems as Social Structures.</TITLE>
	<SECONDARY_TITLE>Second International Conference on Formal Ontologies for Information Systems (FOIS-2001)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Ogunquit, USA</PLACE_PUBLISHED>
	<DATE>17/10/2001</DATE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Penserini, L.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
		<AUTHOR>Susi, A.</AUTHOR>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
	</AUTHORS>
	<YEAR>2007</YEAR>
	<TITLE>High variability design for software agents: Extending Tropos</TITLE>
	<SECONDARY_TITLE>ACM Transactions on Autonomous and Adaptive Systems (TAAS)</SECONDARY_TITLE>
	<VOLUME>2</VOLUME>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Nguyen, C.D.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
		<AUTHOR>Tonella, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2010</YEAR>
	<TITLE>Goal-oriented testing for MASs</TITLE>
	<SECONDARY_TITLE>Int. J. Agent-Oriented Software Engineering</SECONDARY_TITLE>
	<VOLUME>4</VOLUME>
	<PAGES>79--109</PAGES>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Ali, R.</AUTHOR>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>Goal-based Self-Contextualization.</TITLE>
	<SECONDARY_TITLE>Forum of the 21st International Conference on Advanced Information Systems (CAiSE 09 - Forum)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Amsterdam, The Netherlands</PLACE_PUBLISHED>
	<DATE>08/06/2009</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Giorgini, P.</AUTHOR>
		<AUTHOR>Rizzi, S.</AUTHOR>
		<AUTHOR>Garzetti, M.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>GRAnD: A Goal-Oriented Approach to Requirement Analysis in Data Warehouses</TITLE>
	<SECONDARY_TITLE>Decision Support Systems</SECONDARY_TITLE>
	<PUBLISHER>Elsevier</PUBLISHER>
	<VOLUME>45</VOLUME>
	<NUMBER>1</NUMBER>
	<PAGES>18</PAGES>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>M. Garzetti</AUTHOR>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>S. Rizzi</AUTHOR>
	</AUTHORS>
	<YEAR>2005</YEAR>
	<TITLE>Goal-oriented requirement analysis for data warehouse design.</TITLE>
	<SECONDARY_TITLE>8th International Workshop on Data Warehouseing and OLAP (DOLAP 2005)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>31</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>R. Sebastiani</AUTHOR>
	</AUTHORS>
	<YEAR>2005</YEAR>
	<TITLE>Goal-Oriented Requirements Analysis and Reasoning in the Tropos Methodology.</TITLE>
	<SECONDARY_TITLE>Engineering Applications of Artifcial Intelligence</SECONDARY_TITLE>
	<VOLUME>18/2</VOLUME>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>S. Troesterer and E. Beck and F. Dalpiaz and E. Paja and P. Giorgini and M. Tscheligi</AUTHOR>
	</AUTHORS>
	<YEAR>2012</YEAR>
	<TITLE>Formative User-Centered Evaluation of Security Modeling: Results from a Case Study</TITLE>
	<SECONDARY_TITLE>International Journal of Secure Software Engineering</SECONDARY_TITLE>
	<VOLUME>3</VOLUME>
	<PAGES>1--19</PAGES>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Siena, A.</AUTHOR>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
		<AUTHOR>Susi, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>From Laws to Requirements.</TITLE>
	<SECONDARY_TITLE>1st International Workshop on Requirements Engineering and Law (Relaw'08)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Barcelona, Spain</PLACE_PUBLISHED>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Asnar, Y.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
		<AUTHOR>Massacci, F.</AUTHOR>
		<AUTHOR>Zannone, N.</AUTHOR>
	</AUTHORS>
	<YEAR>2007</YEAR>
	<TITLE>From Trust to Dependability through Risk Analysis.</TITLE>
	<SECONDARY_TITLE>Second International Conference on Availability, Reliability and Security (AReS 2007)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Vienna, Austria</PLACE_PUBLISHED>
	<DATE>10/04/2007</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>E. Nicchiarelli</AUTHOR>
		<AUTHOR>R. Sebastiani</AUTHOR>
	</AUTHORS>
	<YEAR>2004</YEAR>
	<TITLE>Formal Reasoning Techniques for Goal Models.</TITLE>
	<SECONDARY_TITLE>Journal of Data Semantics</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>F. Massacci</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>N. Zannone</AUTHOR>
	</AUTHORS>
	<YEAR>2004</YEAR>
	<TITLE>Filling the gap between Requirements Engineering and Public Key/Trust Management Infrastructures.</TITLE>
	<SECONDARY_TITLE>1st European PKI Workshop: Research and Applications (1st EuroPKI)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Lin Liu</AUTHOR>
		<AUTHOR>Eric Yu</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>From Requirements to Architectural Design: Using Goals and Scenarios.</TITLE>
	<SECONDARY_TITLE>First International Workshop From Software Requirements to Architectures (STRAW 01)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Toronto, Canada</PLACE_PUBLISHED>
	<DATE>14/05/2001</DATE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>F. Alencar</AUTHOR>
		<AUTHOR>J. Castro</AUTHOR>
		<AUTHOR>G. Cysneiros</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2000</YEAR>
	<TITLE>From Early Requirements Modeled by the i* Technique to Later Requirements Modeled in Precise UML.</TITLE>
	<SECONDARY_TITLE>Anais do III Workshop em Engenharia de Requisitos (2000)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Rio de Janeiro, Brazil</PLACE_PUBLISHED>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>A. Fuxman</AUTHOR>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2000</YEAR>
	<TITLE>From Entities and Relationships to Social Actors and Dependencies.</TITLE>
	<SECONDARY_TITLE>19th International Conference on Conceptual Modeling (ER2000)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Salt Lake City, USA</PLACE_PUBLISHED>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Bryl, V.</AUTHOR>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Ferrario, R.</AUTHOR>
		<AUTHOR>Mattioli, A.</AUTHOR>
		<AUTHOR>Villafiorita, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>Evaluating Procedural Alternatives: a Case Study in e-Voting.</TITLE>
	<SECONDARY_TITLE>Electronic Government, an International Journal</SECONDARY_TITLE>
	<VOLUME>6</VOLUME>
	<NUMBER>2</NUMBER>
	<PAGES>19</PAGES>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Qureshi, N.A.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>Engineering adaptive requirements</TITLE>
	<SECONDARY_TITLE>International Workshop on Software Engineering for Adaptive and Self-Managing Systems</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Los Alamitos, CA, USA</PLACE_PUBLISHED>
	<PUBLISHER>IEEE Computer Society</PUBLISHER>
	<PAGES>126-131</PAGES>
	<ISBN>978-1-4244-3724-5</ISBN>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Siena, A.</AUTHOR>
		<AUTHOR>Maiden, N.</AUTHOR>
		<AUTHOR>Lockerbie, J.</AUTHOR>
		<AUTHOR>Karlsen, K.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
		<AUTHOR>Susi, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Exploring the Effectiveness of Normative i* Modelling: Results from a Case Study on Food Chain Traceability.</TITLE>
	<SECONDARY_TITLE>20th International Conference on Advanced Information Systems Engineering (CAiSE'08)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Montpellier, France</PLACE_PUBLISHED>
	<DATE>16/06/2008</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Asnar, Y.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
		<AUTHOR>Ciancarini, P.</AUTHOR>
		<AUTHOR>Moretti, R.</AUTHOR>
		<AUTHOR></AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Evaluation of Business Solutions in Manufacturing Enterprises.</TITLE>
	<SECONDARY_TITLE>International Journal on Business Intelligence and Data Mining</SECONDARY_TITLE>
	<PUBLISHER>Inderscience</PUBLISHER>
	<VOLUME>3</VOLUME>
	<NUMBER>3</NUMBER>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>A. Siena</AUTHOR>
	</AUTHORS>
	<YEAR>2007</YEAR>
	<TITLE>Engineering Normative Requirements.</TITLE>
	<SECONDARY_TITLE>1st International Conference on Research Challenges in Information Science (RCIS'07)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Bryl, V.</AUTHOR>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Ferrario, R.</AUTHOR>
		<AUTHOR>Mattioli, A.</AUTHOR>
		<AUTHOR>Villafiorita, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2007</YEAR>
	<TITLE>Evaluating Procedural Alternatives. A Case Study in E-Voting.</TITLE>
	<SECONDARY_TITLE>1st International Conference on Methodologies, Technologies and Tools enabling e-Government (MeTTeG'07)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Camerino, Italy</PLACE_PUBLISHED>
	<DATE>27/09/2007</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Siena, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2007</YEAR>
	<TITLE>Engineering Normative Requirements.</TITLE>
	<SECONDARY_TITLE>First IEEE International Conference on Research challenges in Information Science (RCIS)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Ouarzazate, Morocco</PLACE_PUBLISHED>
	<DATE>22/04/2007</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Bresciani</AUTHOR>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>B. Henderson-Sellers</AUTHOR>
	</AUTHORS>
	<YEAR>2003</YEAR>
	<TITLE>Evaluating the Potential for Integrating the OPEN and Tropos Metamodels.</TITLE>
	<SECONDARY_TITLE>International Conference on Software Engineering Research and Practice (SERP'03)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Bresciani</AUTHOR>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>B. Henderson-Sellers</AUTHOR>
	</AUTHORS>
	<YEAR>2003</YEAR>
	<TITLE>Enhancing Agent OPEN with concepts used in the Tropos methodology.</TITLE>
	<SECONDARY_TITLE>Fourth International Workshop Engineering Societies in the Agents World (2003)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Daniel Gross</AUTHOR>
		<AUTHOR>Eric Yu</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>Evolving System Architecture to Meet Changing Business Goals: an Agent and Goal-Oriented Approach.</TITLE>
	<SECONDARY_TITLE>First International Workshop From Software Requirements to Architectures (STRAW 01)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Toronto, Canada</PLACE_PUBLISHED>
	<DATE>14/05/2001</DATE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Bryl, V.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>Designing Socio-Technical Systems: From Stakeholder Goals to Social Networks.</TITLE>
	<SECONDARY_TITLE>Requirement Engineering</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Siena, A.</AUTHOR>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
		<AUTHOR>Susi, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>Designing Law-Compliant Software Requirements.</TITLE>
	<SECONDARY_TITLE>ER 2009</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Bryl, V.</AUTHOR>
		<AUTHOR>Massacci, F.</AUTHOR>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
		<AUTHOR>Zannone, N.</AUTHOR>
	</AUTHORS>
	<YEAR>2006</YEAR>
	<TITLE>Designing Security Requirements Models through Planning.</TITLE>
	<SECONDARY_TITLE>18th Conference on Advanced Information Systems Engineering (CAiSE'06)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Luxembourg</PLACE_PUBLISHED>
	<PUBLISHER>Springer</PUBLISHER>
	<DATE>05/06/2006</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>S. Dehousse</AUTHOR>
		<AUTHOR>S. Faulkner</AUTHOR>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
	</AUTHORS>
	<YEAR>2005</YEAR>
	<TITLE>Delegation Mechanisms for Agent Architectural Design.</TITLE>
	<SECONDARY_TITLE>IEEE Intelligent Agent Technology (IAT'05)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>A. Perini</AUTHOR>
		<AUTHOR>A. Susi</AUTHOR>
	</AUTHORS>
	<YEAR>2004</YEAR>
	<TITLE>Designing a Decision Support System for Integrated Production in Agriculture. An Agent-Oriented approach.</TITLE>
	<SECONDARY_TITLE>Environmental Modelling and Software Journal</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>A. Perini</AUTHOR>
		<AUTHOR>A. Susi</AUTHOR>
	</AUTHORS>
	<YEAR>2004</YEAR>
	<TITLE>Developing Tools for Agent-Oriented Visual Modeling.</TITLE>
	<SECONDARY_TITLE>Second German Conference (MATES 2004)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>J. Castro</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2000</YEAR>
	<TITLE>Developing Agent-Oriented Information Systems for the Enterprise.</TITLE>
	<SECONDARY_TITLE>Second International Conference On Enterprise Information Systems (2000)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Stafford, UK</PLACE_PUBLISHED>
	<DATE>04/04/2000</DATE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Ali, R.</AUTHOR>
		<AUTHOR>Chitchyan, R.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>Context for Goal-level Product Line Derivation</TITLE>
	<SECONDARY_TITLE>3rd International Workshop on Dynamic Software Product Lines (DSPL09)</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Siena, A.</AUTHOR>
		<AUTHOR>Bonetti, A.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Balanced Goalcards: combining Balanced Scorecards and Goal Analysis.</TITLE>
	<SECONDARY_TITLE>Third International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE 2008)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Funchal, Madeira - Portugal</PLACE_PUBLISHED>
	<DATE>04/05/2008</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Siena, A.</AUTHOR>
		<AUTHOR>Bonetti, A.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Balancing Business Perspectives in Requirements Analysis.</TITLE>
	<SECONDARY_TITLE>Lecture Notes in Communications in Computer and Information Science</SECONDARY_TITLE>
	<PUBLISHER>Springer-Verlag</PUBLISHER>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Bryl, V.</AUTHOR>
		<AUTHOR>Montali, M.</AUTHOR>
		<AUTHOR>Mello, P.</AUTHOR>
		<AUTHOR>Torroni, P.</AUTHOR>
		<AUTHOR>Zannone, N.</AUTHOR>
	</AUTHORS>
	<YEAR>2007</YEAR>
	<TITLE>B-Tropos. Agent-oriented requirements engineering meets computational logic for declarative business process modeling and verification.</TITLE>
	<SECONDARY_TITLE>8th Workshop on Computational Logic in Multi-Agent Systems (CLIMA-VIII)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Porto, Portugal</PLACE_PUBLISHED>
	<DATE>10/09/2007</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>VÃ­tor E. Silva Souza</AUTHOR>
		<AUTHOR>Alexei Lapouchnian</AUTHOR>
		<AUTHOR>William N. Robinson</AUTHOR>
		<AUTHOR>John Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2011</YEAR>
	<TITLE>Awareness Requirements for Adaptive Systems</TITLE>
	<SECONDARY_TITLE>6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2011)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Honolulu, Hawaii, USA</PLACE_PUBLISHED>
	<PUBLISHER>ACM</PUBLISHER>
	<PAGES>(to appear)</PAGES>
	<DATE>23/05/2011</DATE>
	<KEYWORDS>
		<KEYWORD>Requirements</KEYWORD>
		<KEYWORD>engineering,</KEYWORD>
		<KEYWORD>modeling,</KEYWORD>
		<KEYWORD>adaptive</KEYWORD>
		<KEYWORD>systems,</KEYWORD>
		<KEYWORD>awareness,</KEYWORD>
		<KEYWORD>monitoring</KEYWORD>
	</KEYWORDS>
	<ABSTRACT>&lt;p&gt;Recently, there has been a growing interest in self-adaptive&amp;nbsp;systems. Roadmap papers in this area point to feedback&amp;nbsp;loops as a promising way of operationalizing adaptivity in&amp;nbsp;such systems. In this paper, we define a new type of requirement &amp;mdash; called Awareness Requirement &amp;mdash; that can refer to&amp;nbsp;other requirements and their success/failures. We propose&amp;nbsp;a way to elicit and formalize such requirements and offer a&amp;nbsp;requirements monitoring framework to support them.&lt;/p&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;</ABSTRACT>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Hadar, I.</AUTHOR>
		<AUTHOR>Reinhartz-Berger, I.</AUTHOR>
		<AUTHOR>Kuflik, T.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
		<AUTHOR>Ricca, F.</AUTHOR>
		<AUTHOR>Susi, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2010</YEAR>
	<TITLE>An empirical study of Requirements Model understanding: Use Case vs. Tropos models</TITLE>
	<SECONDARY_TITLE>25th ACM Symposium on Applied Computing </SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>0</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Ali, R.</AUTHOR>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2010</YEAR>
	<TITLE>A Goal-based Framework for Contextual Requirements  Modeling and Analysis</TITLE>
	<SECONDARY_TITLE>Requirements Engineering</SECONDARY_TITLE>
	<VOLUME>15</VOLUME>
	<NUMBER>4</NUMBER>
	<PAGES>20</PAGES>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Ali, R.</AUTHOR>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>A Goal Modeling Framework for Self-Contextualizable Software.</TITLE>
	<SECONDARY_TITLE>14th International Conference on Exploring Modeling Methods in Systems Analysis and Design (EMMSAD09)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Amsterdam, The Netherlands</PLACE_PUBLISHED>
	<PUBLISHER>Springer</PUBLISHER>
	<DATE>08/06/2009</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>An Architecture for Requirements-driven Self-Reconfiguration.</TITLE>
	<SECONDARY_TITLE>21st International Conference on Advanced Information Systems Engineering (CAiSE '09)</SECONDARY_TITLE>
	<PUBLISHER>Springer</PUBLISHER>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Morandini, M.</AUTHOR>
		<AUTHOR>Migeon, F.</AUTHOR>
		<AUTHOR>Gleizes, M.</AUTHOR>
		<AUTHOR>Maurel, C.</AUTHOR>
		<AUTHOR>Penserini, L.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2009</YEAR>
	<TITLE>A Goal-Oriented Approach for Modelling Self-Organising MAS</TITLE>
	<SECONDARY_TITLE>Proceedings of the 10th International Workshop on Engineering Societies in the Agents' World (ESAW 2009)</SECONDARY_TITLE>
	<PUBLISHER>Springer</PUBLISHER>
	<VOLUME>5881</VOLUME>
	<TERTIARY_TITLE>LNCS</TERTIARY_TITLE>
	<DATE>November</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Ali, R.</AUTHOR>
		<AUTHOR>Asnar, Y.</AUTHOR>
		<AUTHOR>Bryl, V.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Applying Tropos to Socio-Technical System Design and Runtime Configuration.</TITLE>
	<SECONDARY_TITLE>Evolution of Agent Development: Methodologies, Tools, Platforms and Languages (WOA08)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Palermo, Italy</PLACE_PUBLISHED>
	<DATE>17/09/2008</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Asnar, Y.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>Analyzing Business Continuity through a Multi-Layers Model.</TITLE>
	<SECONDARY_TITLE>6th International Conference on Business Process Management (BPM 2008)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Milan, Italy</PLACE_PUBLISHED>
	<DATE>01/09/2008</DATE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Qureshi, N.A.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
	</AUTHORS>
	<YEAR>2008</YEAR>
	<TITLE>An Agent-Based Middleware for Adaptive Systems</TITLE>
	<SECONDARY_TITLE>QSIC '08: Proceedings of the 2008 The Eighth International Conference on Quality Software</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Washington, DC, USA</PLACE_PUBLISHED>
	<PUBLISHER>IEEE Computer Society</PUBLISHER>
	<PAGES>423--428</PAGES>
	<ISBN>978-0-7695-3312-4</ISBN>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Penserini, L.</AUTHOR>
		<AUTHOR>Perini, A.</AUTHOR>
		<AUTHOR>Susi, A.</AUTHOR>
		<AUTHOR>Morandini, M.</AUTHOR>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
	</AUTHORS>
	<YEAR>2007</YEAR>
	<TITLE>A Design Framework for Generating BDI-agents from Goal Models</TITLE>
	<SECONDARY_TITLE>6th Int. Conf. on Autonomous Agents and Multi-Agent Systems (AAMAS'07), Honolulu, Hawaii</SECONDARY_TITLE>
	<PAGES>610-612</PAGES>
	<ISBN>978-81-904262-7-5</ISBN>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>31</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>J. Castro</AUTHOR>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>S. Kethers</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2005</YEAR>
	<TITLE>A Requirements-Driven Methodology for Agent-Oriented Software.</TITLE>
	<SECONDARY_TITLE>Agent-Oriented Methodologies</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>A. Perini</AUTHOR>
		<AUTHOR>A. Susi</AUTHOR>
	</AUTHORS>
	<YEAR>2005</YEAR>
	<TITLE>Automating Model Transformations in Agent-Oriented Modelling.</TITLE>
	<SECONDARY_TITLE>AOSE '05 workshop</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>31</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>B. Henderson-Sellers</AUTHOR>
	</AUTHORS>
	<YEAR>2005</YEAR>
	<TITLE>Agent-Oriented Methodologies: an Introduction.</TITLE>
	<SECONDARY_TITLE>Agent-Oriented Methodologies</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
	</AUTHORS>
	<YEAR>2004</YEAR>
	<TITLE>Analysing Security in Information Systems.</TITLE>
	<SECONDARY_TITLE>Second International Workshop on Security In Information Systems (WOSIS-2004)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Anna Perini</AUTHOR>
		<AUTHOR>Marco Pistore</AUTHOR>
		<AUTHOR>Marco Roveri</AUTHOR>
		<AUTHOR>Angelo Susi</AUTHOR>
	</AUTHORS>
	<YEAR>2003</YEAR>
	<TITLE>Agent-oriented modeling by interleaving formal and informal specification.</TITLE>
	<SECONDARY_TITLE>Agent Oriented Software Engineering (AOSE-2003)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Melbourne, Australia</PLACE_PUBLISHED>
	<DATE>15/07/2003</DATE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>G. Manson</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
	</AUTHORS>
	<YEAR>2003</YEAR>
	<TITLE>An Ontology for Modelling Security: The Tropos Approach.</TITLE>
	<SECONDARY_TITLE>KES 2003 Invited Session Ontology and Multi-Agent Systems Design (OMASD'03)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>A. Gani</AUTHOR>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>G. Manson</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
	</AUTHORS>
	<YEAR>2003</YEAR>
	<TITLE>Analysing Security Requirements of Information Systems Using Tropos.</TITLE>
	<SECONDARY_TITLE>International Conference on Enterprise Information Systems</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Angers, France</PLACE_PUBLISHED>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2002</YEAR>
	<TITLE>Agent Oriented Software Development.</TITLE>
	<SECONDARY_TITLE>2nd Hellenic Conference on Artificial Intelligence (SETN-02)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Bresciani</AUTHOR>
		<AUTHOR>F. SannicolÃ²</AUTHOR>
	</AUTHORS>
	<YEAR>2002</YEAR>
	<TITLE>Applying Tropos Requirements Analysis for defining a Tropos tool.</TITLE>
	<SECONDARY_TITLE>Agent-Oriented Information System. AOIS-2002: Fourth International Bi-Conference Workshop (2002)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Toronto, Canada</PLACE_PUBLISHED>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>M. Garzetti</AUTHOR>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>F. SannicolÃ²</AUTHOR>
	</AUTHORS>
	<YEAR>2002</YEAR>
	<TITLE>Applying Tropos Methodology to a real case study: Complexity and Criticality analysis.</TITLE>
	<SECONDARY_TITLE>Workshop on &quot;Dagli OGGETTI agli AGENTI - Dall'informazione alla Conoscenza (WOA02)&quot;</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>G. Manson</AUTHOR>
		<AUTHOR>H. Mouratidis</AUTHOR>
		<AUTHOR>I. Philp</AUTHOR>
	</AUTHORS>
	<YEAR>2002</YEAR>
	<TITLE>A Natural Extension of Tropos Methodology for Modelling Security.</TITLE>
	<SECONDARY_TITLE>Workshop on Agent-oriented methodologies, at OOPSLA 2002</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Eric Yu</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>Agent-Oriented Modelling: Software Versus the World.</TITLE>
	<SECONDARY_TITLE>Agent-Oriented Software Engineering (AOSE-2001)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>A Goal-Based Organizational Perspective on Multi-Agents Architectures.</TITLE>
	<SECONDARY_TITLE>Eighth International Workshop on Agent Theories, architectures, and languages (ATAL-2001)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Seattle, USA</PLACE_PUBLISHED>
	<DATE>01/08/2001</DATE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Jaelson Castro</AUTHOR>
		<AUTHOR>Manuel Kolp</AUTHOR>
		<AUTHOR>John Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>A Social Organization Perspective on Software Architectures.</TITLE>
	<SECONDARY_TITLE>First International Workshop From Software Requirements to Architectures (STRAW 01)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Toronto, Canada</PLACE_PUBLISHED>
	<DATE>14/05/2001</DATE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>31</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>Architectural Styles for Information Systems: An Organizational Perspective.</TITLE>
	<SECONDARY_TITLE>Tropos Working Paper</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Bresciani</AUTHOR>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>F. Giunchiglia</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>A. Perini</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>A Knowledge Level Software Engineering Methodology for Agent Oriented Programming.</TITLE>
	<SECONDARY_TITLE>Fifth International Conference on Autonomous Agents (2001)</SECONDARY_TITLE>
	<PLACE_PUBLISHED>Montreal, Canada</PLACE_PUBLISHED>
	<DATE>28/05/2001</DATE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>P. Bresciani</AUTHOR>
		<AUTHOR>P. Giorgini</AUTHOR>
		<AUTHOR>F. Giunchiglia</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
		<AUTHOR>A. Perini</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE>Agent-Oriented Software Development: A Case Study.</TITLE>
	<SECONDARY_TITLE>Thirteenth International Conference on Software Engineering (2001)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>31</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>J. Castro</AUTHOR>
		<AUTHOR>M. Kolp</AUTHOR>
		<AUTHOR>J. Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2000</YEAR>
	<TITLE>A Requirements-Driven Software Development Methodology.</TITLE>
	<SECONDARY_TITLE>Tropos Working Paper</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Chopra, A.</AUTHOR>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
	</AUTHORS>
	<YEAR>2010</YEAR>
	<TITLE> Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments</TITLE>
	<SECONDARY_TITLE>Conference on Advanced Information Systems Engineering</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Dalpiaz, F.</AUTHOR>
		<AUTHOR>Chopra, A.</AUTHOR>
		<AUTHOR>Giorgini, P.</AUTHOR>
		<AUTHOR>Mylopoulos, J.</AUTHOR>
	</AUTHORS>
	<YEAR>2010</YEAR>
	<TITLE> Adaptation in Open Systems: Giving Interaction its Rightful Place</TITLE>
	<SECONDARY_TITLE>ER 2010</SECONDARY_TITLE>
</RECORD>
<RECORD>
	<REFERENCE_TYPE>3</REFERENCE_TYPE>
	<AUTHORS>
		<AUTHOR>Jaelson Castro</AUTHOR>
		<AUTHOR>Manuel Kolp</AUTHOR>
		<AUTHOR>John Mylopoulos</AUTHOR>
	</AUTHORS>
	<YEAR>2001</YEAR>
	<TITLE> A Requirements-Driven Development Methodology.</TITLE>
	<SECONDARY_TITLE>13th International Conference on Advanced Information Systems Engineering (CAiSE 01)</SECONDARY_TITLE>
	<KEYWORDS>
		<KEYWORD>pub</KEYWORD>
	</KEYWORDS>
</RECORD>
</RECORDS></XML>