Modeling Social and Individual Trust in Requirements Engineering Methodologies

Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

30 Citations (Scopus)


When we model and analyze trust in organizations or information systems we have to take into account two different levels of analysis: social and individual. Social levels define the structure of organizations, whereas individual levels focus on individual agents. This is particularly important when capturing security requirements where a "normally" trusted organizational role can be played by an untrusted individual. Our goal is to model and analyze the two levels finding the link between them and supporting the automatic detection of conflicts that can come up when agents play roles in the organization. We also propose a formal framework that allows for the automatic verification of security requirements between the two levels by using Datalog and has been implemented in CASE tool.

Original languageEnglish
Title of host publicationTrust Management
Subtitle of host publication3rd International Conference, iTrust 2005 - Proceedings
EditorsPeter Herrmann, Valérie Issarny, Simon Shiu
Place of PublicationBerlin
Number of pages16
ISBN (Electronic)978-3-540-32040-1
ISBN (Print)978-3-540-26042-4
Publication statusPublished - 2005
Externally publishedYes
EventiTrust 2005 Trust Management: 3rd International Conference - Paris, France
Duration: 23 May 200526 May 2005
Conference number: 3

Publication series

NameLecture Notes in Computer Science
ISSN (Print)0302-9743


ConferenceiTrust 2005 Trust Management


  • Agent-Oriented Technologies
  • Information Technologies
  • Realization of prototypes
  • Requirements and methodologies
  • Security & Trust
  • Social
  • Trust specification, analysis and reasoning

Fingerprint Dive into the research topics of 'Modeling Social and Individual Trust in Requirements Engineering Methodologies'. Together they form a unique fingerprint.

  • Cite this

    Giorgini, P., Massacci, F., Mylopoulos, J., & Zannone, N. (2005). Modeling Social and Individual Trust in Requirements Engineering Methodologies. In P. Herrmann, V. Issarny, & S. Shiu (Eds.), Trust Management: 3rd International Conference, iTrust 2005 - Proceedings (pp. 161-176). (Lecture Notes in Computer Science; Vol. 3477). Springer.