-
1
-
-
33646361264
-
-
Anonymizer (2005), available at: www.anonymizer.com.
-
(2005)
-
-
-
2
-
-
0029707819
-
-
ICRE '96, IEEE, Colorado Springs CO, pp. 136-144
-
Antón, A.I. (1996), Goal-Based Requirements Analysis, ICRE '96, IEEE, Colorado Springs CO, pp. 136-144.
-
(1996)
Goal-Based Requirements Analysis
-
-
Antón, A.I.1
-
3
-
-
77950545414
-
Strategies for developing policies and requirements for secure electronic commerce systems
-
paper presented, 1-4 November
-
Antón, A.I. and Earp, J.B. (2000), "Strategies for developing policies and requirements for secure electronic commerce systems", paper presented at the 1st ACM Workshop on Security and Privacy in E-Commerce (CCS 2000), 1-4 November.
-
(2000)
1st ACM Workshop on Security and Privacy in E-Commerce (CCS 2000)
-
-
Antón, A.I.1
Earp, J.B.2
-
4
-
-
0002131454
-
Design for privacy in ubiquitous computing environments
-
Michelis, G. Simone, C. Schmidt, K.
-
Bellotti, V. and Sellen, A. (1993), "Design for privacy in ubiquitous computing environments", in Michelis, G., Simone, C. and Schmidt, K. (Eds), Proceedings of the Third European Conference on Computer Supported Cooperative Work - ECSCW 93 Milan, 13-17 September, pp. 93-108.
-
(1993)
Proceedings of the Third European Conference on Computer Supported Cooperative Work - ECSCW 93 Milan, 13-17 September
, pp. 93-108
-
-
Bellotti, V.1
Sellen, A.2
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D. (1981), "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of the ACM, Vol. 24 No. 2, pp. 84-8.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-8
-
-
Chaum, D.1
-
8
-
-
0022145479
-
Security without identification: Transactions systems to make big brother obsolete
-
Chaum, D. (1985), "Security without identification: transactions systems to make big brother obsolete", Communications of the ACM, Vol. 28 No. 10, pp. 1030-44.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-44
-
-
Chaum, D.1
-
9
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum, D. (1988), "The dining cryptographers problem: unconditional sender and recipient untraceability", Journal of Cryptology, Vol. 1 No. 1, pp. 65-75.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
10
-
-
84979855000
-
Dealing with security requirements during the development of information systems
-
Chung, L. (1993), "Dealing with security requirements during the development of information systems", CaiSE '93, The 5th Int. Conf. of Advanced Info. Systems Engineering, Paris, pp. 234-251.
-
(1993)
CaiSE '93, The 5th Int. Conf. of Advanced Info. Systems Engineering, Paris
, pp. 234-251
-
-
Chung, L.1
-
11
-
-
33646343413
-
-
US Department of Health, Education and Welfare, Washington, DC
-
(The) Code of Fair Information Practices (1973), US Department of Health, Education and Welfare, Washington, DC.
-
(1973)
-
-
-
12
-
-
85084161366
-
Tor: The second-generator onion router
-
Dingledine, R., Mathewson, N. and Syverson, P. (2004), "Tor: the second-generator onion router", Proceedings of the 13th USENIX Security Symposium, San Diego, CA, pp. 303-320.
-
(2004)
Proceedings of the 13th USENIX Security Symposium, San Diego, CA
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
14
-
-
0005063385
-
Onion Routing for anonymous and private internet connections
-
Goldschlag, D., Syverson, P. and Reed, M. (1999), "Onion Routing for anonymous and private internet connections", Communications of the ACM, Vol. 42 No. 2, pp. 39-41.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Syverson, P.2
Reed, M.3
-
15
-
-
9244222724
-
Enhancing web privacy and anonymity in the digital era
-
Gritzalis, S. (2004), "Enhancing web privacy and anonymity in the digital era", Information Management & Computer Security, Vol. 12 No. 3, pp. 255-88.
-
(2004)
Information Management & Computer Security
, vol.12
, Issue.3
, pp. 255-88
-
-
Gritzalis, S.1
-
16
-
-
24344462080
-
A framework for modelling privacy requirements in role engineering
-
He, Q. and Antón, A.I. (2003), "A framework for modelling privacy requirements in role engineering", Int'l Workshop on Requirements Engineering for Software Quality (REFSQ), 16-17 June, Klagenfurt/Velden, pp.115-124.
-
(2003)
Int'l Workshop on Requirements Engineering for Software Quality (REFSQ), 16-17 June, Klagenfurt/Velden
, pp. 115-124
-
-
He, Q.1
Antón, A.I.2
-
17
-
-
33646346559
-
-
Designing Interactive Systems, Boston MA
-
Hong, J.I., Ng, J., Lederer, S. and Landay, J.A. (2004), Privacy Risk Models for Designing Privacy-sensitive Ubiquitous Computing Systems, Designing Interactive Systems, Boston MA.
-
(2004)
Privacy Risk Models for Designing Privacy-sensitive Ubiquitous Computing Systems
-
-
Hong, J.I.1
Ng, J.2
Lederer, S.3
Landay, J.A.4
-
18
-
-
33646345792
-
-
GVU Technical Report, Georgia Institute of Technology, Atlanta, GA
-
Jensen, C., Tullio, J., Potts, C. and Mynatt, E.D. (2005), STRAP: A Structured Analysis Framework for Privacy, GVU Technical Report, Georgia Institute of Technology, Atlanta, GA.
-
(2005)
STRAP: A Structured Analysis Framework for Privacy
-
-
Jensen, C.1
Tullio, J.2
Potts, C.3
Mynatt, E.D.4
-
19
-
-
33845224346
-
-
DEXA EGOV'04 Conference, LNCS Vol. 3183. Springer, Berlin, pp. 66-71
-
Kalloniatis, C., Kavakli, E. and Gritzalis, S. (2004), Security Requirements Engineering for e-Government Applications, DEXA EGOV'04 Conference, LNCS Vol. 3183. Springer, Berlin, pp. 66-71.
-
(2004)
Security Requirements Engineering for E-Government Applications
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
21
-
-
1142293423
-
Analyzing security requirements as relationships among strategic actors, (SREIS'02)
-
Raleigh, NC
-
Liu, L., Yu, E. and Mylopoulos, J. (2002), "Analyzing security requirements as relationships among strategic actors, (SREIS'02)", e-proceedings, Raleigh, NC, available at: www.sreis.org/old/2002/finalpaper9. pdf.
-
(2002)
E-proceedings
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
22
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
Liu, L., Yu, E. and Mylopoulos, J. (2003), "Security and privacy requirements analysis within a social setting", 11th IEEE International Requirements Engineering Conference (RE'03), Monterey Bay, CA, pp. 151-161.
-
(2003)
11th IEEE International Requirements Engineering Conference (RE'03), Monterey Bay, CA
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
25
-
-
12344314483
-
-
Report YCS 368, Department of Computer Science, University of York, York
-
Moffett, J.D. and Nuseibeh, B.A. (2003), A Framework for Security Requirements Engineering, Report YCS 368, Department of Computer Science, University of York, York.
-
(2003)
A Framework for Security Requirements Engineering
-
-
Moffett, J.D.1
Nuseibeh, B.A.2
-
26
-
-
35048845022
-
-
CAiSE '03, LNCS 2681, Springer-Verlag, Berlin, pp. 63-78
-
Mouratidis, H., Giorgini, P. and Manson, G. (2003a), Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems, CAiSE '03, LNCS 2681, Springer-Verlag, Berlin, pp. 63-78.
-
(2003)
Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
27
-
-
8344270973
-
An ontology for modelling security: The Tropos Project
-
Palade, V. Howlett, R.J. Jain, L. Springer-Verlag Berlin
-
Mouratidis, H., Giorgini, P. and Manson, G. (2003b), "An ontology for modelling security: the Tropos Project", in Palade, V., Howlett, R.J. and Jain, L. (Eds), Lecture Notes in Artificial Intelligence 2773, Springer-Verlag, Berlin, pp. 1387-94.
-
(2003)
Lecture Notes in Artificial Intelligence 2773
, pp. 1387-94
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
28
-
-
0026883734
-
Representing and using non-functional requirements: A process oriented approach
-
Mylopoulos, J., Chung, L. and Nixon, B. (1992), "Representing and using non-functional requirements: a process oriented approach", IEEE Trans. Soft Eng., Vol. 18, pp. 483-97.
-
(1992)
IEEE Trans. Soft Eng.
, vol.18
, pp. 483-97
-
-
Mylopoulos, J.1
Chung, L.2
Nixon, B.3
-
29
-
-
0023331864
-
Networks without user observability
-
Pfitzmann, A. and Waidner, M. (1987), "Networks without user observability", Computers & Security, Vol. 6 No. 2, pp. 158-66.
-
(1987)
Computers & Security
, vol.6
, Issue.2
, pp. 158-66
-
-
Pfitzmann, A.1
Waidner, M.2
-
30
-
-
0032074579
-
Anonymous connections and onion routing
-
Reed, M., Syverson, P. and Goldschlag, D. (1998), "Anonymous connections and onion routing", IEEE Journal on Selected Areas in Communications, Vol. 16 No. 4, pp. 482-94.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-94
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
31
-
-
0001777423
-
Anonymous web transactions with Crowds
-
Reiter, K.M. and Rubin, D.A. (1999), "Anonymous web transactions with Crowds", Communications of the ACM, Vol. 42 No. 2, pp. 32-8.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 32-8
-
-
Reiter, K.M.1
Rubin, D.A.2
-
32
-
-
0034447260
-
-
A protocol for anonymous communication over the Internet Samarati, P. Jajodia, S. ACM Press New York NY
-
Shields, C. and Levine, N.B. (2000), "A protocol for anonymous communication over the Internet", in Samarati, P. and Jajodia, S. (Eds), Proceedings of the 7th ACM Conference on Computer and Communications Security, ACM Press, New York NY, pp. 33-42.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 33-42
-
-
Shields, C.1
Levine, N.B.2
-
33
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
van Lamsweerde, A. and Letier, E. (2000), "Handling obstacles in goal-oriented requirements engineering", IEEE Transactions on Software Engineering, Vol. 26, pp. 978-1005.
-
(2000)
IEEE Transactions on Software Engineering
, vol.26
, pp. 978-1005
-
-
Van Lamsweerde, A.1
Letier, E.2
-
34
-
-
0000320829
-
The rights to privacy
-
Warren, S. and Brandeis, L. (1890), "The rights to privacy", Harvard Law Review, Vol. 5, pp. 193-220.
-
(1890)
Harvard Law Review
, vol.5
, pp. 193-220
-
-
Warren, S.1
Brandeis, L.2
-
36
-
-
33644968219
-
IT-security and privacy design and use of privacy enhancing security mechanisms
-
Springer-Verlag Berlin
-
Fischer-Hübner, S. (2001), "IT-security and privacy design and use of privacy enhancing security mechanisms", Lecture Notes in Computer Science, Vol. 1958, Springer-Verlag, Berlin.
-
(2001)
Lecture Notes in Computer Science
, vol.1958
-
-
Fischer-Hübner, S.1
-
37
-
-
0347216551
-
Diensteintegrierende, Kommunikationsmnetze mit teilnehmerü berprüfbaren Datenschutz
-
Springer-Verlag Berlin
-
Pfitzmann, A. (1990), "Diensteintegrierende, Kommunikationsmnetze mit teilnehmerüberprüfbaren Datenschutz", Informatik-Fachberichte 234, Springer-Verlag, Berlin.
-
(1990)
Informatik-Fachberichte
, vol.234
-
-
Pfitzmann, A.1
-
38
-
-
3843125737
-
Rechsicherheit trotz Anonymität in offenen digitalen Systemen
-
Pfitzmann, B., Waidner, M. and Pfitzmann, A. (1990), "Rechsicherheit trotz Anonymität in offenen digitalen Systemen", Datenschutz und Datensicherheit (DuD) No. 6 pp. 243-253 (Part 1), No. 7, pp. 305-315 (Part 2).
-
(1990)
Datenschutz und Datensicherheit (DuD)
, Issue.6-7 PART 1 AND 2
, pp. 243-253
-
-
Pfitzmann, B.1
Waidner, M.2
Pfitzmann, A.3
-
39
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
Reiter, K.M. and Rubin, D.A. (1998), "Crowds: anonymity for web transactions", ACM Transactions of Information and System Security, Vol. 1 No. 1, pp. 66-92.
-
(1998)
ACM Transactions of Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, K.M.1
Rubin, D.A.2
|