메뉴 건너뛰기




Volumn 16, Issue 2, 2006, Pages 140-158

Incorporating privacy requirements into the system design process: The PriS conceptual framework

Author keywords

Privacy; Systems software

Indexed keywords


EID: 33646358507     PISSN: 10662243     EISSN: None     Source Type: Journal    
DOI: 10.1108/10662240610656483     Document Type: Article
Times cited : (25)

References (39)
  • 1
    • 33646361264 scopus 로고    scopus 로고
    • Anonymizer (2005), available at: www.anonymizer.com.
    • (2005)
  • 3
    • 77950545414 scopus 로고    scopus 로고
    • Strategies for developing policies and requirements for secure electronic commerce systems
    • paper presented, 1-4 November
    • Antón, A.I. and Earp, J.B. (2000), "Strategies for developing policies and requirements for secure electronic commerce systems", paper presented at the 1st ACM Workshop on Security and Privacy in E-Commerce (CCS 2000), 1-4 November.
    • (2000) 1st ACM Workshop on Security and Privacy in E-Commerce (CCS 2000)
    • Antón, A.I.1    Earp, J.B.2
  • 7
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D. (1981), "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of the ACM, Vol. 24 No. 2, pp. 84-8.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-8
    • Chaum, D.1
  • 8
    • 0022145479 scopus 로고
    • Security without identification: Transactions systems to make big brother obsolete
    • Chaum, D. (1985), "Security without identification: transactions systems to make big brother obsolete", Communications of the ACM, Vol. 28 No. 10, pp. 1030-44.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-44
    • Chaum, D.1
  • 9
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum, D. (1988), "The dining cryptographers problem: unconditional sender and recipient untraceability", Journal of Cryptology, Vol. 1 No. 1, pp. 65-75.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 11
    • 33646343413 scopus 로고
    • US Department of Health, Education and Welfare, Washington, DC
    • (The) Code of Fair Information Practices (1973), US Department of Health, Education and Welfare, Washington, DC.
    • (1973)
  • 14
    • 0005063385 scopus 로고    scopus 로고
    • Onion Routing for anonymous and private internet connections
    • Goldschlag, D., Syverson, P. and Reed, M. (1999), "Onion Routing for anonymous and private internet connections", Communications of the ACM, Vol. 42 No. 2, pp. 39-41.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Syverson, P.2    Reed, M.3
  • 15
    • 9244222724 scopus 로고    scopus 로고
    • Enhancing web privacy and anonymity in the digital era
    • Gritzalis, S. (2004), "Enhancing web privacy and anonymity in the digital era", Information Management & Computer Security, Vol. 12 No. 3, pp. 255-88.
    • (2004) Information Management & Computer Security , vol.12 , Issue.3 , pp. 255-88
    • Gritzalis, S.1
  • 21
    • 1142293423 scopus 로고    scopus 로고
    • Analyzing security requirements as relationships among strategic actors, (SREIS'02)
    • Raleigh, NC
    • Liu, L., Yu, E. and Mylopoulos, J. (2002), "Analyzing security requirements as relationships among strategic actors, (SREIS'02)", e-proceedings, Raleigh, NC, available at: www.sreis.org/old/2002/finalpaper9. pdf.
    • (2002) E-proceedings
    • Liu, L.1    Yu, E.2    Mylopoulos, J.3
  • 27
    • 8344270973 scopus 로고    scopus 로고
    • An ontology for modelling security: The Tropos Project
    • Palade, V. Howlett, R.J. Jain, L. Springer-Verlag Berlin
    • Mouratidis, H., Giorgini, P. and Manson, G. (2003b), "An ontology for modelling security: the Tropos Project", in Palade, V., Howlett, R.J. and Jain, L. (Eds), Lecture Notes in Artificial Intelligence 2773, Springer-Verlag, Berlin, pp. 1387-94.
    • (2003) Lecture Notes in Artificial Intelligence 2773 , pp. 1387-94
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 28
    • 0026883734 scopus 로고
    • Representing and using non-functional requirements: A process oriented approach
    • Mylopoulos, J., Chung, L. and Nixon, B. (1992), "Representing and using non-functional requirements: a process oriented approach", IEEE Trans. Soft Eng., Vol. 18, pp. 483-97.
    • (1992) IEEE Trans. Soft Eng. , vol.18 , pp. 483-97
    • Mylopoulos, J.1    Chung, L.2    Nixon, B.3
  • 29
    • 0023331864 scopus 로고
    • Networks without user observability
    • Pfitzmann, A. and Waidner, M. (1987), "Networks without user observability", Computers & Security, Vol. 6 No. 2, pp. 158-66.
    • (1987) Computers & Security , vol.6 , Issue.2 , pp. 158-66
    • Pfitzmann, A.1    Waidner, M.2
  • 31
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous web transactions with Crowds
    • Reiter, K.M. and Rubin, D.A. (1999), "Anonymous web transactions with Crowds", Communications of the ACM, Vol. 42 No. 2, pp. 32-8.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 32-8
    • Reiter, K.M.1    Rubin, D.A.2
  • 34
    • 0000320829 scopus 로고
    • The rights to privacy
    • Warren, S. and Brandeis, L. (1890), "The rights to privacy", Harvard Law Review, Vol. 5, pp. 193-220.
    • (1890) Harvard Law Review , vol.5 , pp. 193-220
    • Warren, S.1    Brandeis, L.2
  • 36
    • 33644968219 scopus 로고    scopus 로고
    • IT-security and privacy design and use of privacy enhancing security mechanisms
    • Springer-Verlag Berlin
    • Fischer-Hübner, S. (2001), "IT-security and privacy design and use of privacy enhancing security mechanisms", Lecture Notes in Computer Science, Vol. 1958, Springer-Verlag, Berlin.
    • (2001) Lecture Notes in Computer Science , vol.1958
    • Fischer-Hübner, S.1
  • 37
    • 0347216551 scopus 로고
    • Diensteintegrierende, Kommunikationsmnetze mit teilnehmerü berprüfbaren Datenschutz
    • Springer-Verlag Berlin
    • Pfitzmann, A. (1990), "Diensteintegrierende, Kommunikationsmnetze mit teilnehmerüberprüfbaren Datenschutz", Informatik-Fachberichte 234, Springer-Verlag, Berlin.
    • (1990) Informatik-Fachberichte , vol.234
    • Pfitzmann, A.1
  • 38
    • 3843125737 scopus 로고
    • Rechsicherheit trotz Anonymität in offenen digitalen Systemen
    • Pfitzmann, B., Waidner, M. and Pfitzmann, A. (1990), "Rechsicherheit trotz Anonymität in offenen digitalen Systemen", Datenschutz und Datensicherheit (DuD) No. 6 pp. 243-253 (Part 1), No. 7, pp. 305-315 (Part 2).
    • (1990) Datenschutz und Datensicherheit (DuD) , Issue.6-7 PART 1 AND 2 , pp. 243-253
    • Pfitzmann, B.1    Waidner, M.2    Pfitzmann, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.