메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 546-551

Dealing with privacy issues during the system design process

Author keywords

Privacy requirements; Requirements engineering methodology

Indexed keywords

INFORMATION TECHNOLOGY; PROBLEM SOLVING; REQUIREMENTS ENGINEERING; SECURITY OF DATA;

EID: 33846969170     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISSPIT.2005.1577156     Document Type: Conference Paper
Times cited : (20)

References (19)
  • 1
    • 33644968219 scopus 로고    scopus 로고
    • IT-Security and Privacy
    • Springer
    • Fischer-Hübner, S.: IT-Security and Privacy, LNCS Vol. 1958. Springer (2001)
    • (2001) LNCS , vol.1958
    • Fischer-Hübner, S.1
  • 2
    • 33845224346 scopus 로고    scopus 로고
    • Security Requirements Engineering for e-Govemment Applications
    • DEXA EGOV'04 Conference, Springer
    • Kalloniatis, C., Kavakli, E., Gritzalis, S.: Security Requirements Engineering for e-Govemment Applications, DEXA EGOV'04 Conference, LNCS Vol. 3183. Springer (2004) 66-71
    • (2004) LNCS , vol.3183 , pp. 66-71
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 3
    • 33644508508 scopus 로고    scopus 로고
    • Enterprise Knowledge Management and Conceptual Modelling
    • Springer
    • Loucopoulos, P., Kavakli, V., Enterprise Knowledge Management and Conceptual Modelling. LNCS Vol. 1565. Springer (1999) 123-143
    • (1999) LNCS , vol.1565 , pp. 123-143
    • Loucopoulos, P.1    Kavakli, V.2
  • 4
    • 2542438623 scopus 로고    scopus 로고
    • From Information Modelling to Enterprise Modelling
    • State of the Art and Research Themes. Springer
    • Loucopoulos, P.: From Information Modelling to Enterprise Modelling. In: IS Engineering: State of the Art and Research Themes. Springer (2000) 67-78
    • (2000) IS Engineering , pp. 67-78
    • Loucopoulos, P.1
  • 5
    • 33846993275 scopus 로고    scopus 로고
    • Cannon, J., C.: Privacy, What Developers and IT Professionals Should Know. Addison-Wesley (2004)
    • Cannon, J., C.: Privacy, What Developers and IT Professionals Should Know. Addison-Wesley (2004)
  • 6
    • 84888999400 scopus 로고    scopus 로고
    • available at
    • Anonymizer, available at www.anonymizer.com
    • Anonymizer
  • 7
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous Web Transactions with Crowds
    • Reiter, K.M., Rubin, D.A.: Anonymous Web Transactions with Crowds. Communications of the ACM, Vol. 42, No. 2 (1999) 32-38
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 32-38
    • Reiter, K.M.1    Rubin, D.A.2
  • 9
    • 0005063385 scopus 로고    scopus 로고
    • Onion Routing for anonymous and private Internet connections
    • Goldschlag, D., Syverson, P., Reed, M.: Onion Routing for anonymous and private Internet connections. Communications of the ACM, Vol. 42,No. 2 (1999) 39-41
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Syverson, P.2    Reed, M.3
  • 10
    • 0022145479 scopus 로고
    • Security without identification: Transactions Systems to make Big Brother Obsolete
    • Chaum, D.: Security without identification: Transactions Systems to make Big Brother Obsolete. Communications of the ACM, Vol. 28, No.10 (1985) 1030-1044
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 11
    • 0023861309 scopus 로고
    • The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
    • Chaum, D.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology, Vol. 1, No. 1 (1988) 65-75
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 12
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, return Addresses, and Digital Pseudonyms
    • Chaum, D.: Untraceable Electronic Mail, return Addresses, and Digital Pseudonyms. Communications of the ACM, Vol. 24, No. 2 (1981) 84-88
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 13
    • 0023331864 scopus 로고
    • Networks without user Observability
    • Pfitzmann, A., Waidner, M.: Networks without user Observability. Computers & Security, Vol. 6, Issue 2 (1987) 158-166
    • (1987) Computers & Security , vol.6 , Issue.2 , pp. 158-166
    • Pfitzmann, A.1    Waidner, M.2
  • 15
    • 9244233770 scopus 로고    scopus 로고
    • GAP-Practical Anonymous networking
    • Privacy Enhancing Technologies , also available at
    • Bennett, K., Grothoff, C.: GAP-Practical Anonymous networking. Proceeding of the Workshop on PET2003 Privacy Enhancing Technologies (2003), also available at http:/citeseer.nj.nee.com/bennett02gap.html
    • (2003) Proceeding of the Workshop on PET2003
    • Bennett, K.1    Grothoff, C.2
  • 17
    • 33846957944 scopus 로고    scopus 로고
    • ICTE-PAN: Methodologies and Tools for Building Intelligent Collaboration and Transaction Environments in Public Administration Networks, Project Deliverable D 3.1b, University of the Aegean, Greece
    • ICTE-PAN: Methodologies and Tools for Building Intelligent Collaboration and Transaction Environments in Public Administration Networks, Project Deliverable D 3.1b, University of the Aegean, Greece
  • 19
    • 33846945313 scopus 로고    scopus 로고
    • Common Criteria Project
    • Common Criteria Project, http://csrc.nisl.gov/cc/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.