-
2
-
-
2342522578
-
Financial Privacy Policies and the Need for Standardization
-
Mar./Apr
-
A.I. Antón, J.B. Earp, Q. He, W. Stufflebeam, D. Bolchini, and C. Jensen, "Financial Privacy Policies and the Need for Standardization," IEEE Security and Privacy, vol. 2, no. 2, pp. 36-45, Mar./Apr. 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.2
, pp. 36-45
-
-
Antón, A.I.1
Earp, J.B.2
He, Q.3
Stufflebeam, W.4
Bolchini, D.5
Jensen, C.6
-
3
-
-
17744389340
-
A Requirements Taxonomy for Reducing Web Site Privacy Vulnerabilities
-
A.I. Antón and J.B. Earp, "A Requirements Taxonomy for Reducing Web Site Privacy Vulnerabilities," Requirements Eng., vol. 9, no. 3, pp. 169-185, 2004.
-
(2004)
Requirements Eng
, vol.9
, Issue.3
, pp. 169-185
-
-
Antón, A.I.1
Earp, J.B.2
-
4
-
-
0242624597
-
From Privacy Promises to Privacy Management: A New Approach for Enforcing Privacy throughout the Enterprise
-
P. Ashley, C. Powers, and M. Schunter, "From Privacy Promises to Privacy Management: A New Approach for Enforcing Privacy throughout the Enterprise," Proc. 10th New Security Paradigms Workshop, pp. 43-50, 2002.
-
(2002)
Proc. 10th New Security Paradigms Workshop
, pp. 43-50
-
-
Ashley, P.1
Powers, C.2
Schunter, M.3
-
5
-
-
0037703469
-
E-P3P Privacy Policies and Privacy Authorization
-
P. Ashley, S. Hada, G. Karjoth, and M. Schunter, "E-P3P Privacy Policies and Privacy Authorization," Proc. ACM Workshop Privacy in the Electronic Sec., pp. 103-109, 2002.
-
(2002)
Proc. ACM Workshop Privacy in the Electronic Sec
, pp. 103-109
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Schunter, M.4
-
6
-
-
30644474612
-
Purpose-Based Access Control of Complex Data for Privacy Protection
-
J-W. Byon, E. Bertino, and N. Li, "Purpose-Based Access Control of Complex Data for Privacy Protection," Proc. 10th ACM Symp. Access Control Models and Technologies, pp. 102-110, 2005.
-
(2005)
Proc. 10th ACM Symp. Access Control Models and Technologies
, pp. 102-110
-
-
Byon, J.-W.1
Bertino, E.2
Li, N.3
-
10
-
-
33845392001
-
Enforceability vs. Accountability in Electronic Policies
-
T.D. Breaux, A.I. Antón, C-M. Karat, and J. Karat, "Enforceability vs. Accountability in Electronic Policies," Proc. Seventh IEEE Int'l Workshop Policies for Distributed Systems and Networks, pp. 227-330, 2006.
-
(2006)
Proc. Seventh IEEE Int'l Workshop Policies for Distributed Systems and Networks
, pp. 227-330
-
-
Breaux, T.D.1
Antón, A.I.2
Karat, C.-M.3
Karat, J.4
-
11
-
-
40449097419
-
-
T.D. Breaux and A.I. Antón, Semantic Parameterization: A Conceptual Modeling Process for Domain Descriptions, Technical Report TR-2006-35, Dept. of Computer Science, North Carolina State Univ., Oct. 2006, ACM Trans. Software Eng. Methods, to appear.
-
T.D. Breaux and A.I. Antón, "Semantic Parameterization: A Conceptual Modeling Process for Domain Descriptions," Technical Report TR-2006-35, Dept. of Computer Science, North Carolina State Univ., Oct. 2006, ACM Trans. Software Eng. Methods, to appear.
-
-
-
-
12
-
-
78649899740
-
A Distributed Requirements Management Framework for Compliance and Accountability,
-
Technical Report TR-2006-14, Dept. of Computer Science, North Carolina State Univ, July
-
T.D. Breaux, A.I. Antón, and E.H. Spafford, "A Distributed Requirements Management Framework for Compliance and Accountability," Technical Report TR-2006-14, Dept. of Computer Science, North Carolina State Univ., July 2006.
-
(2006)
-
-
Breaux, T.D.1
Antón, A.I.2
Spafford, E.H.3
-
13
-
-
38149018837
-
Towards Compliance: Extracting Rights and Obligations to Align Requirements with Regulations
-
T.D. Breaux, M.W. Vail, and A.I. Antón, "Towards Compliance: Extracting Rights and Obligations to Align Requirements with Regulations," Proc. 14th IEEE Int'l Conf. Requirements Eng., pp. 49-58, 2006.
-
(2006)
Proc. 14th IEEE Int'l Conf. Requirements Eng
, pp. 49-58
-
-
Breaux, T.D.1
Vail, M.W.2
Antón, A.I.3
-
14
-
-
40449137168
-
Impalpable Constraints: Framing Requirements for Formal Methods,
-
Technical Report TR-2007-6, Dept. of Computer Science, North Carolina State Univ, Feb
-
T.D. Breaux and A.I. Antón, "Impalpable Constraints: Framing Requirements for Formal Methods," Technical Report TR-2007-6, Dept. of Computer Science, North Carolina State Univ., Feb. 2007.
-
(2007)
-
-
Breaux, T.D.1
Antón, A.I.2
-
15
-
-
77953768744
-
Usable Security and Privacy: A Case Study of Developing Privacy Management Tools
-
C. Brodie, C-M. Karat, J. Karat, and J. Feng, "Usable Security and Privacy: A Case Study of Developing Privacy Management Tools," Proc. First Symp. Usable Privacy and Security, pp. 35-43, 2005.
-
(2005)
Proc. First Symp. Usable Privacy and Security
, pp. 35-43
-
-
Brodie, C.1
Karat, C.-M.2
Karat, J.3
Feng, J.4
-
16
-
-
40449095819
-
Health Care
-
Bureau of Labor Statistics, US Dept. of Labor
-
"Health Care," Career Guide to Industries, 2006-2007. Bureau of Labor Statistics, US Dept. of Labor, 2007.
-
(2007)
Career Guide to Industries, 2006-2007
-
-
-
18
-
-
40449083721
-
Choice Point Settles Data Security Breach Charges: To Pay $10 Million in Civil Penalties and $5 Million for Customer Redress
-
Trade Commission
-
C.B. Farrell, "Choice Point Settles Data Security Breach Charges: To Pay $10 Million in Civil Penalties and $5 Million for Customer Redress," FTC File 052-3069, Office of Public Affairs, US Fed. Trade Commission, 2006.
-
(2006)
FTC File 052-3069, Office of Public Affairs, US Fed
-
-
Farrell, C.B.1
-
19
-
-
40449109540
-
-
United States v. ChoicePoint, Inc, Case 1:06-CV-00198-JTC, Northern District of Georgia, Feb. 2006
-
United States v. ChoicePoint, Inc., Case 1:06-CV-00198-JTC, (Northern District of Georgia), Feb. 2006.
-
-
-
-
20
-
-
0003706051
-
-
B.A. Garner, ed, eighth ed
-
Black's Law Dictionary, B.A. Garner, ed., eighth ed., 2004.
-
(2004)
Black's Law Dictionary
-
-
-
22
-
-
27644537252
-
Proc. 13th IEEE Int'l Conf. Requirements Eng
-
P. Giorgini, F. Massacci, J. Mylopoulos, and N. Zannone, Modeling Security Requirements through Ownership, Permission and Delegation," Proc. 13th IEEE Int'l Conf. Requirements Eng., pp. 167-176, 2005.
-
(2005)
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
25
-
-
33644855528
-
HIPAA Administrative Simplification: Enforcement - Parts 160 and 164
-
US Dept. of Health and Human Services, Feb
-
"HIPAA Administrative Simplification: Enforcement - Parts 160 and 164," Federal Register, US Dept. of Health and Human Services, vol. 71, no. 32, pp. 8389-8433, Feb. 2006.
-
(2006)
Federal Register
, vol.71
, Issue.32
, pp. 8389-8433
-
-
-
26
-
-
17044394776
-
The Effect of Trust Assumptions on the Elaboration of Security Requirements
-
C.B. Haley, R.C. Laney, J.D. Moffett, and B. Nuseibeh, "The Effect of Trust Assumptions on the Elaboration of Security Requirements," Proc. 12th IEEE Int'l Conf. Requirements Eng., pp. 102-111, 2004.
-
(2004)
Proc. 12th IEEE Int'l Conf. Requirements Eng
, pp. 102-111
-
-
Haley, C.B.1
Laney, R.C.2
Moffett, J.D.3
Nuseibeh, B.4
-
27
-
-
5744229775
-
Deriving Security Requirements from Crosscutting Threat Descriptions
-
C.B. Haley, R. Laney, and B. Nuseibeh, "Deriving Security Requirements from Crosscutting Threat Descriptions," Proc. Third Int'l Conf. Aspect-Oriented Software Development, pp. 112-121, 2004.
-
(2004)
Proc. Third Int'l Conf. Aspect-Oriented Software Development
, pp. 112-121
-
-
Haley, C.B.1
Laney, R.2
Nuseibeh, B.3
-
28
-
-
34548557819
-
Arguing Security: Validating Security Requirements Using Structured Argumentation
-
C.B. Haley, J.D. Moffett, R. Laney, and B. Nuseibeh, "Arguing Security: Validating Security Requirements Using Structured Argumentation," Proc. Third Symp. Requirements Eng. for Information Security, 2005.
-
(2005)
Proc. Third Symp. Requirements Eng. for Information Security
-
-
Haley, C.B.1
Moffett, J.D.2
Laney, R.3
Nuseibeh, B.4
-
30
-
-
0037456032
-
Standards for Privacy of Individually Identifiable Health Information - Part 164, Subpart E
-
US Dept. of Health and Human Services, Feb
-
"Standards for Privacy of Individually Identifiable Health Information - Part 164, Subpart E," Federal Register, US Dept. of Health and Human Services, vol. 68, no. 34, pp. 8334-8381, Feb. 2003.
-
(2003)
Federal Register
, vol.68
, Issue.34
, pp. 8334-8381
-
-
-
31
-
-
0037456032
-
Standards for the Protection of Electronic Protected Health Information - Part 164, Subpart C
-
US Dept. of Health and Human Services, Feb
-
"Standards for the Protection of Electronic Protected Health Information - Part 164, Subpart C," Federal Register, US Dept. of Health and Human Services, vol. 68, no. 34, pp. 8334-8381, Feb. 2003.
-
(2003)
Federal Register
, vol.68
, Issue.34
, pp. 8334-8381
-
-
-
32
-
-
4544255381
-
Elaborating Security Requirements by Construction of Intentional Anti-Models
-
A. van Lamsweerde, "Elaborating Security Requirements by Construction of Intentional Anti-Models," Proc. 26th IEEE Int'l Conf. Software Eng., pp. 148-157, 2004.
-
(2004)
Proc. 26th IEEE Int'l Conf. Software Eng
, pp. 148-157
-
-
van Lamsweerde, A.1
-
33
-
-
84953384559
-
Building Problem Domain Ontology from Security Requirements in Regulatory Documents
-
S-W. Lee, R. Gandhi, D. Muthurajan, D. Yavagal, and G-J. Ahn, "Building Problem Domain Ontology from Security Requirements in Regulatory Documents," Proc. Second Int'l Workshop Software Eng. for Secure Systems, pp. 43-50, 2006.
-
(2006)
Proc. Second Int'l Workshop Software Eng. for Secure Systems
, pp. 43-50
-
-
Lee, S.-W.1
Gandhi, R.2
Muthurajan, D.3
Yavagal, D.4
Ahn, G.-J.5
-
34
-
-
84942929509
-
Introducing Abuse Frames for Analyzing Security Requirements
-
L. Lin, B. Nuseibeh, D. Ince, M. Jackson, and J. Moffett, "Introducing Abuse Frames for Analyzing Security Requirements," Proc. 11th IEEE Int'l Conf. Requirements Eng., pp. 371-372, 2003.
-
(2003)
Proc. 11th IEEE Int'l Conf. Requirements Eng
, pp. 371-372
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.5
-
35
-
-
33947620690
-
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
-
M.J. May, C.A. Gunter, and I. Lee, "Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies," Proc. 19th IEEE Computer Security Foundations Workshop, pp. 85-97, 2006.
-
(2006)
Proc. 19th IEEE Computer Security Foundations Workshop
, pp. 85-97
-
-
May, M.J.1
Gunter, C.A.2
Lee, I.3
-
36
-
-
0010920417
-
From Object-Oriented to Goal-Oriented Requirements Analysis
-
J. Mylopoulos, L. Chung, and E. Yu, "From Object-Oriented to Goal-Oriented Requirements Analysis," Comm. ACM, vol. 42, no. 1, pp. 31-37, 1999.
-
(1999)
Comm. ACM
, vol.42
, Issue.1
, pp. 31-37
-
-
Mylopoulos, J.1
Chung, L.2
Yu, E.3
-
37
-
-
0002265410
-
The Platform for Privacy Preferences
-
J. Reagle and L.F. Cranor, "The Platform for Privacy Preferences," Comm. ACM, vol. 42, no. 2, pp. 48-55, 1999.
-
(1999)
Comm. ACM
, vol.42
, Issue.2
, pp. 48-55
-
-
Reagle, J.1
Cranor, L.F.2
-
38
-
-
84964853055
-
Access Control: Policies, Models and Mechanisms
-
P. Samarati and S. de Capitani di Vimercati, "Access Control: Policies, Models and Mechanisms," Foundations of Security Analysis and Design vol. 2171, pp. 137-193, 2001.
-
(2001)
Foundations of Security Analysis and Design
, vol.2171
, pp. 137-193
-
-
Samarati, P.1
de Capitani di Vimercati, S.2
-
39
-
-
0030086382
-
Role-Based Access Control Models
-
Feb
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, "Role-Based Access Control Models," Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
40
-
-
85088205260
-
Requirements Traceability to Support Evolution of Access Control
-
T. Verhannenman, F. Piessens, B. de Win, and W. Joosen, "Requirements Traceability to Support Evolution of Access Control," Proc. First Workshop Software Eng. for Secure Systems, pp. 1-7, 2005.
-
(2005)
Proc. First Workshop Software Eng. for Secure Systems
, pp. 1-7
-
-
Verhannenman, T.1
Piessens, F.2
de Win, B.3
Joosen, W.4
-
41
-
-
34247501334
-
-
D. Xu, V. Goel, and K. Nygard, An Aspect-Oriented Approach to Security Requirements Analysis, Proc. 30th Ann. Int'l Computer Software and Applications Conf, pp. 79-82, 2006
-
D. Xu, V. Goel, and K. Nygard, "An Aspect-Oriented Approach to Security Requirements Analysis," Proc. 30th Ann. Int'l Computer Software and Applications Conf., pp. 79-82, 2006.
-
-
-
-
42
-
-
0030834984
-
The Four Dark Corner's of Requirements Engineering
-
P. Zave and M. Jackson, "The Four Dark Corner's of Requirements Engineering," ACM Trans. Software Eng. Methods, vol. 6, no. 1, pp. 1-30, 1997.
-
(1997)
ACM Trans. Software Eng. Methods
, vol.6
, Issue.1
, pp. 1-30
-
-
Zave, P.1
Jackson, M.2
-
43
-
-
40449087817
-
Overkill or Overdue?, Hearing before the Special Committee on Aging, US Senate
-
HIPAA Medical Privacy and Transition Rules:, 108th Congress, 23 Sept
-
HIPAA Medical Privacy and Transition Rules: Overkill or Overdue?, Hearing before the Special Committee on Aging, US Senate, 108th Congress, Ser. 108-23, 23 Sept. 2003.
-
(2003)
Ser
, vol.108 -23
-
-
-
44
-
-
40449097420
-
-
Extensible Access Control Markup Language (XACML) Version 2.0, Oasis Standards Group, Feb. 2005
-
Extensible Access Control Markup Language (XACML) Version 2.0, Oasis Standards Group, Feb. 2005.
-
-
-
|