메뉴 건너뛰기




Volumn 13, Issue 3, 2008, Pages 241-255

Addressing privacy requirements in system design: The PriS method

Author keywords

Formal methods; Goal oriented approach; Privacy enhancing technologies; Privacy requirements; Privacy process patterns; Requirements engineering; System design

Indexed keywords

COMPUTER NETWORKS; DECENTRALIZED CONTROL; SOFTWARE ENGINEERING;

EID: 50949085110     PISSN: 09473602     EISSN: 1432010X     Source Type: Journal    
DOI: 10.1007/s00766-008-0067-3     Document Type: Article
Times cited : (235)

References (49)
  • 1
    • 0027963890 scopus 로고
    • Privacy and computing: A cultural perspective. Security and control of information technology
    • In: Sizer R (ed) Elsevier, North Holland
    • Lunheim R, Sindre GS (1994) Privacy and computing: A cultural perspective. Security and control of information technology. In: Sizer R (ed) A Society (A-43)/x. Elsevier, North Holland, pp 25-40
    • (1994) A Society (A-43)/x , pp. 25-40
    • Lunheim, R.1    Sindre, G.S.2
  • 2
    • 33644968219 scopus 로고    scopus 로고
    • IT-security and privacy, design and use of privacy enhancing security mechanisms
    • Springer, Berlin
    • Fischer-Hübner S (2001) IT-security and privacy, design and use of privacy enhancing security mechanisms. Lect Notes Comp Sci, vol. 1958. Springer, Berlin
    • (2001) Lect Notes Comp Sci , vol.1958
    • Fischer-Hübner, S.1
  • 4
    • 50949105593 scopus 로고    scopus 로고
    • Privacy Enhancing Technologies, White paper for Decision Makers
    • Ministry of the Interior and Kingdom Relations, the Netherlands, December
    • Koorn R, van Gils H, ter Hart J, Overbeek P, Tellegen R Privacy Enhancing Technologies, White paper for Decision Makers. Ministry of the Interior and Kingdom Relations, the Netherlands, December 2004
    • (2004)
    • Koorn, R.1    van Gils, H.2    ter Hart, J.3    Overbeek, P.4    Tellegen, R.5
  • 5
    • 50949114494 scopus 로고    scopus 로고
    • University of the Aegean, E-Vote: An Internet-based electronic voting system
    • University of the Aegean, Project Deliverable D 7.6, IST Programme 2000#29518, 21 October 2003, Samos
    • University of the Aegean, E-Vote: An Internet-based electronic voting system. University of the Aegean, Project Deliverable D 7.6, IST Programme 2000#29518, 21 October 2003, Samos
  • 6
    • 84992927367 scopus 로고    scopus 로고
    • Protecting privacy in system design: The electronic voting case
    • doi: 10.1108/17506160710839150
    • Kavakli E, Gritzalis S, Kalloniatis C (2007) Protecting privacy in system design: The electronic voting case. Transf Gov People Process Policy 1(4):307-332. doi: 10.1108/17506160710839150
    • (2007) Transf Gov People Process Policy , vol.1 , Issue.4 , pp. 307-332
    • Kavakli, E.1    Gritzalis, S.2    Kalloniatis, C.3
  • 7
    • 33646358507 scopus 로고    scopus 로고
    • "Incorporating Privacy Requirements into the System Design Process: The PriS Conceptual Framework". Internet research, special issue on privacy and anonymity in the digital era: Theory
    • Kavakli E, Kalloniatis C, Loucopoulos P, Gritzalis S (2006) "Incorporating Privacy Requirements into the System Design Process: The PriS Conceptual Framework", Internet research, special issue on privacy and anonymity in the digital era: Theory. Technol Pract 16(2):140-158
    • (2006) Technol Pract , vol.16 , Issue.2 , pp. 140-158
    • Kavakli, E.1    Kalloniatis, C.2    Loucopoulos, P.3    Gritzalis, S.4
  • 9
    • 33644508508 scopus 로고    scopus 로고
    • Enterprise knowledge management and conceptual modelling
    • Springer, Berlin
    • Loucopoulos P, Kavakli V (1999) Enterprise knowledge management and conceptual modelling. LNCS, vol. 1565. Springer, Berlin, pp 123-143
    • (1999) LNCS , vol.1565 , pp. 123-143
    • Loucopoulos, P.1    Kavakli, V.2
  • 12
    • 2342613982 scopus 로고    scopus 로고
    • Goal oriented requirements engineering: A unifying framework
    • Springer, London
    • Kavakli V (2002) Goal oriented requirements engineering: A unifying framework. Req Eng J 6(4):237-251. Springer, London
    • (2002) Req Eng J , vol.6 , Issue.4 , pp. 237-251
    • Kavakli, V.1
  • 13
    • 34548151550 scopus 로고    scopus 로고
    • META Group Report v1.1 March 2005
    • META Group Report v1.1 (2005) Privacy Enhancing Technology. March 2005
    • (2005) Privacy Enhancing Technology
  • 14
    • 50949130621 scopus 로고
    • Code of Fair Information Practices (The) US Department of Health, Education and Welfare
    • Code of Fair Information Practices (The) (1973), US Department of Health, Education and Welfare
    • (1973)
  • 16
    • 0026883734 scopus 로고
    • Representing and using non-functional requirements: A process oriented approach
    • doi: 10.1109/32.142871
    • Mylopoulos J, Chung L, Nixon B (1992) Representing and using non-functional requirements: A process oriented approach. IEEE Trans Softw Eng 18:483-497. doi: 10.1109/32.142871
    • (1992) IEEE Trans Softw Eng , vol.18 , pp. 483-497
    • Mylopoulos, J.1    Chung, L.2    Nixon, B.3
  • 18
    • 8344270973 scopus 로고    scopus 로고
    • An ontology for modelling security: The Tropos project
    • UK, University of Oxford, Palade V, Howlett RJ, Jain L (eds) Lecture Notes in Artificial Intelligence 2773, Springer 2003
    • Mouratidis H, Giorgini P, Manson G (2003) An ontology for modelling security: The Tropos project, Proceedings of the KES 2003 Invited Session Ontology and Multi-Agent Systems Design (OMASD'03), UK, University of Oxford, Palade V, Howlett RJ, Jain L (eds) Lecture Notes in Artificial Intelligence 2773, Springer 2003, pp 1387-1394
    • (2003) Proceedings of the KES 2003 Invited Session Ontology and Multi-Agent Systems Design (OMASD'03) , pp. 1387-1394
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 19
    • 35048845022 scopus 로고    scopus 로고
    • Integrating Security and Systems Engineering: Towards the modelling of secure information systems
    • Springer, Berlin
    • Mouratidis H, Giorgini P, Manson G (2003) Integrating Security and Systems Engineering: Towards the modelling of secure information systems, CAiSE '03, LNCS 2681. Springer, Berlin, pp 63-78
    • (2003) CAiSE '03, LNCS 2681 , pp. 63-78
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 20
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • doi: 10.1109/32.879820
    • van Lamsweerde A, Letier E (2000) Handling obstacles in goal-oriented requirements engineering. IEEE Trans Softw Eng 26:978-1005. doi: 10.1109/ 32.879820
    • (2000) IEEE Trans Softw Eng , vol.26 , pp. 978-1005
    • van Lamsweerde, A.1    Letier, E.2
  • 24
    • 0029707819 scopus 로고    scopus 로고
    • Goal-based requirements analysis
    • Colorado, USA
    • Antón IA (1996) Goal-based requirements analysis, ICRE '96 IEEE Colorado Springs, Colorado, USA, pp 136-144
    • (1996) ICRE '96 IEEE Colorado Springs , pp. 136-144
    • Antón, I.A.1
  • 25
    • 77950545414 scopus 로고    scopus 로고
    • Strategies for developing policies and requirements for secure electronic commerce systems
    • 1-4 November 2000, unnumbered pages
    • Antón IA, Earp BJ (2000) Strategies for developing policies and requirements for secure electronic commerce systems. 1st ACM Workshop on Security and Privacy in E-Commerce (CCS 2000), 1-4 November 2000, unnumbered pages
    • (2000) 1st ACM Workshop on Security and Privacy in E-Commerce (CCS 2000)
    • Antón, I.A.1    Earp, B.J.2
  • 29
    • 50949118008 scopus 로고    scopus 로고
    • Anonymizer, available at
    • Anonymizer, available at www.anonymizer.com
  • 30
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity for web transactions
    • doi: 10.1145/290163.290168
    • Reiter KM, Rubin DA (1998) Crowds: Anonymity for web transactions. ACM Trans Inf Syst Secur 1(1):66-92. doi: 10.1145/290163.290168
    • (1998) ACM Trans Inf Syst Secur , vol.1 , Issue.1 , pp. 66-92
    • Reiter, K.M.1    Rubin, D.A.2
  • 31
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous web transactions with crowds
    • doi: 10.1145/293411.293778
    • Reiter KM, Rubin DA (1999) Anonymous web transactions with crowds. Commun ACM 42(2):32-38. doi: 10.1145/293411.293778
    • (1999) Commun ACM , vol.42 , Issue.2 , pp. 32-38
    • Reiter, K.M.1    Rubin, D.A.2
  • 32
    • 0032074579 scopus 로고    scopus 로고
    • Anonymous connections and Onion Routing
    • doi: 10.1109/49.668972
    • Reed M, Syverson P, Goldschlag D (1998) Anonymous connections and Onion Routing. IEEE J Sel Areas Comm 16(4):482-494. doi: 10.1109/49.668972
    • (1998) IEEE J Sel Areas Comm , vol.16 , Issue.4 , pp. 482-494
    • Reed, M.1    Syverson, P.2    Goldschlag, D.3
  • 33
    • 0005063385 scopus 로고    scopus 로고
    • Onion Routing for anonymous and private Internet connections
    • doi: 10.1145/293411.293443
    • Goldschlag D, Syverson P, Reed M (1999) Onion Routing for anonymous and private Internet connections. Commun ACM 42(2):39-41. doi: 10.1145/ 293411.293443
    • (1999) Commun ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Syverson, P.2    Reed, M.3
  • 34
    • 0022145479 scopus 로고
    • Security without identification: Transactions systems to make Big Brother Obsolete
    • doi: 10.1145/4372.4373
    • Chaum D (1985) Security without identification: Transactions systems to make Big Brother Obsolete. Commun ACM 28(10):1030-1044. doi: 10.1145/ 4372.4373
    • (1985) Commun ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 35
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • doi: 10.1007/BF00206326
    • Chaum D (1988) The dining cryptographers problem: Unconditional sender and recipient untraceability. J Cryptol 1(1):65-75. doi: 10.1007/ BF00206326
    • (1988) J Cryptol , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 36
    • 0019532104 scopus 로고
    • untraceable electronic mail, return addresses, and digital pseudonyms
    • doi: 10.1145/358549.358563
    • Chaum D (1981) untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84-88. doi: 10.1145/358549.358563
    • (1981) Commun ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 37
    • 0023331864 scopus 로고
    • Networks without user Observability
    • Pfitzmann A, Waidner M (1987) Networks without user Observability. Comput Secur 6(2):158-166
    • (1987) Comput Secur , vol.6 , Issue.2 , pp. 158-166
    • Pfitzmann, A.1    Waidner, M.2
  • 44
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • doi: 10.1007/s00766-004-0194-4
    • Sindre G, Opdahl AL (2005) Eliciting security requirements with misuse cases. Requir Eng 10(1):34-44. doi: 10.1007/s00766-004-0194-4
    • (2005) Requir Eng , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 46
    • 0037299044 scopus 로고    scopus 로고
    • Use/misuse case analysis elicits non-functional requirements
    • doi: 10.1049/cce:20030108
    • Alexander I (2003) Use/misuse case analysis elicits non-functional requirements. Comput Contr Eng J 14(1):40-45. doi: 10.1049/cce:20030108
    • (2003) Comput Contr Eng J , vol.14 , Issue.1 , pp. 40-45
    • Alexander, I.1
  • 47
    • 2942713443 scopus 로고    scopus 로고
    • Security use cases
    • Firesmith D (2003) Security use cases. J Object Technol 2(1):53-64
    • (2003) J Object Technol , vol.2 , Issue.1 , pp. 53-64
    • Firesmith, D.1
  • 49
    • 0003367268 scopus 로고
    • European Parliament and the Council: Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and of the free movement of such data
    • October
    • European Parliament and the Council: Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and of the free movement of such data. October 1995
    • (1995)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.