-
1
-
-
0027963890
-
Privacy and computing: A cultural perspective. Security and control of information technology
-
In: Sizer R (ed) Elsevier, North Holland
-
Lunheim R, Sindre GS (1994) Privacy and computing: A cultural perspective. Security and control of information technology. In: Sizer R (ed) A Society (A-43)/x. Elsevier, North Holland, pp 25-40
-
(1994)
A Society (A-43)/x
, pp. 25-40
-
-
Lunheim, R.1
Sindre, G.S.2
-
2
-
-
33644968219
-
IT-security and privacy, design and use of privacy enhancing security mechanisms
-
Springer, Berlin
-
Fischer-Hübner S (2001) IT-security and privacy, design and use of privacy enhancing security mechanisms. Lect Notes Comp Sci, vol. 1958. Springer, Berlin
-
(2001)
Lect Notes Comp Sci
, vol.1958
-
-
Fischer-Hübner, S.1
-
4
-
-
50949105593
-
Privacy Enhancing Technologies, White paper for Decision Makers
-
Ministry of the Interior and Kingdom Relations, the Netherlands, December
-
Koorn R, van Gils H, ter Hart J, Overbeek P, Tellegen R Privacy Enhancing Technologies, White paper for Decision Makers. Ministry of the Interior and Kingdom Relations, the Netherlands, December 2004
-
(2004)
-
-
Koorn, R.1
van Gils, H.2
ter Hart, J.3
Overbeek, P.4
Tellegen, R.5
-
5
-
-
50949114494
-
University of the Aegean, E-Vote: An Internet-based electronic voting system
-
University of the Aegean, Project Deliverable D 7.6, IST Programme 2000#29518, 21 October 2003, Samos
-
University of the Aegean, E-Vote: An Internet-based electronic voting system. University of the Aegean, Project Deliverable D 7.6, IST Programme 2000#29518, 21 October 2003, Samos
-
-
-
-
6
-
-
84992927367
-
Protecting privacy in system design: The electronic voting case
-
doi: 10.1108/17506160710839150
-
Kavakli E, Gritzalis S, Kalloniatis C (2007) Protecting privacy in system design: The electronic voting case. Transf Gov People Process Policy 1(4):307-332. doi: 10.1108/17506160710839150
-
(2007)
Transf Gov People Process Policy
, vol.1
, Issue.4
, pp. 307-332
-
-
Kavakli, E.1
Gritzalis, S.2
Kalloniatis, C.3
-
7
-
-
33646358507
-
"Incorporating Privacy Requirements into the System Design Process: The PriS Conceptual Framework". Internet research, special issue on privacy and anonymity in the digital era: Theory
-
Kavakli E, Kalloniatis C, Loucopoulos P, Gritzalis S (2006) "Incorporating Privacy Requirements into the System Design Process: The PriS Conceptual Framework", Internet research, special issue on privacy and anonymity in the digital era: Theory. Technol Pract 16(2):140-158
-
(2006)
Technol Pract
, vol.16
, Issue.2
, pp. 140-158
-
-
Kavakli, E.1
Kalloniatis, C.2
Loucopoulos, P.3
Gritzalis, S.4
-
8
-
-
33846969170
-
Dealing with privacy issues during the system design process
-
18-21 December 2005, Athens, Greece
-
Kalloniats C, Kavakli E, Gritzalis S (2005) Dealing with privacy issues during the system design process, 5th IEEE International Symposium on Signal Processing and Information Technology, 18-21 December 2005, Athens, Greece
-
(2005)
5th IEEE International Symposium on Signal Processing and Information Technology
-
-
Kalloniats, C.1
Kavakli, E.2
Gritzalis, S.3
-
9
-
-
33644508508
-
Enterprise knowledge management and conceptual modelling
-
Springer, Berlin
-
Loucopoulos P, Kavakli V (1999) Enterprise knowledge management and conceptual modelling. LNCS, vol. 1565. Springer, Berlin, pp 123-143
-
(1999)
LNCS
, vol.1565
, pp. 123-143
-
-
Loucopoulos, P.1
Kavakli, V.2
-
11
-
-
34548145633
-
Using privacy process patterns for incorporating privacy requirements into the system design process
-
April 2007, Vienna, Austria
-
Kalloniatis C, Kavakli E, Gritzalis S (2007) Using privacy process patterns for incorporating privacy requirements into the system design process, Workshop on Secure Software Engineering (SecSe 2007) in conjunction with the International Conference on Availability, Reliability and Security (ARES 2007), April 2007, Vienna, Austria
-
(2007)
Workshop on Secure Software Engineering (SecSe 2007) in Conjunction With the International Conference on Availability, Reliability and Security (ARES 2007)
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
12
-
-
2342613982
-
Goal oriented requirements engineering: A unifying framework
-
Springer, London
-
Kavakli V (2002) Goal oriented requirements engineering: A unifying framework. Req Eng J 6(4):237-251. Springer, London
-
(2002)
Req Eng J
, vol.6
, Issue.4
, pp. 237-251
-
-
Kavakli, V.1
-
13
-
-
34548151550
-
-
META Group Report v1.1 March 2005
-
META Group Report v1.1 (2005) Privacy Enhancing Technology. March 2005
-
(2005)
Privacy Enhancing Technology
-
-
-
14
-
-
50949130621
-
-
Code of Fair Information Practices (The) US Department of Health, Education and Welfare
-
Code of Fair Information Practices (The) (1973), US Department of Health, Education and Welfare
-
(1973)
-
-
-
16
-
-
0026883734
-
Representing and using non-functional requirements: A process oriented approach
-
doi: 10.1109/32.142871
-
Mylopoulos J, Chung L, Nixon B (1992) Representing and using non-functional requirements: A process oriented approach. IEEE Trans Softw Eng 18:483-497. doi: 10.1109/32.142871
-
(1992)
IEEE Trans Softw Eng
, vol.18
, pp. 483-497
-
-
Mylopoulos, J.1
Chung, L.2
Nixon, B.3
-
17
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
Monterey Bay, California, USA
-
Liu L, Yu E, Mylopoulos J (2003) Security and privacy requirements analysis within a social setting, 11th IEEE International Requirements Engineering Conference (RE'03), Monterey Bay, California, USA, pp 151-161
-
(2003)
11th IEEE International Requirements Engineering Conference (RE'03)
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
18
-
-
8344270973
-
An ontology for modelling security: The Tropos project
-
UK, University of Oxford, Palade V, Howlett RJ, Jain L (eds) Lecture Notes in Artificial Intelligence 2773, Springer 2003
-
Mouratidis H, Giorgini P, Manson G (2003) An ontology for modelling security: The Tropos project, Proceedings of the KES 2003 Invited Session Ontology and Multi-Agent Systems Design (OMASD'03), UK, University of Oxford, Palade V, Howlett RJ, Jain L (eds) Lecture Notes in Artificial Intelligence 2773, Springer 2003, pp 1387-1394
-
(2003)
Proceedings of the KES 2003 Invited Session Ontology and Multi-Agent Systems Design (OMASD'03)
, pp. 1387-1394
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
19
-
-
35048845022
-
Integrating Security and Systems Engineering: Towards the modelling of secure information systems
-
Springer, Berlin
-
Mouratidis H, Giorgini P, Manson G (2003) Integrating Security and Systems Engineering: Towards the modelling of secure information systems, CAiSE '03, LNCS 2681. Springer, Berlin, pp 63-78
-
(2003)
CAiSE '03, LNCS 2681
, pp. 63-78
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
20
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
doi: 10.1109/32.879820
-
van Lamsweerde A, Letier E (2000) Handling obstacles in goal-oriented requirements engineering. IEEE Trans Softw Eng 26:978-1005. doi: 10.1109/ 32.879820
-
(2000)
IEEE Trans Softw Eng
, vol.26
, pp. 978-1005
-
-
van Lamsweerde, A.1
Letier, E.2
-
21
-
-
1142293423
-
-
e-proceedings available at Raleigh, North Carolina
-
Liu L, Yu E, Mylopoulos J (2002) Analyzing security requirements as relationships among strategic actors, (SREIS'02), e-proceedings available at http://www.sreis.org/old/2002/finalpaper9.pdf, Raleigh, North Carolina
-
(2002)
Analyzing Security Requirements As Relationships Among Strategic Actors, (SREIS'02)
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
24
-
-
0029707819
-
Goal-based requirements analysis
-
Colorado, USA
-
Antón IA (1996) Goal-based requirements analysis, ICRE '96 IEEE Colorado Springs, Colorado, USA, pp 136-144
-
(1996)
ICRE '96 IEEE Colorado Springs
, pp. 136-144
-
-
Antón, I.A.1
-
25
-
-
77950545414
-
Strategies for developing policies and requirements for secure electronic commerce systems
-
1-4 November 2000, unnumbered pages
-
Antón IA, Earp BJ (2000) Strategies for developing policies and requirements for secure electronic commerce systems. 1st ACM Workshop on Security and Privacy in E-Commerce (CCS 2000), 1-4 November 2000, unnumbered pages
-
(2000)
1st ACM Workshop on Security and Privacy in E-Commerce (CCS 2000)
-
-
Antón, I.A.1
Earp, B.J.2
-
27
-
-
33646346559
-
-
Designing Interactive Systems, Boston MA
-
Hong JI, Ng J, Lederer S, Landay JA (2004) Privacy risk models for designing privacy-sensitive ubiquitous computing systems, Designing Interactive Systems, Boston MA
-
(2004)
Privacy Risk Models for Designing Privacy-sensitive Ubiquitous Computing Systems
-
-
Hong, J.I.1
Ng, J.2
Lederer, S.3
Landay, J.A.4
-
29
-
-
50949118008
-
-
Anonymizer, available at
-
Anonymizer, available at www.anonymizer.com
-
-
-
-
30
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
doi: 10.1145/290163.290168
-
Reiter KM, Rubin DA (1998) Crowds: Anonymity for web transactions. ACM Trans Inf Syst Secur 1(1):66-92. doi: 10.1145/290163.290168
-
(1998)
ACM Trans Inf Syst Secur
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, K.M.1
Rubin, D.A.2
-
31
-
-
0001777423
-
Anonymous web transactions with crowds
-
doi: 10.1145/293411.293778
-
Reiter KM, Rubin DA (1999) Anonymous web transactions with crowds. Commun ACM 42(2):32-38. doi: 10.1145/293411.293778
-
(1999)
Commun ACM
, vol.42
, Issue.2
, pp. 32-38
-
-
Reiter, K.M.1
Rubin, D.A.2
-
32
-
-
0032074579
-
Anonymous connections and Onion Routing
-
doi: 10.1109/49.668972
-
Reed M, Syverson P, Goldschlag D (1998) Anonymous connections and Onion Routing. IEEE J Sel Areas Comm 16(4):482-494. doi: 10.1109/49.668972
-
(1998)
IEEE J Sel Areas Comm
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
33
-
-
0005063385
-
Onion Routing for anonymous and private Internet connections
-
doi: 10.1145/293411.293443
-
Goldschlag D, Syverson P, Reed M (1999) Onion Routing for anonymous and private Internet connections. Commun ACM 42(2):39-41. doi: 10.1145/ 293411.293443
-
(1999)
Commun ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Syverson, P.2
Reed, M.3
-
34
-
-
0022145479
-
Security without identification: Transactions systems to make Big Brother Obsolete
-
doi: 10.1145/4372.4373
-
Chaum D (1985) Security without identification: Transactions systems to make Big Brother Obsolete. Commun ACM 28(10):1030-1044. doi: 10.1145/ 4372.4373
-
(1985)
Commun ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
35
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
doi: 10.1007/BF00206326
-
Chaum D (1988) The dining cryptographers problem: Unconditional sender and recipient untraceability. J Cryptol 1(1):65-75. doi: 10.1007/ BF00206326
-
(1988)
J Cryptol
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
36
-
-
0019532104
-
untraceable electronic mail, return addresses, and digital pseudonyms
-
doi: 10.1145/358549.358563
-
Chaum D (1981) untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84-88. doi: 10.1145/358549.358563
-
(1981)
Commun ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
37
-
-
0023331864
-
Networks without user Observability
-
Pfitzmann A, Waidner M (1987) Networks without user Observability. Comput Secur 6(2):158-166
-
(1987)
Comput Secur
, vol.6
, Issue.2
, pp. 158-166
-
-
Pfitzmann, A.1
Waidner, M.2
-
40
-
-
85084161366
-
The second-generator Onion Router
-
San Diego, CA, USA
-
Dingledine R, Mathewson N, Syverson PT (2004) The second-generator Onion Router. Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.T.3
-
44
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
doi: 10.1007/s00766-004-0194-4
-
Sindre G, Opdahl AL (2005) Eliciting security requirements with misuse cases. Requir Eng 10(1):34-44. doi: 10.1007/s00766-004-0194-4
-
(2005)
Requir Eng
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
45
-
-
13644265503
-
Templates for misuse case description
-
In: Camille BA, et al (eds) Essener Informatik BeitrÃge, University of Essen, Germany
-
Sindre G, Opdahl AL (2002) Templates for misuse case description. In: Proceedings of the Seventh International Workshop on Requirements Engineering: Foundations for Software Quality - REFSQ'2001, Camille BA, et al (eds) Essener Informatik BeitrÃge, University of Essen, Germany, pp 125-136
-
(2002)
Proceedings of the Seventh International Workshop on Requirements Engineering: Foundations for Software Quality - REFSQ'2001
, pp. 125-136
-
-
Sindre, G.1
Opdahl, A.L.2
-
46
-
-
0037299044
-
Use/misuse case analysis elicits non-functional requirements
-
doi: 10.1049/cce:20030108
-
Alexander I (2003) Use/misuse case analysis elicits non-functional requirements. Comput Contr Eng J 14(1):40-45. doi: 10.1049/cce:20030108
-
(2003)
Comput Contr Eng J
, vol.14
, Issue.1
, pp. 40-45
-
-
Alexander, I.1
-
47
-
-
2942713443
-
Security use cases
-
Firesmith D (2003) Security use cases. J Object Technol 2(1):53-64
-
(2003)
J Object Technol
, vol.2
, Issue.1
, pp. 53-64
-
-
Firesmith, D.1
-
48
-
-
84942929509
-
Introducing abuse frames for analysing security requirements
-
8-12 September 2003, Monterey Bay, CA, USA. IEEE Computer Society 2003
-
Lin L, Nuseibeh B, Ince D, Jackson M, Moffett JD (2003) Introducing abuse frames for analysing security requirements. Requirements Engineering 2003, 11th IEEE International Conference on Requirements Engineering (RE 2003), 8-12 September 2003, Monterey Bay, CA, USA. IEEE Computer Society 2003, pp 371-372
-
(2003)
Requirements Engineering 2003, 11th IEEE International Conference on Requirements Engineering (RE 2003)
, pp. 371-372
-
-
Lin, L.1
Nuseibeh, B.2
Ince, D.3
Jackson, M.4
Moffett, J.D.5
-
49
-
-
0003367268
-
European Parliament and the Council: Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and of the free movement of such data
-
October
-
European Parliament and the Council: Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and of the free movement of such data. October 1995
-
(1995)
-
-
|