메뉴 건너뛰기




Volumn 51, Issue 2, 2009, Pages 337-350

Towards the development of privacy-aware systems

Author keywords

Privacy policy; Privacy Aware Access Control; Privacy related legal requirements; Requirements Engineering

Indexed keywords

ACCESS CONTROL;

EID: 56349121964     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2008.04.004     Document Type: Article
Times cited : (97)

References (121)
  • 2
    • 56349150657 scopus 로고    scopus 로고
    • L.A. Bygrave, Data protection law: approaching its rationale, logic, and limits, Information Law Series, 10, Kluwer Law International, The Hague, 2002.
    • L.A. Bygrave, Data protection law: approaching its rationale, logic, and limits, Information Law Series, 10, Kluwer Law International, The Hague, 2002.
  • 5
    • 56349149277 scopus 로고    scopus 로고
    • A. Adams, The implications of users' multimedia privacy perceptions on communication and information privacy policies, in: Proceedings of Telecommunications Policy Research Conference, 1999.
    • A. Adams, The implications of users' multimedia privacy perceptions on communication and information privacy policies, in: Proceedings of Telecommunications Policy Research Conference, 1999.
  • 6
    • 33847010583 scopus 로고    scopus 로고
    • Breaching the security of the Kaiser Permanente internet patient portal: the organizational foundations of information security
    • Collmann J.R., and Cooper T. Breaching the security of the Kaiser Permanente internet patient portal: the organizational foundations of information security. Journal of the American Medical Informatics Association 14 2 (2007) 239-243
    • (2007) Journal of the American Medical Informatics Association , vol.14 , Issue.2 , pp. 239-243
    • Collmann, J.R.1    Cooper, T.2
  • 7
    • 56349147151 scopus 로고    scopus 로고
    • E. Silverman, Loss of Protected Patient Information Real Danger for Health Care Plans, Manage Care.
    • E. Silverman, Loss of Protected Patient Information Real Danger for Health Care Plans, Manage Care.
  • 8
    • 33947102091 scopus 로고    scopus 로고
    • I. Araujo, Privacy mechanisms supporting the building of trust in e-commerce, in: Proceedings of International Workshop on Privacy Data Management, IEEE Press, 2005, p. 1193.
    • I. Araujo, Privacy mechanisms supporting the building of trust in e-commerce, in: Proceedings of International Workshop on Privacy Data Management, IEEE Press, 2005, p. 1193.
  • 9
    • 56349083034 scopus 로고    scopus 로고
    • L. Cranor, M. Langheinrich, M. Marchiori, J. Reagle, The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, W3C Recommendation (April 2002). Available from: .
    • L. Cranor, M. Langheinrich, M. Marchiori, J. Reagle, The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, W3C Recommendation (April 2002). Available from: .
  • 11
    • 56349125423 scopus 로고    scopus 로고
    • L. Cranor, M. Langheinrich, M. Marchiori, A P3P Preference Exchange Language 1.0 (APPEL1.0), W3C Working Draft, 2002. Available from: .
    • L. Cranor, M. Langheinrich, M. Marchiori, A P3P Preference Exchange Language 1.0 (APPEL1.0), W3C Working Draft, 2002. Available from: .
  • 12
    • 56349099459 scopus 로고    scopus 로고
    • P. Ashley, S. Hada, G. Karjoth, C. Powers, M. Schunter, Enterprise Privacy Authorization Language (EPAL 1.1), Research Report 3485, IBM Research (2003). Available from: .
    • P. Ashley, S. Hada, G. Karjoth, C. Powers, M. Schunter, Enterprise Privacy Authorization Language (EPAL 1.1), Research Report 3485, IBM Research (2003). Available from: .
  • 13
    • 20444460387 scopus 로고    scopus 로고
    • Conflict and combination in privacy policy languages
    • ACM Press
    • Barth A., Mitchell J.C., and Rosenstein J. Conflict and combination in privacy policy languages. Proceedings of WPES'04 (2004), ACM Press 45-46
    • (2004) Proceedings of WPES'04 , pp. 45-46
    • Barth, A.1    Mitchell, J.C.2    Rosenstein, J.3
  • 14
    • 30644474612 scopus 로고    scopus 로고
    • Purpose based access control of complex data for privacy protection
    • ACM Press
    • Byun J.-W., Bertino E., and Li N. Purpose based access control of complex data for privacy protection. Proceedings of SACMAT'05 (2005), ACM Press 102-110
    • (2005) Proceedings of SACMAT'05 , pp. 102-110
    • Byun, J.-W.1    Bertino, E.2    Li, N.3
  • 15
    • 33646071594 scopus 로고    scopus 로고
    • On obligations
    • Proceedings of ESORICS'05, Springer-Verlag
    • Hilty M., Basin D.A., and Pretschner A. On obligations. Proceedings of ESORICS'05. LNCS vol. 3679 (2005), Springer-Verlag 98-117
    • (2005) LNCS , vol.3679 , pp. 98-117
    • Hilty, M.1    Basin, D.A.2    Pretschner, A.3
  • 16
    • 0027805822 scopus 로고
    • Privacy policies and practices: inside the organizational maze
    • Smith H.J. Privacy policies and practices: inside the organizational maze. CACM 36 12 (1993) 104-122
    • (1993) CACM , vol.36 , Issue.12 , pp. 104-122
    • Smith, H.J.1
  • 19
    • 56349171470 scopus 로고    scopus 로고
    • R. Pardolesi (Ed.), Diritto alla riservatezza e circolazione dei dati personali, Giuffrè, 2003.
    • R. Pardolesi (Ed.), Diritto alla riservatezza e circolazione dei dati personali, Giuffrè, 2003.
  • 21
    • 0016555241 scopus 로고    scopus 로고
    • J.H. Saltzer, M.D. Schroeder, The protection of information in computer systems, Proceedings of the IEEE 63 (9) (1975) 1278-1308.
    • J.H. Saltzer, M.D. Schroeder, The protection of information in computer systems, Proceedings of the IEEE 63 (9) (1975) 1278-1308.
  • 22
    • 56349102455 scopus 로고    scopus 로고
    • ISO/IEC, Code of practice for information security management, ISO/IEC 17799:2005, 2005.
    • ISO/IEC, Code of practice for information security management, ISO/IEC 17799:2005, 2005.
  • 23
    • 56349140416 scopus 로고    scopus 로고
    • R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, Hippocratic databases, in: Proceedings of VLDB'02, 2002, pp. 143-154.
    • R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, Hippocratic databases, in: Proceedings of VLDB'02, 2002, pp. 143-154.
  • 24
    • 33750053325 scopus 로고    scopus 로고
    • Privacy-preserving database systems
    • FOSAD 2004/2005, Springer-Verlag
    • Bertino E., Byun J.-W., and Li N. Privacy-preserving database systems. FOSAD 2004/2005. LNCS vol. 3655 (2005), Springer-Verlag 178-206
    • (2005) LNCS , vol.3655 , pp. 178-206
    • Bertino, E.1    Byun, J.-W.2    Li, N.3
  • 25
    • 36049032185 scopus 로고    scopus 로고
    • Hierarchical hippocratic databases with minimal disclosure for virtual organizations
    • Massacci F., Mylopoulos J., and Zannone N. Hierarchical hippocratic databases with minimal disclosure for virtual organizations. VLDBJ 15 4 (2006) 370-387
    • (2006) VLDBJ , vol.15 , Issue.4 , pp. 370-387
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 26
    • 84957805078 scopus 로고    scopus 로고
    • Platform for enterprise privacy practices: privacy-enabled management of customer data
    • Proceedings of PET'02, Springer-Verlag
    • Karjoth G., Schunter M., and Waidner M. Platform for enterprise privacy practices: privacy-enabled management of customer data. Proceedings of PET'02. LNCS vol. 2482 (2002), Springer-Verlag 69-84
    • (2002) LNCS , vol.2482 , pp. 69-84
    • Karjoth, G.1    Schunter, M.2    Waidner, M.3
  • 27
    • 41149174360 scopus 로고    scopus 로고
    • J. Gordijn, M. Petit, R. Wieringa, Understanding business strategies of networked value constellations using goal- and value modeling, in: Proceedings of RE'06, 2006, pp. 126-135.
    • J. Gordijn, M. Petit, R. Wieringa, Understanding business strategies of networked value constellations using goal- and value modeling, in: Proceedings of RE'06, 2006, pp. 126-135.
  • 28
    • 56349113527 scopus 로고    scopus 로고
    • J. Mylopoulos, Aligning information strategy with business strategy - a technical perspective, in: Proceedings of NGITS'93, 1993.
    • J. Mylopoulos, Aligning information strategy with business strategy - a technical perspective, in: Proceedings of NGITS'93, 1993.
  • 29
    • 34249110788 scopus 로고    scopus 로고
    • From hippocratic databases to Secure Tropos: a computer-aided re-engineering approach
    • Massacci F., Mylopoulos J., and Zannone N. From hippocratic databases to Secure Tropos: a computer-aided re-engineering approach. IJSEKE 17 2 (2007) 265-284
    • (2007) IJSEKE , vol.17 , Issue.2 , pp. 265-284
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 30
    • 56349136983 scopus 로고    scopus 로고
    • R. Clarke, e-Consent: a critical element of trust in e-Business, in: Proceedings of the 15th Bled Electronic Commerce Conference, 2002.
    • R. Clarke, e-Consent: a critical element of trust in e-Business, in: Proceedings of the 15th Bled Electronic Commerce Conference, 2002.
  • 31
    • 84924413055 scopus 로고    scopus 로고
    • Security and trust requirements engineering
    • FOSAD 2004/2005, Springer-Verlag
    • Giorgini P., Massacci F., and Zannone N. Security and trust requirements engineering. FOSAD 2004/2005. LNCS vol. 3655 (2005), Springer-Verlag 237-272
    • (2005) LNCS , vol.3655 , pp. 237-272
    • Giorgini, P.1    Massacci, F.2    Zannone, N.3
  • 32
    • 54649085180 scopus 로고    scopus 로고
    • Practical delegation for secure distributed object environments
    • Nagaratnam N., and Lea D. Practical delegation for secure distributed object environments. Distributed Systems Engineering 5 4 (1998) 168-178
    • (1998) Distributed Systems Engineering , vol.5 , Issue.4 , pp. 168-178
    • Nagaratnam, N.1    Lea, D.2
  • 33
    • 77953570949 scopus 로고    scopus 로고
    • A delegation framework for federated identity management
    • ACM Press
    • Gomi H., Hatakeyama M., Hosono S., and Fujita S. A delegation framework for federated identity management. Proceedings of DIM'05 (2005), ACM Press 94-103
    • (2005) Proceedings of DIM'05 , pp. 94-103
    • Gomi, H.1    Hatakeyama, M.2    Hosono, S.3    Fujita, S.4
  • 34
    • 0030732547 scopus 로고    scopus 로고
    • An extended authorization model for relational databases
    • Bertino E., Samarati P., and Jajodia S. An extended authorization model for relational databases. TKDE 9 1 (1997) 85-101
    • (1997) TKDE , vol.9 , Issue.1 , pp. 85-101
    • Bertino, E.1    Samarati, P.2    Jajodia, S.3
  • 35
    • 0345673615 scopus 로고    scopus 로고
    • Revocation schemes for delegated authorities
    • IEEE Press
    • Firozabadi B.S., and Sergot M.J. Revocation schemes for delegated authorities. Proceedings of POLICY'02 (2002), IEEE Press 210-213
    • (2002) Proceedings of POLICY'02 , pp. 210-213
    • Firozabadi, B.S.1    Sergot, M.J.2
  • 36
    • 20444492231 scopus 로고    scopus 로고
    • Removing permissions in the flexible authorization framework
    • Wijesekera D., Jajodia S., Parisi-Presicce F., and Hagström Å. Removing permissions in the flexible authorization framework. TODS 28 3 (2003) 209-229
    • (2003) TODS , vol.28 , Issue.3 , pp. 209-229
    • Wijesekera, D.1    Jajodia, S.2    Parisi-Presicce, F.3    Hagström, Å.4
  • 37
    • 3042684910 scopus 로고    scopus 로고
    • A rule-based framework for role-based delegation and revocation
    • Zhang L., Ahn G.-J., and Chu B.-T. A rule-based framework for role-based delegation and revocation. TISSEC 6 3 (2003) 404-441
    • (2003) TISSEC , vol.6 , Issue.3 , pp. 404-441
    • Zhang, L.1    Ahn, G.-J.2    Chu, B.-T.3
  • 38
    • 33645797144 scopus 로고    scopus 로고
    • Tradeoffs in certificate revocation schemes
    • Zheng P. Tradeoffs in certificate revocation schemes. ACM SIGCOMM Computer Communication Review 33 2 (2003) 103-112
    • (2003) ACM SIGCOMM Computer Communication Review , vol.33 , Issue.2 , pp. 103-112
    • Zheng, P.1
  • 39
  • 40
    • 21344463743 scopus 로고
    • Personal information contracts: how to protect privacy without violating the first amendment
    • Shorr S. Personal information contracts: how to protect privacy without violating the first amendment. Cornell Law Review 80 (1995) 1756-1793
    • (1995) Cornell Law Review , vol.80 , pp. 1756-1793
    • Shorr, S.1
  • 41
    • 84944048132 scopus 로고    scopus 로고
    • The Ponder policy specification language
    • Proceedings of POLICY'01, Springer-Verlag
    • Damianou N., Dulay N., Lupu E., and Sloman M. The Ponder policy specification language. Proceedings of POLICY'01. LNCS vol. 1995 (2001), Springer-Verlag 18-39
    • (2001) LNCS , vol.1995 , pp. 18-39
    • Damianou, N.1    Dulay, N.2    Lupu, E.3    Sloman, M.4
  • 43
    • 56349111674 scopus 로고    scopus 로고
    • C. Bettini, S. Jajodia, X.S. Wang, D. Wijesekera, Provisions and obligations in policy management and security applications, in: Proceedings of VLDB'02, 2002, pp. 502-513.
    • C. Bettini, S. Jajodia, X.S. Wang, D. Wijesekera, Provisions and obligations in policy management and security applications, in: Proceedings of VLDB'02, 2002, pp. 502-513.
  • 44
    • 56349105346 scopus 로고    scopus 로고
    • OASIS, eXtensible Access Control Markup Language (XACML) Version 2.0, OASIS Standard, 2005. Available from: .
    • OASIS, eXtensible Access Control Markup Language (XACML) Version 2.0, OASIS Standard, 2005. Available from: .
  • 47
    • 3142523603 scopus 로고    scopus 로고
    • The UCONABC usage control model
    • Park J., and Sandhu R. The UCONABC usage control model. TISSEC 7 1 (2004) 128-174
    • (2004) TISSEC , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.2
  • 48
    • 0030087035 scopus 로고    scopus 로고
    • A temporal access control mechanism for database systems
    • Bertino E., Bettini C., Ferrari E., and Samarati P. A temporal access control mechanism for database systems. TKDE 8 1 (1996) 67-80
    • (1996) TKDE , vol.8 , Issue.1 , pp. 67-80
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 49
    • 0032153903 scopus 로고    scopus 로고
    • An access control model supporting periodicity constraints and temporal reasoning
    • Bertino E., Bettini C., Ferrari E., and Samarati P. An access control model supporting periodicity constraints and temporal reasoning. TODS 23 3 (1998) 231-285
    • (1998) TODS , vol.23 , Issue.3 , pp. 231-285
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 50
    • 84944792110 scopus 로고    scopus 로고
    • TRBAC: a temporal role-based access control model
    • Bertino E., Bonatti P.A., and Ferrari E. TRBAC: a temporal role-based access control model. TISSEC 4 3 (2001) 191-233
    • (2001) TISSEC , vol.4 , Issue.3 , pp. 191-233
    • Bertino, E.1    Bonatti, P.A.2    Ferrari, E.3
  • 51
    • 4243980729 scopus 로고    scopus 로고
    • Strategies for developing policies and requirements for secure E-Commerce systems
    • Kluwer Academic Publishers
    • Antón A.I., and Earp J.B. Strategies for developing policies and requirements for secure E-Commerce systems. E-Commerce Security and Privacy (2001), Kluwer Academic Publishers 29-46
    • (2001) E-Commerce Security and Privacy , pp. 29-46
    • Antón, A.I.1    Earp, J.B.2
  • 52
    • 56349153831 scopus 로고    scopus 로고
    • Q. He, A.I. Antón, A framework for modeling privacy requirements in role engineering, in: Proceedings of REFSQ'03, 2003, pp. 137-146.
    • Q. He, A.I. Antón, A framework for modeling privacy requirements in role engineering, in: Proceedings of REFSQ'03, 2003, pp. 137-146.
  • 53
    • 33749667617 scopus 로고    scopus 로고
    • F. Massacci, N. Zannone, Privacy is linking permission to purpose, in: Proceedings of the 12th International Workshop on Security Protocols, vol. 3957, LNCS, Springer-Verlag, 2004, pp. 179-191.
    • F. Massacci, N. Zannone, Privacy is linking permission to purpose, in: Proceedings of the 12th International Workshop on Security Protocols, vol. 3957, LNCS, Springer-Verlag, 2004, pp. 179-191.
  • 55
    • 33644969758 scopus 로고    scopus 로고
    • S. Dritsas, D. Gritzalis, C. Lambrinoudakis, Protecting privacy and anonymity in pervasive computing: trends and perspectives, Telematics and Informatics 23 (2).
    • S. Dritsas, D. Gritzalis, C. Lambrinoudakis, Protecting privacy and anonymity in pervasive computing: trends and perspectives, Telematics and Informatics 23 (2).
  • 56
    • 56349130411 scopus 로고    scopus 로고
    • U. Jendricke, M. Kreutzer, A. Zugenmaier, Pervasive privacy with identity management, in: Proceedings of UbiComp'02, 2002.
    • U. Jendricke, M. Kreutzer, A. Zugenmaier, Pervasive privacy with identity management, in: Proceedings of UbiComp'02, 2002.
  • 59
    • 56349104884 scopus 로고    scopus 로고
    • US Federal Trade Commission, Privacy Online: A Report to Congress (1998). Available from: .
    • US Federal Trade Commission, Privacy Online: A Report to Congress (1998). Available from: .
  • 60
    • 56349113526 scopus 로고    scopus 로고
    • Garante per la protezione dei dati personali, Privacy Policy (2003). Available from: .
    • Garante per la protezione dei dati personali, Privacy Policy (2003). Available from: .
  • 61
    • 33749650747 scopus 로고    scopus 로고
    • An implementation of P3P using database technology
    • Proceedings of the 9th International Conference on Extending Database Technology, Springer-Verlag
    • Agrawal R., Kiernan J., Srikant R., and Xu Y. An implementation of P3P using database technology. Proceedings of the 9th International Conference on Extending Database Technology. LNCS vol. 2992 (2004), Springer-Verlag 845-847
    • (2004) LNCS , vol.2992 , pp. 845-847
    • Agrawal, R.1    Kiernan, J.2    Srikant, R.3    Xu, Y.4
  • 62
    • 56349116498 scopus 로고    scopus 로고
    • G. Hogben, A technical analysis of problems with P3P 1.0 and possible solutions, in: Proceedings of W3C Workshop on the Future of P3P, 2002.
    • G. Hogben, A technical analysis of problems with P3P 1.0 and possible solutions, in: Proceedings of W3C Workshop on the Future of P3P, 2002.
  • 63
    • 56349111251 scopus 로고    scopus 로고
    • M. Schunter, E. Van Herreweghen, M. Waidner, Expressive privacy promises - how to improve the platform for privacy preferences (P3P), in: Proceedings of W3C Workshop on the Future of P3P, 2002.
    • M. Schunter, E. Van Herreweghen, M. Waidner, Expressive privacy promises - how to improve the platform for privacy preferences (P3P), in: Proceedings of W3C Workshop on the Future of P3P, 2002.
  • 65
    • 56349093133 scopus 로고    scopus 로고
    • L.F. Cranor, J.R. Reidenberg, Can user agents accurately represent privacy notices?, in: Proceedings of TPRC'02, 2002.
    • L.F. Cranor, J.R. Reidenberg, Can user agents accurately represent privacy notices?, in: Proceedings of TPRC'02, 2002.
  • 67
    • 56349166384 scopus 로고    scopus 로고
    • A. Tumer, A. Dogac, H. Toroslu, A Semantic based privacy framework for web services, in: Proceedings of ESSW'03, 2003.
    • A. Tumer, A. Dogac, H. Toroslu, A Semantic based privacy framework for web services, in: Proceedings of ESSW'03, 2003.
  • 68
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning D.E., and Denning P.J. Certification of programs for secure information flow. CACM 20 7 (1977) 504-513
    • (1977) CACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 69
    • 84937399920 scopus 로고    scopus 로고
    • D. Downs, J. Rub, K. Kung, C. Jordan, Issues in discretionary access control, in: Proceedings of Symposium on Security and Privacy, IEEE Press, 1985, pp. 208-218.
    • D. Downs, J. Rub, K. Kung, C. Jordan, Issues in discretionary access control, in: Proceedings of Symposium on Security and Privacy, IEEE Press, 1985, pp. 208-218.
  • 70
    • 0001619596 scopus 로고    scopus 로고
    • Flexible support for multiple access control policies
    • Jajodia S., Samarati P., Sapino M.L., and Subrahmanian V.S. Flexible support for multiple access control policies. TODS 26 2 (2001) 214-260
    • (2001) TODS , vol.26 , Issue.2 , pp. 214-260
    • Jajodia, S.1    Samarati, P.2    Sapino, M.L.3    Subrahmanian, V.S.4
  • 72
    • 84948735377 scopus 로고    scopus 로고
    • A privacy policy model for enterprises
    • IEEE Press
    • Karjoth G., and Schunter M. A privacy policy model for enterprises. Proceedings of CSFW'02 (2002), IEEE Press 271-281
    • (2002) Proceedings of CSFW'02 , pp. 271-281
    • Karjoth, G.1    Schunter, M.2
  • 73
    • 0142157015 scopus 로고    scopus 로고
    • A toolkit for managing enterprise privacy policies
    • Proceedings of ESORICS'03, Springer-Verlag
    • Backes M., Pfitzmann B., and Schunter M. A toolkit for managing enterprise privacy policies. Proceedings of ESORICS'03. LNCS vol. 2808 (2003), Springer-Verlag 162-180
    • (2003) LNCS , vol.2808 , pp. 162-180
    • Backes, M.1    Pfitzmann, B.2    Schunter, M.3
  • 74
    • 56349108340 scopus 로고    scopus 로고
    • OASIS, Privacy policy profile of XACML v2.0, OASIS Standard (2005). Available from: .
    • OASIS, Privacy policy profile of XACML v2.0, OASIS Standard (2005). Available from: .
  • 75
    • 77954321643 scopus 로고    scopus 로고
    • A comparison of two privacy policy languages: EPAL and XACML
    • ACM Press
    • Anderson A.H. A comparison of two privacy policy languages: EPAL and XACML. Proceedings of SWS'06 (2006), ACM Press 53-60
    • (2006) Proceedings of SWS'06 , pp. 53-60
    • Anderson, A.H.1
  • 77
    • 0031385980 scopus 로고    scopus 로고
    • Classification of research efforts in requirements engineering
    • Zave P. Classification of research efforts in requirements engineering. CSUR 29 4 (1997) 315-321
    • (1997) CSUR , vol.29 , Issue.4 , pp. 315-321
    • Zave, P.1
  • 78
    • 33646358507 scopus 로고    scopus 로고
    • E. Kavakli, C. Kalloniatis, P. Loucopoulos, S. Gritzalis, Incorporating privacy requirements into the system design process: the pris conceptual framework, Internet Research 16 (2).
    • E. Kavakli, C. Kalloniatis, P. Loucopoulos, S. Gritzalis, Incorporating privacy requirements into the system design process: the pris conceptual framework, Internet Research 16 (2).
  • 80
    • 84942866002 scopus 로고    scopus 로고
    • Security and privacy requirements analysis within a social setting
    • IEEE Press
    • Liu L., Yu E.S.K., and Mylopoulos J. Security and privacy requirements analysis within a social setting. Proceedings of RE'03 (2003), IEEE Press 151-161
    • (2003) Proceedings of RE'03 , pp. 151-161
    • Liu, L.1    Yu, E.S.K.2    Mylopoulos, J.3
  • 81
    • 0035104834 scopus 로고    scopus 로고
    • Exploring Alternatives During Requirements Analysis
    • Mylopoulos J., Chung L., Liao S., Wang H., and Yu E. Exploring Alternatives During Requirements Analysis. IEEE Software 18 1 (2001) 92-96
    • (2001) IEEE Software , vol.18 , Issue.1 , pp. 92-96
    • Mylopoulos, J.1    Chung, L.2    Liao, S.3    Wang, H.4    Yu, E.5
  • 82
    • 0034269939 scopus 로고    scopus 로고
    • A design process based on a model combining scenarios with goals and functions
    • Kaindl H. A design process based on a model combining scenarios with goals and functions. IEEE Transactions on Systems, Man, and Cybernetics 30 5 (2000) 537-551
    • (2000) IEEE Transactions on Systems, Man, and Cybernetics , vol.30 , Issue.5 , pp. 537-551
    • Kaindl, H.1
  • 83
    • 0031597160 scopus 로고    scopus 로고
    • The use of goals to surface requirements for evolving systems
    • IEEE Press
    • Antón A.I., and Potts C. The use of goals to surface requirements for evolving systems. Proceedings of ICSE'98 (1998), IEEE Press 157-166
    • (1998) Proceedings of ICSE'98 , pp. 157-166
    • Antón, A.I.1    Potts, C.2
  • 84
    • 17744389340 scopus 로고    scopus 로고
    • A requirements taxonomy for reducing Web site privacy vulnerabilities
    • Antón A.I., and Earp J.B. A requirements taxonomy for reducing Web site privacy vulnerabilities. REJ 9 3 (2004) 169-185
    • (2004) REJ , vol.9 , Issue.3 , pp. 169-185
    • Antón, A.I.1    Earp, J.B.2
  • 85
    • 0141509901 scopus 로고    scopus 로고
    • Precluding incongruous behavior by aligning software requirements with security and privacy policies
    • Antón A.I., Earp J.B., and Carter R.A. Precluding incongruous behavior by aligning software requirements with security and privacy policies. Information & Software Technology 45 14 (2003) 967-977
    • (2003) Information & Software Technology , vol.45 , Issue.14 , pp. 967-977
    • Antón, A.I.1    Earp, J.B.2    Carter, R.A.3
  • 86
    • 56349144009 scopus 로고    scopus 로고
    • J. Moffett, Requirements and policies, in: Proceedings of POLICY'99, 1999.
    • J. Moffett, Requirements and policies, in: Proceedings of POLICY'99, 1999.
  • 87
    • 56349140856 scopus 로고    scopus 로고
    • US Department of Health, Education and Welfare, The Code of Fair Information Practices, 1973.
    • US Department of Health, Education and Welfare, The Code of Fair Information Practices, 1973.
  • 88
    • 0034833097 scopus 로고    scopus 로고
    • Evolving beyond requirements creep: a risk-based evolutionary prototyping model
    • IEEE Press
    • Carter R.A., Antón A.I., Williams L., and Dagnino A. Evolving beyond requirements creep: a risk-based evolutionary prototyping model. Proceedings of RE'01 (2001), IEEE Press 94-101
    • (2001) Proceedings of RE'01 , pp. 94-101
    • Carter, R.A.1    Antón, A.I.2    Williams, L.3    Dagnino, A.4
  • 92
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: from UML models to access control infrastructures
    • Basin D., Doser J., and Lodderstedt T. Model driven security: from UML models to access control infrastructures. TOSEM 15 1 (2006) 39-91
    • (2006) TOSEM , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 94
    • 4143147399 scopus 로고    scopus 로고
    • Using UML to visualize role-based access control constraints
    • ACM Press
    • Ray I., Li N., France R., and Kim D.-K. Using UML to visualize role-based access control constraints. Proceedings of SACMAT'04 (2004), ACM Press 115-124
    • (2004) Proceedings of SACMAT'04 , pp. 115-124
    • Ray, I.1    Li, N.2    France, R.3    Kim, D.-K.4
  • 95
    • 0242709332 scopus 로고    scopus 로고
    • A scenario-driven role engineering process for functional RBAC roles
    • ACM Press
    • Neumann G., and Strembeck M. A scenario-driven role engineering process for functional RBAC roles. Proceedings of SACMAT'02 (2002), ACM Press 33-42
    • (2002) Proceedings of SACMAT'02 , pp. 33-42
    • Neumann, G.1    Strembeck, M.2
  • 96
    • 0038507387 scopus 로고    scopus 로고
    • Alloy: a lightweight object modelling notation
    • Jackson D. Alloy: a lightweight object modelling notation. TOSEM 11 2 (2002) 256-290
    • (2002) TOSEM , vol.11 , Issue.2 , pp. 256-290
    • Jackson, D.1
  • 98
    • 33750054462 scopus 로고    scopus 로고
    • A. Barth, J.C. Mitchell, Enterprise privacy promises and enforcement, in: Proceedings of the 2005 Workshop on Issues in the Theory of Security, ACM Press, 2005, pp. 58-66.
    • A. Barth, J.C. Mitchell, Enterprise privacy promises and enforcement, in: Proceedings of the 2005 Workshop on Issues in the Theory of Security, ACM Press, 2005, pp. 58-66.
  • 99
    • 84893064260 scopus 로고    scopus 로고
    • Translating privacy practices into privacy promises - how to promise what you can keep
    • IEEE Press
    • Karjoth G., Schunter M., and Herreweghen E.V. Translating privacy practices into privacy promises - how to promise what you can keep. Proceedings of POLICY'03 (2003), IEEE Press 135
    • (2003) Proceedings of POLICY'03 , pp. 135
    • Karjoth, G.1    Schunter, M.2    Herreweghen, E.V.3
  • 101
    • 84948972584 scopus 로고    scopus 로고
    • Security requirements engineering: when anti-requirements hit the fan
    • IEEE Press
    • Crook R., Ince D., Lin L., and Nuseibeh B. Security requirements engineering: when anti-requirements hit the fan. Proceedings of RE'02 (2002), IEEE Press 203-205
    • (2002) Proceedings of RE'02 , pp. 203-205
    • Crook, R.1    Ince, D.2    Lin, L.3    Nuseibeh, B.4
  • 104
    • 56349164488 scopus 로고    scopus 로고
    • H. Gross, The Concept of Privacy, New York University Law Review 42.
    • H. Gross, The Concept of Privacy, New York University Law Review 42.
  • 106
    • 0345792391 scopus 로고    scopus 로고
    • Privacy as intellectual property?
    • Samuelson P. Privacy as intellectual property?. Stanford Law Review 52 5 (2000) 1125-1173
    • (2000) Stanford Law Review , vol.52 , Issue.5 , pp. 1125-1173
    • Samuelson, P.1
  • 107
    • 0346089944 scopus 로고    scopus 로고
    • Property rights in personal information: an economic defense of privacy
    • Murphy R.S. Property rights in personal information: an economic defense of privacy. Georgetown Law Journal 84 (1996) 2381-2417
    • (1996) Georgetown Law Journal , vol.84 , pp. 2381-2417
    • Murphy, R.S.1
  • 108
    • 0010932017 scopus 로고    scopus 로고
    • Re-engineering the right to privacy: how privacy has been transformed from a right to a commodity
    • MIT Press
    • Davies S.G. Re-engineering the right to privacy: how privacy has been transformed from a right to a commodity. Technology and Privacy: The New Landscape (1997), MIT Press 143-145
    • (1997) Technology and Privacy: The New Landscape , pp. 143-145
    • Davies, S.G.1
  • 109
    • 31644444890 scopus 로고    scopus 로고
    • K.J. Strandburg, Privacy, rationality, and temptation: a theory of willpower norms, Rutgers Law Review 57 (4).
    • K.J. Strandburg, Privacy, rationality, and temptation: a theory of willpower norms, Rutgers Law Review 57 (4).
  • 110
    • 8744289773 scopus 로고    scopus 로고
    • The fourth amendment and new technologies: constitutional myths and the case for caution
    • Kerr O. The fourth amendment and new technologies: constitutional myths and the case for caution. Michigan Law Review 102 (2004) 801-888
    • (2004) Michigan Law Review , vol.102 , pp. 801-888
    • Kerr, O.1
  • 111
    • 0347314906 scopus 로고    scopus 로고
    • The fourth amendment and common law
    • Sklansky D.A. The fourth amendment and common law. Columbia Law Review 100 (2000) 1739
    • (2000) Columbia Law Review , vol.100 , pp. 1739
    • Sklansky, D.A.1
  • 112
  • 113
    • 56349137900 scopus 로고    scopus 로고
    • US Federal Trade Commission, The Fair Credit Reporting Act, Pub. L. No. 90-32, 15 U.S.C. §1681 et seq., 1970.
    • US Federal Trade Commission, The Fair Credit Reporting Act, Pub. L. No. 90-32, 15 U.S.C. §1681 et seq., 1970.
  • 114
    • 56349164023 scopus 로고    scopus 로고
    • US Congress, The Fair and Accurate Credit Transactions Act, Pub. L. 108-159, 2003.
    • US Congress, The Fair and Accurate Credit Transactions Act, Pub. L. 108-159, 2003.
  • 115
    • 56349137432 scopus 로고    scopus 로고
    • US Department of Justice, Privacy Act (1974). Available from: .
    • US Department of Justice, Privacy Act (1974). Available from: .
  • 116
    • 56349092664 scopus 로고    scopus 로고
    • US Congress, Health Insurance Portability and Accountability Act, Pub. L. No. 104-191, 1996.
    • US Congress, Health Insurance Portability and Accountability Act, Pub. L. No. 104-191, 1996.
  • 117
    • 56349094972 scopus 로고
    • The law of privacy in a nutshell
    • Smith R.E. The law of privacy in a nutshell. Privacy Journal (1993) 50-51
    • (1993) Privacy Journal , pp. 50-51
    • Smith, R.E.1
  • 118
    • 56349131539 scopus 로고    scopus 로고
    • US Department of Commerce, Safe Harbor Privacy Principles, 2000. Available from: .
    • US Department of Commerce, Safe Harbor Privacy Principles, 2000. Available from: .
  • 119
    • 26844527038 scopus 로고    scopus 로고
    • Keeping secrets
    • Carpenter D. Keeping secrets. Minnesota Law Review 86 6 (2002) 1097-1114
    • (2002) Minnesota Law Review , vol.86 , Issue.6 , pp. 1097-1114
    • Carpenter, D.1
  • 120
    • 26844528110 scopus 로고    scopus 로고
    • Privacy and secrecy after September 11
    • Rotenberg M. Privacy and secrecy after September 11. Minnesota Law Review 86 6 (2002) 1115-1136
    • (2002) Minnesota Law Review , vol.86 , Issue.6 , pp. 1115-1136
    • Rotenberg, M.1
  • 121
    • 0345817194 scopus 로고    scopus 로고
    • Privacy and power: computer databases and metaphors for information privacy
    • Solove D.J. Privacy and power: computer databases and metaphors for information privacy. Stanford Law Review 53 (2001) 1393-1462
    • (2001) Stanford Law Review , vol.53 , pp. 1393-1462
    • Solove, D.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.