메뉴 건너뛰기




Volumn , Issue , 2006, Pages 217-231

An audit method of personal data based on Requirements Engineering

Author keywords

[No Author keywords available]

Indexed keywords

ACTION RESEARCH; DATA PROTECTION; MEDICAL CENTER; PERSONAL DATA; QUALITY STANDARD; SECURITY ANALYSIS;

EID: 57549095655     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (31)
  • 1
    • 27644498532 scopus 로고    scopus 로고
    • Enabling shared audit data
    • Springer-Verlag October
    • Baldwin, A., Shiu, S. Enabling shared audit data. International Journal of Information Security. Springer-Verlag. Volume 4, Number 4. pp. 263 - 276. October 2005.
    • (2005) International Journal of Information Security , vol.4 , Issue.4 , pp. 263-276
    • Baldwin, A.1    Shiu, S.2
  • 5
    • 84979855000 scopus 로고    scopus 로고
    • Dealing with security requirements during the development of information systems
    • Rolland C, Bodat F. and Cauvert C. (eds) Berlin: Springer Verlag. Paris
    • Chung L. Dealing with Security Requirements during the development of Information Systems. In: Rolland C, Bodat F. and Cauvert C. (eds). Advanced Information Systems Eng., Proc., 5th Int. Conf. CAiSE '93. Berlin: Springer Verlag. Paris. pp. 234-251.
    • Advanced Information Systems Eng., Proc., 5th Int. Conf. CAiSE '93 , pp. 234-251
    • Chung, L.1
  • 6
    • 0005914572 scopus 로고    scopus 로고
    • CMMI. CAPABILITY MATURITY MODEL INTEGRATION, VERSION 1.1 CMU/SEI-2002-TR-028. Carnegie Mellon. Software Engineering Institute. August
    • CMMI. CAPABILITY MATURITY MODEL INTEGRATION, VERSION 1.1. Technical Report. CMU/SEI-2002-TR-028. Carnegie Mellon. Software Engineering Institute. August.
    • Technical Report
  • 8
    • 77954141559 scopus 로고    scopus 로고
    • Directive 95/46/CE of the European Parliament and Council, dated October 24th: about People protection regarding the personal data management and the free circulation of these data. DOCE no. L281, 23/11/1995, P.0031-0050
    • Directive 95/46/CE of the European Parliament and Council, dated October 24th: about People protection regarding the personal data management and the free circulation of these data. DOCE no. L281, 23/11/1995, P.0031-0050.
  • 9
    • 77954129948 scopus 로고    scopus 로고
    • Directive 2002/58/CE, of the European Parliament and Council, of July 12, 2002, relative to the processing of personal data and the protection of privacy in the electronic communications industry (Official Gazette of the European Union L 201 of 31.7.2002)
    • Directive 2002/58/CE, of the European Parliament and Council, of July 12, 2002, relative to the processing of personal data and the protection of privacy in the electronic communications industry (Official Gazette of the European Union L 201 of 31.7.2002).
  • 10
    • 0034908189 scopus 로고    scopus 로고
    • Clinical audit in NHS acute and community trusts: A comparative analysis
    • Dowie, R., Kennedy, A. Clinical audit in NHS acute and community trusts: a comparative analysis. British Journal of Clinical Governance, Volume 6, Number 2 (2001), pp. 94-101.
    • (2001) British Journal of Clinical Governance , vol.6 , Issue.2 , pp. 94-101
    • Dowie, R.1    Kennedy, A.2
  • 13
    • 2942757657 scopus 로고    scopus 로고
    • Engineering security requirements
    • Swiss Federal Institute of Technology (ETH), Zurich, Switzerland January/February
    • Firesmith, D. Engineering Security Requirements. Journal of Object Technology (JOT), 2(1), Swiss Federal Institute of Technology (ETH), Zurich, Switzerland, pp. 53-68, January/February 2003.
    • (2003) Journal of Object Technology (JOT) , vol.2 , Issue.1 , pp. 53-68
    • Firesmith, D.1
  • 14
    • 20944436409 scopus 로고    scopus 로고
    • Is audit research? The relationships between clinical audit and social research
    • April
    • Hughes, R. Is audit research? The relationships between clinical audit and social research. International Journal of Health Care Quality Assurance, Volume 18, Number 4 (April 2005), pp. 289-299.
    • (2005) International Journal of Health Care Quality Assurance , vol.18 , Issue.4 , pp. 289-299
    • Hughes, R.1
  • 20
  • 21
    • 17744386721 scopus 로고    scopus 로고
    • Using a security requirements engineering methodology in practice: The compliance with the italian data protection legislation
    • Massacci, F., Prest, M., Zannone, N. Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. Computer Standards & Interfaces 27 (2005) 445-455.
    • (2005) Computer Standards & Interfaces , vol.27 , pp. 445-455
    • Massacci, F.1    Prest, M.2    Zannone, N.3
  • 22
    • 77954108103 scopus 로고    scopus 로고
    • Regulation (EC) No 45/2001 of the European Parliament and of the Council of 18 December 2000 on the protection of individuals with regard to the processing of personal data by the Community institutions and bodies and on the free movement of such data
    • Regulation (EC) No 45/2001 of the European Parliament and of the Council of 18 December 2000 on the protection of individuals with regard to the processing of personal data by the Community institutions and bodies and on the free movement of such data.
  • 23
    • 0002779304 scopus 로고    scopus 로고
    • Privacy, information technology, and health care
    • August
    • Rindfleisch, T. Privacy, Information Technology, and Health Care. Communications of the ACM. Volume 40, Issue 8. Pages: 92-100. August, 1997.
    • (1997) Communications of the ACM , vol.40 , Issue.8 , pp. 92-100
    • Rindfleisch, T.1
  • 24
    • 0000052619 scopus 로고    scopus 로고
    • Authentication. Access control and audit
    • March ISBN: 0360-0300
    • Sandhu, R., Samarati, P. Authentication. Access Control and Audit. ACM Computing Surveys (CSUR). Volume 28, Issue 1. Pages: 241-243. March, 1996. ISBN: 0360-0300.
    • (1996) ACM Computing Surveys (CSUR) , vol.28 , Issue.1 , pp. 241-243
    • Sandhu, R.1    Samarati, P.2
  • 25
    • 2342563770 scopus 로고    scopus 로고
    • Grand challenges in information security: Process and output
    • Smith, S. W. and Spafford, E. H. (2004) Grand Challenges in Information Security: Process and Output, IEEE Security & Privacy, 2, 69-71.
    • (2004) IEEE Security & Privacy , vol.2 , pp. 69-71
    • Smith, S.W.1    Spafford, E.H.2
  • 27
    • 77954133417 scopus 로고    scopus 로고
    • Spanish Constitutional Law 15/1999, December 13th, on 14/12 (In Spanish)
    • Spanish Constitutional Law 15/1999, December 13th, on Personal Data Protection. BOE no. 298, 14/12/1999 (In Spanish).
    • (1999) Personal Data Protection. BOE No. 298
  • 29
    • 17844409254 scopus 로고    scopus 로고
    • Requirements reuse for improving information systems security: A practitioner's approach
    • Toval, A., Nicolás, J., Moros, B., Baidez, F. Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach. Requirements Engineering Journal (2002) 6:205-219.
    • (2002) Requirements Engineering Journal , vol.6 , pp. 205-219
    • Toval, A.1    Nicolás, J.2    Moros, B.3    Baidez, F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.