메뉴 건너뛰기




Volumn , Issue , 2009, Pages 185-194

Methods for designing privacy aware information systems: A review

Author keywords

[No Author keywords available]

Indexed keywords

COMPARATIVE ANALYSIS; ON CURRENTS; PERSONAL INFORMATION; PRIVACY REQUIREMENTS; RECREATIONAL ACTIVITIES; RESEARCH TRENDS; SYSTEMATIC FRAMEWORK; USER PRIVACY;

EID: 70849084080     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PCI.2009.45     Document Type: Conference Paper
Times cited : (26)

References (39)
  • 1
    • 70849132945 scopus 로고    scopus 로고
    • Business, Week 17/12/2007
    • Business, Week (1998). "A Little Net Privacy, Please." Available at: www.businessweek.com last accessed: 17/12/2007.
    • (1998) A Little Net Privacy
  • 2
    • 9244246745 scopus 로고    scopus 로고
    • Privacy:A Weak link in the cyber-chain
    • PricewaterhouseCoopers, New York
    • PricewaterhouseCoopers (2001). "Privacy:a weak link in the cyber-chain." E-Business Leadres Series, PricewaterhouseCoopers, New York.
    • (2001) PricewaterhouseCoopers E-Business Leadres Series
  • 4
    • 33644968219 scopus 로고    scopus 로고
    • IT-security and privacy- Design and use of privacy enhancing security mechanisms
    • Versailles, France, Lecture Notes in Computer Science 1958, June 2000
    • Fischer-Hubner, S. (2001). IT-security and privacy- Design and use of privacy enhancing security mechanisms. 5th International Conference on Applications of Natural Language to Information Systems, Versailles, France, Lecture Notes in Computer Science 1958, pp: 35-106 June 2000.
    • (2001) 5th International Conference on Applications of Natural Language to Information Systems , pp. 35-106
    • Fischer-Hubner, S.1
  • 7
    • 84979855000 scopus 로고
    • Dealing with security requirements during the development of information systems
    • Paris, France, Springer Verlag LNCS 685
    • Chung, L. (1993). Dealing with security requirements during the development of information systems. The 5th international conference of advanced information systems engineering, CAiSE'93, Paris, France, Springer Verlag LNCS 685, pp: 234-251.
    • (1993) The 5th International Conference of Advanced Information Systems Engineering, CAiSE'93 , pp. 234-251
    • Chung, L.1
  • 16
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: The PriS method
    • Springer
    • Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis (2008) "Addressing privacy requirements in system design: The PriS method", Requirements Eng.(2008) Vol 13, No 3, pp. 241-255, Springer.
    • (2008) Requirements Eng. , vol.13 , Issue.3 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 18
    • 0030781944 scopus 로고    scopus 로고
    • Towards modelling and reasoning support for early phase requirements engineering
    • Yu., E. (1997). Towards Modelling and reasoning support for early phase requirements engineering. 3rd IEEE International Symposium on Requirements Engineering pp: 226-235.
    • (1997) 3rd IEEE International Symposium on Requirements Engineering , pp. 226-235
    • Yu, E.1
  • 28
    • 0032203918 scopus 로고    scopus 로고
    • Managing conflicts in Goal-driven requirements engineering
    • van Lamsweerde, A., Darimont R. and E. Letier (1998). "Managing conflicts in Goal-driven requirements engineering." IEEE Trans. Soft. Eng. 24(11): 908-925.
    • (1998) IEEE Trans. Soft. Eng. , vol.24 , Issue.11 , pp. 908-925
    • Van Lamsweerde, A.1    Darimont, R.2    Letier, E.3
  • 29
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • van Lamsweerde, A. and E. Letier (2000). "Handling obstacles in goal-oriented requirements engineering." IEEE Trans. Soft. Eng. 26: 978-1005.
    • (2000) IEEE Trans. Soft. Eng. , vol.26 , pp. 978-1005
    • Van Lamsweerde, A.1    Letier, E.2
  • 32
    • 0003662519 scopus 로고
    • Welfare, US Department of Health Education and (The)
    • Welfare, US Department of Health Education and (1973). Code of Fair Information practises (The).
    • (1973) Code of Fair Information Practises
  • 34
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • Sindre, G., Opdahl, A.L.,: Eliciting security requirements with misuse cases. Requirements Engineering, 10(1): 34-44 (2005).
    • (2005) Requirements Engineering , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 39
    • 0002670359 scopus 로고    scopus 로고
    • Attack Trees." 21-29. Dr. Dobb's December
    • Schneier, B., "Attack Trees." 21-29. Dr. Dobb's Journal of Software Tools 24, 12 (December 1999): 21-29.
    • (1999) Journal of Software Tools 24 , vol.12 , pp. 21-29
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.