-
1
-
-
70849132945
-
-
Business, Week 17/12/2007
-
Business, Week (1998). "A Little Net Privacy, Please." Available at: www.businessweek.com last accessed: 17/12/2007.
-
(1998)
A Little Net Privacy
-
-
-
2
-
-
9244246745
-
Privacy:A Weak link in the cyber-chain
-
PricewaterhouseCoopers, New York
-
PricewaterhouseCoopers (2001). "Privacy:a weak link in the cyber-chain." E-Business Leadres Series, PricewaterhouseCoopers, New York.
-
(2001)
PricewaterhouseCoopers E-Business Leadres Series
-
-
-
3
-
-
70849109134
-
Addressing privacy: Matching user requirements with implementation techniques
-
Athens, Greece, September
-
Kavakli E., Kalloniatis C., Gritzalis S., "Addressing Privacy: Matching User Requirements with Implementation Techniques", 7th Hellenic European Conference on Computer Mathematics and its Applications (HERCMA 2005), Athens, Greece, September 2005
-
(2005)
7th Hellenic European Conference on Computer Mathematics and its Applications (HERCMA 2005)
-
-
Kavakli, E.1
Kalloniatis, C.2
Gritzalis, S.3
-
4
-
-
33644968219
-
IT-security and privacy- Design and use of privacy enhancing security mechanisms
-
Versailles, France, Lecture Notes in Computer Science 1958, June 2000
-
Fischer-Hubner, S. (2001). IT-security and privacy- Design and use of privacy enhancing security mechanisms. 5th International Conference on Applications of Natural Language to Information Systems, Versailles, France, Lecture Notes in Computer Science 1958, pp: 35-106 June 2000.
-
(2001)
5th International Conference on Applications of Natural Language to Information Systems
, pp. 35-106
-
-
Fischer-Hubner, S.1
-
5
-
-
50949105593
-
-
Ministry of the Interior and Kingdom Relations, the Netherlands
-
Koorn, R., H. van Gils, J. Hart, P. Overbeek and R. Tellegen (2004). Privacy Enhancing Technologies-White paper for decision makers. Ministry of the Interior and Kingdom Relations, the Netherlands.
-
(2004)
Privacy Enhancing Technologies-White Paper for Decision Makers
-
-
Koorn, R.1
Van Gils, H.2
Hart, J.3
Overbeek, P.4
Tellegen, R.5
-
6
-
-
70849104630
-
-
TU Dresden ULD Kiel, 31 July 2007, Dresden
-
Pfitzmann, A. and M Hansen (2007). Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonumity and Identity Management-A Consolidated Proposal for Terminology v.029. TU Dresden ULD Kiel, 31 July 2007, Dresden.
-
(2007)
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonumity and Identity Management-A Consolidated Proposal for Terminology
, vol.29
-
-
Pfitzmann, A.1
Hansen, M.2
-
7
-
-
84979855000
-
Dealing with security requirements during the development of information systems
-
Paris, France, Springer Verlag LNCS 685
-
Chung, L. (1993). Dealing with security requirements during the development of information systems. The 5th international conference of advanced information systems engineering, CAiSE'93, Paris, France, Springer Verlag LNCS 685, pp: 234-251.
-
(1993)
The 5th International Conference of Advanced Information Systems Engineering, CAiSE'93
, pp. 234-251
-
-
Chung, L.1
-
8
-
-
85026689401
-
Modeling organisations for information systems requirements engineering
-
Yu., E. (1993). Modeling organisations for information systems requirements engineering. 1st IEEEInternational Symposium on Requirements Engineering pp: 34-41.
-
(1993)
1st IEEEInternational Symposium on Requirements Engineering
, pp. 34-41
-
-
Yu, E.1
-
14
-
-
0002131454
-
Design for privacy in ubiquitous computing environments
-
G. In Michelis, Simone, C., Schmidt, K
-
Bellotti, V. and A. Sellen (1993). Design for privacy in ubiquitous computing environments. Proceedings of the third european conference on computer supported cooperative work (ECSCW 93). G. In Michelis, Simone, C., Schmidt, K. 93-108.
-
(1993)
Proceedings of the Third European Conference on Computer Supported Cooperative Work (ECSCW 93)
, pp. 93-108
-
-
Bellotti, V.1
Sellen, A.2
-
15
-
-
33646345792
-
STRAP: A structured analysis framework for privacy
-
GIT-GVU-05-02
-
Jensen, C., J. Tullio, C. Potts and E. Mynatt (2005). STRAP: A Structured Analysis Framework for Privacy. GVU Technical Report, Georgia Institute of Technology, GIT-GVU-05-02.
-
(2005)
GVU Technical Report, Georgia Institute of Technology
-
-
Jensen, C.1
Tullio, J.2
Potts, C.3
Mynatt, E.4
-
16
-
-
50949085110
-
Addressing privacy requirements in system design: The PriS method
-
Springer
-
Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis (2008) "Addressing privacy requirements in system design: The PriS method", Requirements Eng.(2008) Vol 13, No 3, pp. 241-255, Springer.
-
(2008)
Requirements Eng.
, vol.13
, Issue.3
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
18
-
-
0030781944
-
Towards modelling and reasoning support for early phase requirements engineering
-
Yu., E. (1997). Towards Modelling and reasoning support for early phase requirements engineering. 3rd IEEE International Symposium on Requirements Engineering pp: 226-235.
-
(1997)
3rd IEEE International Symposium on Requirements Engineering
, pp. 226-235
-
-
Yu, E.1
-
21
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
Monterey Bay, California, USA
-
Liu, L., E. Yu. and J. Mylopoulos (2003). Security and privacy requirements analysis within a social setting. IEEE,11th international requirements engineering conference (RE'03). Monterey Bay, California, USA.
-
(2003)
IEEE,11th International Requirements Engineering Conference (RE'03)
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
23
-
-
70849131811
-
-
Modena-Italy
-
Perini, P., P. Bresciani, P. Giorgini, F. Giunchiglia and J. Mylopoulos (2001). Towards an agent-oriented approach to software engineering, Modena-Italy.
-
(2001)
Towards An Agent-Oriented Approach to Software Engineering
-
-
Perini, P.1
Bresciani, P.2
Giorgini, P.3
Giunchiglia, F.4
Mylopoulos, J.5
-
24
-
-
8344270973
-
An ontology for modelling security:The tropos project
-
V. Palade, R. Howlett and L Jain. United Kingdom, University of Oxford, Springer-Verlag
-
Mouratidis., H., P. Giorgini and G. Manson (2003b). An ontology for modelling security:The tropos project. Proceedings of the KES 2003 invited session ontology and multi-agent systems design (OMASD'03)-Lecture Notes in Artificial Intelligence 2773. V. Palade, R. Howlett and L Jain. United Kingdom, University of Oxford, Springer-Verlag 1387-1394.
-
(2003)
Proceedings of the KES 2003 Invited Session Ontology and Multi-agent Systems Design (OMASD'03)-Lecture Notes in Artificial Intelligence 2773
, pp. 1387-1394
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
28
-
-
0032203918
-
Managing conflicts in Goal-driven requirements engineering
-
van Lamsweerde, A., Darimont R. and E. Letier (1998). "Managing conflicts in Goal-driven requirements engineering." IEEE Trans. Soft. Eng. 24(11): 908-925.
-
(1998)
IEEE Trans. Soft. Eng.
, vol.24
, Issue.11
, pp. 908-925
-
-
Van Lamsweerde, A.1
Darimont, R.2
Letier, E.3
-
29
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
van Lamsweerde, A. and E. Letier (2000). "Handling obstacles in goal-oriented requirements engineering." IEEE Trans. Soft. Eng. 26: 978-1005.
-
(2000)
IEEE Trans. Soft. Eng.
, vol.26
, pp. 978-1005
-
-
Van Lamsweerde, A.1
Letier, E.2
-
31
-
-
10044248787
-
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
-
practices, methods, and techniques. Acm-Press. Cambridge, MA, USA
-
Hong, J., J. Ng, S. Lederer and J. Landey (2004). Privacy risk models for designing privacy-sensitive ubiquitous computing systems. Symposium on Designing Interactive Systems archive - Proceedings of the 2004 conference on Designing interactive systems: processes, practices, methods, and techniques. Acm-Press. Cambridge, MA, USA 91-100.
-
(2004)
Symposium on Designing Interactive Systems Archive - Proceedings of the 2004 Conference on Designing Interactive Systems: Processes
, pp. 91-100
-
-
Hong, J.1
Ng, J.2
Lederer, S.3
Landey, J.4
-
32
-
-
0003662519
-
-
Welfare, US Department of Health Education and (The)
-
Welfare, US Department of Health Education and (1973). Code of Fair Information practises (The).
-
(1973)
Code of Fair Information Practises
-
-
-
33
-
-
84992927367
-
Protecting privacy in system design: The electronic voting case
-
Kavakli, E., S. Gritzalis and C. Kalloniatis (2007)."Protecting Privacy in System Design: The Electronic Voting Case." Transforming Government: People, Process and Policy 1(4): 307-332.
-
(2007)
Transforming Government: People, Process and Policy
, vol.1
, Issue.4
, pp. 307-332
-
-
Kavakli, E.1
Gritzalis, S.2
Kalloniatis, C.3
-
34
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre, G., Opdahl, A.L.,: Eliciting security requirements with misuse cases. Requirements Engineering, 10(1): 34-44 (2005).
-
(2005)
Requirements Engineering
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
35
-
-
13644265503
-
Templates for Misuse Case Description
-
Camille Ben Achour et al. (Eds.). Essener Informatik BeitrÃge, University of Essen, Germany
-
Sindre, G., and Opdahl, A.L. Templates for Misuse Case Description. In Proceedings of the Seventh International Workshop on Requirements Engineering: Foundations for Software Quality - REFSQ'2001, pp. 125-136, Camille Ben Achour et al. (Eds.). Essener Informatik BeitrÃge, University of Essen, Germany, 2002.
-
(2002)
Proceedings of the Seventh International Workshop on Requirements Engineering: Foundations for Software Quality - REFSQ'2001
, pp. 125-136
-
-
Sindre, G.1
Opdahl, A.L.2
-
36
-
-
0037299044
-
-
February
-
Alexander, I., Use/Misuse Case Analysis Elicits Non-Functional Requirements, Computing & Control Engineering Journal, Vol. 14, 1, pp 40-45, February 2003.
-
(2003)
Use/Misuse Case Analysis Elicits Non-Functional Requirements, Computing & Control Engineering Journal
, vol.14
, Issue.1
, pp. 40-45
-
-
Alexander, I.1
-
39
-
-
0002670359
-
-
Attack Trees." 21-29. Dr. Dobb's December
-
Schneier, B., "Attack Trees." 21-29. Dr. Dobb's Journal of Software Tools 24, 12 (December 1999): 21-29.
-
(1999)
Journal of Software Tools 24
, vol.12
, pp. 21-29
-
-
Schneier, B.1
|