-
1
-
-
33750131444
-
-
Software Engineering Institute CMU/SEI-2005-TR-009
-
N. R. Mead, E. Hough, and T. Stehney, "Security quality requirements engineering (SQUARE) methodology," Software Engineering Institute, Carnegie Mellon University, CMU/SEI-2005-TR-009, 2005, http://www.sei.cmu.edu/ publications/documents/05.reports/05tr009.html.
-
(2005)
Security Quality Requirements Engineering (SQUARE) Methodology
-
-
Mead, N.R.1
Hough, E.2
Stehney, T.3
-
2
-
-
54249099152
-
Engineering privacy requirements in business intelligence applications
-
Berlin, Heidelberg: Springer-Verlag
-
A. Chiasera, F. Casati, F. Daniel, and Y. Velegrakis, "Engineering privacy requirements in business intelligence applications," in SDM '08: Proceedings of the 5th VLDB workshop on Secure Data Management. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 219-228.
-
(2008)
SDM '08: Proceedings of the 5th VLDB Workshop on Secure Data Management
, pp. 219-228
-
-
Chiasera, A.1
Casati, F.2
Daniel, F.3
Velegrakis, Y.4
-
4
-
-
0038588452
-
Privacy in multimedia communications: Protecting users, not just data
-
Springer
-
A. Adams and M. A. Sasse, "Privacy in multimedia communications: Protecting users, not just data," in Proceedings of IMH HCI'01. Springer, 2001, pp. 49-64.
-
(2001)
Proceedings of IMH HCI'01
, pp. 49-64
-
-
Adams, A.1
Sasse, M.A.2
-
5
-
-
33751416458
-
A common criteria based security requirements engineering process for the development of secure information systems
-
D. Mellado, E. Fernández-Medina, and M. Piattini, "A common criteria based security requirements engineering process for the development of secure information systems," Comput. Stand. Interfaces, vol. 29, no. 2, pp. 244-253, 2007.
-
(2007)
Comput. Stand. Interfaces
, vol.29
, Issue.2
, pp. 244-253
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
8
-
-
67049134882
-
Computer-aided privacy requirements elicitation technique
-
vol. 0
-
S. Miyazaki, N. Mead, and J. Zhan, "Computer-aided privacy requirements elicitation technique," Asia-Pacific Conference on Services Computing., vol. 0, pp. 367-372, 2008.
-
(2008)
Asia-Pacific Conference on Services Computing
, pp. 367-372
-
-
Miyazaki, S.1
Mead, N.2
Zhan, J.3
-
10
-
-
34250877843
-
-
and Microsoft Corp., [Online]. Available
-
OECD and Microsoft Corp., "OECD privacy statement generator," 2000. [Online]. Available: http://www2.oecd.org/pwv3/
-
(2000)
OECD Privacy Statement Generator
-
-
-
11
-
-
57649151414
-
-
Addison-Wesley
-
J. H. Allen, S. Barnum, R. J. Ellison, G. McGraw, and N. R. Mead, Software Security Engineering: A Guide for Project Managers. Addison-Wesley, 2008.
-
(2008)
Software Security Engineering: A Guide for Project Managers
-
-
Allen, J.H.1
Barnum, S.2
Ellison, R.J.3
McGraw, G.4
Mead, N.R.5
-
12
-
-
77957958252
-
What does privacy have to do with it? Privacy risk assessment
-
presentation
-
T. Mitrano, D. R. Kirby, and L. Maltz, "What does privacy have to do with it? privacy risk assessment," in Security Professionals Conference, 2005, presentation.
-
Security Professionals Conference, 2005
-
-
Mitrano, T.1
Kirby, D.R.2
Maltz, L.3
-
13
-
-
1842829828
-
-
[Online]. Available
-
National Institute of Standards and Technology, "Risk management guide for information technology systems," 2002. [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf
-
(2002)
Risk Management Guide for Information Technology Systems
-
-
-
15
-
-
77957938691
-
-
[Online]. Available
-
Statistics Canada, "Privacy impact assessment," 2008. [Online]. Available: http://www.statcan.gc.ca/about-apercu/pia-efrvp/gloss-eng.htm
-
(2008)
Privacy Impact Assessment
-
-
-
16
-
-
77953005149
-
-
Internal Revenuse Service, [Online]. Available
-
Internal Revenuse Service, "Model information technology privacy impact assessment," 1996. [Online]. Available: http://www.cio.gov/ Documents/pia-for-it-irs-model.pdf
-
(1996)
Model Information Technology Privacy Impact Assessment
-
-
-
17
-
-
78149323164
-
-
Analytical tools for privacy risks: Assessing efficacy on vote verification technologies, poster
-
R. R. Heckle and S. H. Holden, "Analytical tools for privacy risks: Assessing efficacy on vote verification technologies," in Symposium On Usable Privacy and Security, 2006, poster.
-
Symposium on Usable Privacy and Security, 2006
-
-
Heckle, R.R.1
Holden, S.H.2
|