메뉴 건너뛰기




Volumn 16, Issue 1, 2011, Pages 3-32

A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements

Author keywords

Privacy; Requirements; Secure software engineering; Threat modeling

Indexed keywords

INFORMATION FLOWS; PRIVACY; PRIVACY REQUIREMENTS; PRIVACY-ENHANCING TECHNOLOGIES; REQUIREMENTS; SECURE SOFTWARE ENGINEERING; SOFTWARE-BASED; SYSTEM MODELS; SYSTEMATIC METHODOLOGY; THREAT ANALYSIS; THREAT MODELING; TREE PATTERN;

EID: 79952002261     PISSN: 09473602     EISSN: 1432010X     Source Type: Journal    
DOI: 10.1007/s00766-010-0115-7     Document Type: Article
Times cited : (431)

References (94)
  • 4
    • 77950605126 scopus 로고    scopus 로고
    • Software security: building security
    • Boston, NY
    • Mcgraw G (2006) Software security: building security. Addison-Wesley Professional, Boston, NY.
    • (2006) Addison-Wesley Professional
    • McGraw, G.1
  • 6
    • 79952002284 scopus 로고    scopus 로고
    • Proceedings of the 7th international workshop on requirements engineering, foundation for software quality
    • Andreas GS, Opdahl AL (2001) Templates for misuse case description. In: Proceedings of the 7th international workshop on requirements engineering, foundation for software quality, pp 4-5.
    • (2001) Templates for misuse case description , pp. 4-5
    • Andreas, G.S.1    Opdahl, A.L.2
  • 7
    • 60949097689 scopus 로고    scopus 로고
    • Experimental comparison of attack trees and misuse cases for security threat identification
    • SPECIAL ISSUE: Model-Driven Development for Secure Information Systems
    • Opdahl AL, Sindre G (2009) Experimental comparison of attack trees and misuse cases for security threat identification. Inf Softw Technol 51(5): 916-932. SPECIAL ISSUE: Model-Driven Development for Secure Information Systems.
    • (2009) Inf Softw Technol , vol.51 , Issue.5 , pp. 916-932
    • Opdahl, A.L.1    Sindre, G.2
  • 8
    • 33644925852 scopus 로고    scopus 로고
    • A taxonomy of privacy
    • GWU Law School Public Law Research Paper No. 129
    • Solove DJ (2006) A taxonomy of privacy. Univ PA Law Rev 154(3): 477; GWU Law School Public Law Research Paper No. 129.
    • (2006) Univ PA Law Rev , vol.154 , Issue.3 , pp. 477
    • Solove, D.J.1
  • 11
    • 79952002252 scopus 로고    scopus 로고
    • Cunningham P, Cunningham M (eds) Collaboration and the knowledge economy: issues, applications, case studies, Proceedings of eChallenges, IOS Press, Amsterdam
    • Hansen M (2008) Linkage control integrating the essence of privacy protection into identity management systems. In: Cunningham P, Cunningham M (eds) Collaboration and the knowledge economy: issues, applications, case studies, Proceedings of eChallenges, IOS Press, Amsterdam, pp 1585-1592.
    • (2008) Linkage control integrating the essence of privacy protection into identity management systems , pp. 1585-1592
    • Hansen, M.1
  • 12
    • 79952003363 scopus 로고    scopus 로고
    • Talk: an introduction to u-prove privacy protection technology, and its role in the identity metasystem-what future for privacy technology
    • Danezis G (2008) Talk: an introduction to u-prove privacy protection technology, and its role in the identity metasystem-what future for privacy technology. http://www. petsfinebalance. com/agenda/index. php.
    • (2008)
    • Danezis, G.1
  • 13
    • 79952004582 scopus 로고    scopus 로고
    • ISO 17799 (2000) Information technology code of practice for information security management, technical report, British Standards Institute
    • ISO 17799 (2000) Information technology code of practice for information security management, technical report, British Standards Institute.
    • (2000)
  • 14
    • 0344661881 scopus 로고    scopus 로고
    • Clare College, PhD thesis, University of Cambridge
    • Roe M (1997) Cryptography and evidence. PhD thesis, University of Cambridge, Clare College.
    • (1997) Cryptography and evidence
    • Roe, M.1
  • 16
    • 19944367736 scopus 로고    scopus 로고
    • Personal privacy through understanding and action: five pitfalls for designers
    • Lederer S, Hong JI, Dey AK, Landay JA (2004) Personal privacy through understanding and action: five pitfalls for designers. Pers Ubiquitous Comput 8: 440-454.
    • (2004) Pers Ubiquitous Comput , vol.8 , pp. 440-454
    • Lederer, S.1    Hong, J.I.2    Dey, A.K.3    Landay, J.A.4
  • 18
    • 79952002907 scopus 로고    scopus 로고
    • P3P, Platform for privacy preferences project, W3C P3P specifications
    • P3P, Platform for privacy preferences project, W3C P3P specifications. http://www. w3. org/TR/P3P/.
  • 19
    • 0003187764 scopus 로고
    • Directive 95/46/EC of the European parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • EU
    • EU (1995) Directive 95/46/EC of the European parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off J Eur Commun 281: 31-50. http://europa. eu/scadplus/leg/en/lvb/l14012. htm.
    • (1995) Off J Eur Commun , vol.281 , pp. 31-50
  • 20
    • 79952006925 scopus 로고    scopus 로고
    • HIPAA administrative simplification: enforcement; final rul United States Department of Health & Human Service
    • HIPAA (2006) HIPAA administrative simplification: enforcement; final rule. United States Department of Health & Human Service. Fed Regist Rules Regul 71(32): 8390-8433. http://www. hhs. gov/ocr/privacy/hipaa/administrative/privacyrule/finalenforcementrule06. pdf.
    • (2006) HIPAA administrative simplification: enforcement; final rule , vol.71 , Issue.32 , pp. 8390-8433
  • 21
    • 79952009627 scopus 로고    scopus 로고
    • Personal information protection and electronic documents act (2000, c. 5)
    • PIPEDA (2009) Personal information protection and electronic documents act (2000, c. 5). http://laws. justice. gc. ca/en/showtdm/cs/P-8. 6.
    • (2009) PIPEDA
  • 22
    • 79952004092 scopus 로고    scopus 로고
    • Australia's national privacy regulator: privacy act
    • Australia's national privacy regulator: privacy act. http://www. privacy. gov. au/law/act.
  • 23
    • 79952004251 scopus 로고
    • Guidelines on the protection of privacy and transborder flows of personal data, organization for economic cooperation and development
    • OECD (1980) Guidelines on the protection of privacy and transborder flows of personal data, organization for economic cooperation and development. http://www. oecd. org/document/18/0, 2340, en_2649_34255_1815186_1_1_1_1, 00. html.
    • (1980) OECD
  • 25
    • 79952008075 scopus 로고    scopus 로고
    • United States Department of Justice, Workforce investment act of 1998, SEC. 508
    • United States Department of Justice, Workforce investment act of 1998, SEC. 508. electronic and information technology. http://www. justice. gov/crt/508/508law. php.
    • electronic and information technology
  • 26
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulatory rules for privacy and security requirements
    • Breaux T, Antón A (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Softw Eng 34(1): 5-20.
    • (2008) IEEE Trans Softw Eng , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.1    Antón, A.2
  • 28
  • 29
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: use cases with hostile intent
    • Alexander I (2003) Misuse cases: use cases with hostile intent. IEEE Softw 20(1): 58-66.
    • (2003) IEEE Softw , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 30
    • 79952005049 scopus 로고    scopus 로고
    • OWASP, Risk rating methodology
    • OWASP, Risk rating methodology. http://www. owasp. org/index. php/OWASP_Risk_Rating_Methodology.
  • 31
    • 0009793176 scopus 로고    scopus 로고
    • Improving web application security: threats and countermeasures
    • MSDN Library, Improving web application security: threats and countermeasures.
    • MSDN Library
  • 32
    • 79952006503 scopus 로고    scopus 로고
    • NIST, Risk management guide for information technology systems, special publication
    • NIST, Risk management guide for information technology systems, special publication 800-30. http://csrc. nist. gov/publications/nistpubs/800-30/sp800-30. pdf.
  • 33
    • 79952004930 scopus 로고    scopus 로고
    • C. S. E. Institute, OCTAVE
    • C. S. E. Institute, OCTAVE. http://www.cert.org/octave/
  • 35
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: the pris method
    • Kalloniatis C, Kavakli E, Gritzalis S (2008) Addressing privacy requirements in system design: the pris method. Requir Eng 13: 241-255. http://dx. doi. org/10. 1007/s00766-008-0067-3.
    • (2008) Requir Eng , vol.13 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 36
    • 79952005555 scopus 로고    scopus 로고
    • PETs, Annual symposium on privacy enhancing technologies, homepage
    • PETs, Annual symposium on privacy enhancing technologies, homepage. http://petsymposium. org/.
  • 37
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2): 84-88.
    • (1981) Commun ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 38
    • 0022145479 scopus 로고
    • Security without identification: transaction systems to make big brother obsolete
    • Chaum D (1985) Security without identification: transaction systems to make big brother obsolete. Commun ACM 28(10): 1030-1044.
    • (1985) Commun ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 39
    • 0023861309 scopus 로고
    • The dining cryptographers problem: unconditional sender and recipient untraceability
    • Chaum D (1988) The dining cryptographers problem: unconditional sender and recipient untraceability. J Cryptol 1(1): 65-75.
    • (1988) J Cryptol , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 41
    • 84955557456 scopus 로고    scopus 로고
    • Anderson R (ed) Proceedings of information hiding: first international workshop. Springer-Verlag, LNCS 1174
    • Goldschlag DM, Reed MG, Syverson PF (1996) Hiding routing information. In: Anderson R (ed) Proceedings of information hiding: first international workshop. Springer-Verlag, LNCS 1174, pp 137-150.
    • (1996) Hiding routing information , pp. 137-150
    • Goldschlag, D.M.1    Reed, M.G.2    Syverson, P.F.3
  • 42
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: anonymity for web transactions
    • Reiter M, Rubin A (1998) Crowds: anonymity for web transactions. ACM Transact Inf Syst Secur 1(1): 1-23. http://avirubin. com/crowds. pdf.
    • (1998) ACM Transact Inf Syst Secur , vol.1 , Issue.1 , pp. 1-23
    • Reiter, M.1    Rubin, A.2
  • 43
    • 79952005132 scopus 로고    scopus 로고
    • to: Cypherpunk tutorial
    • Bacard A, Anonymous. to: Cypherpunk tutorial. http://www. andrebacard. com/remail. html.
    • Bacard, A.1    Anonymous2
  • 44
    • 79952009202 scopus 로고    scopus 로고
    • Mixmaster, Mixmaster homepage
    • Mixmaster, Mixmaster homepage. http://mixmaster. sourceforge. net/.
  • 45
    • 79952004822 scopus 로고    scopus 로고
    • Mixminion, Mixminion officia site
    • Mixminion, Mixminion officia site. http://mixminion. net/.
  • 46
    • 79952007803 scopus 로고    scopus 로고
    • Freedom systems 2. 1 security issues and analysis white paper, Zero Knowledge Systems, Inc
    • Back A, Goldberg I, Shostack A (2001) Freedom systems 2. 1 security issues and analysis, white paper, Zero Knowledge Systems, Inc.
    • (2001)
    • Back, A.1    Goldberg, I.2    Shostack, A.3
  • 47
    • 84937578170 scopus 로고    scopus 로고
    • In: Federrath H (ed) Proceedings of designing privacy enhancing technologies: workshop on design issues in anonymity and unobservability, Springer-Verlag, LNCS 2009
    • Berthold O, Federrath H, Köpsell S (2000) Web MIXes: a system for anonymous and unobservable internet access. In: Federrath H (ed) Proceedings of designing privacy enhancing technologies: workshop on design issues in anonymity and unobservability, Springer-Verlag, LNCS 2009, pp 115-129.
    • (2000) Web MIXes: a system for anonymous and unobservable internet access , pp. 115-129
    • Berthold, O.1    Federrath, H.2    Köpsell, S.3
  • 55
    • 79960836060 scopus 로고    scopus 로고
    • Proceedings of crypto 2002, Springer-Verlag, LNCS 2442
    • Naor M (2002) Deniable ring authentication. In: Proceedings of crypto 2002, Springer-Verlag, LNCS 2442, pp 481-498.
    • (2002) Deniable ring authentication , pp. 481-498
    • Naor, M.1
  • 57
    • 0020312165 scopus 로고
    • In: Proceedings of 23rd IEEE symposium on foundations of computer science
    • Yao ACC (1982) Protocols for secure computations. In: Proceedings of 23rd IEEE symposium on foundations of computer science, pp 160-164.
    • (1982) Protocols for secure computations , pp. 160-164
    • Yao, A.C.C.1
  • 62
    • 84957712978 scopus 로고    scopus 로고
    • On the foundations of oblivious transfer
    • Springer-Verlag, LNCS 1403
    • Cachin C (1998) On the foundations of oblivious transfer. In: Advances in cryptology-Eurocrypt 1998. Springer-Verlag, LNCS 1403, pp 361-374.
    • (1998) Advances in cryptology-Eurocrypt 1998 , pp. 361-374
    • Cachin, C.1
  • 64
    • 4544312695 scopus 로고    scopus 로고
    • Cryptographic techniques for privacy preserving data mining
    • Pinkas B (2002) Cryptographic techniques for privacy preserving data mining. SIGKDD Explor 4(2): 12-19.
    • (2002) SIGKDD Explor , vol.4 , Issue.2 , pp. 12-19
    • Pinkas, B.1
  • 66
    • 33745177806 scopus 로고    scopus 로고
    • Private searching on streaming data
    • Ostrovsky R, Skeith WE III (2005) Private searching on streaming data. CRYPTO pp 223-240.
    • (2005) CRYPTO , pp. 223-240
    • Ostrovsky, R.1    Skeith III, W.E.2
  • 67
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • Sweeney L (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzziness Knowl-Based Syst 10(5): 571-588.
    • (2002) Int J Uncertain Fuzziness Knowl-Based Syst , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 74
    • 70449640064 scopus 로고    scopus 로고
    • In: Proceedings of the 2009 30th IEEE symposium on security and privacy. IEEE Computer Society, Washington, DC
    • Simoens K, Tuyls P, Preneel B (2009) Privacy weaknesses in biometric sketches. In: Proceedings of the 2009 30th IEEE symposium on security and privacy. IEEE Computer Society, Washington, DC, pp 188-203.
    • (2009) Privacy weaknesses in biometric sketches , pp. 188-203
    • Simoens, K.1    Tuyls, P.2    Preneel, B.3
  • 76
    • 43949118608 scopus 로고    scopus 로고
    • A survey of homomorphic encryption for non-specialists
    • Fontaine C, Galand F (2007) A survey of homomorphic encryption for non-specialists. EURASIP J Inf Secur. http://www. hindawi. com/RecentlyAcceptedArticlePDF. aspx?journal=IS& number=13801.
    • (2007) EURASIP J Inf Secur
    • Fontaine, C.1    Galand, F.2
  • 77
    • 0012647694 scopus 로고    scopus 로고
    • Verifiable encryption and applications to group signatures and signature sharing
    • BRICS, Department of Computer Science, University of Aarhus
    • Camenisch J, Damgard I (1998) Verifiable encryption and applications to group signatures and signature sharing. In: Technical report RS-98-32, BRICS, Department of Computer Science, University of Aarhus.
    • (1998) In: Technical report RS-98-32
    • Camenisch, J.1    Damgard, I.2
  • 81
    • 79952005616 scopus 로고    scopus 로고
    • eXtensible access control markup language: XACML 3.0
    • OASIS, eXtensible access control markup language: XACML 3. 0. http://xml. coverpages. org/xacml. html.
    • OASIS
  • 82
    • 79952007297 scopus 로고    scopus 로고
    • Enterprise privacy authorization language: EPAL 1.2
    • IBM, Enterprise privacy authorization language: EPAL 1. 2. http://www. w3. org/Submission/2003/SUBM-E.
    • IBM
  • 83
    • 85091951704 scopus 로고    scopus 로고
    • In: Churchill EF, Dhamija R (eds) Proceedings of the 1st conference on usability, psychology, and security, USENIX Association, Berkeley, CA, USA
    • Lipford HR, Besmer A, Watson J (2008) Understanding privacy settings in facebook with an audience view. In: Churchill EF, Dhamija R (eds) Proceedings of the 1st conference on usability, psychology, and security, USENIX Association, Berkeley, CA, USA. http://www. usenix. org/events/upsec08/tech/full_papers/lipford/lipford. pdf.
    • (2008) Understanding privacy settings in facebook with an audience view
    • Lipford, H.R.1    Besmer, A.2    Watson, J.3
  • 85
    • 79952003813 scopus 로고    scopus 로고
    • Enforcing access control in social networks. HotPets
    • Beato F, Kohlweiss M, Wouters K (2009) Enforcing access control in social networks. HotPets. http://www. cosic. esat. kuleuven. be/publications/article-1240. pdf.
    • (2009)
    • Beato, F.1    Kohlweiss, M.2    Wouters, K.3
  • 86
    • 79952009166 scopus 로고    scopus 로고
    • The European PrimeLife research project-privacy and identity management in Europe for life
    • PrimeLife, The European PrimeLife research project-privacy and identity management in Europe for life. http://www. primelife. eu/.
    • PrimeLife
  • 87
    • 0026883734 scopus 로고
    • Representing and using non-functional requirements: a process-oriented approach
    • Mylopoulos J, Chung L, Nixon B (1992) Representing and using non-functional requirements: a process-oriented approach. IEEE Transact Softw Eng 18: 483-497.
    • (1992) IEEE Transact Softw Eng , vol.18 , pp. 483-497
    • Mylopoulos, J.1    Chung, L.2    Nixon, B.3
  • 90
    • 79952003114 scopus 로고    scopus 로고
    • In: Proceedings of the 2nd symposium on requirements engineering for information security, SREIS-02
    • Yu E, Cysneiros LM (2002) Designing for privacy and other competing requirements. In: Proceedings of the 2nd symposium on requirements engineering for information security, SREIS-02, pp 15-16.
    • (2002) Designing for privacy and other competing requirements , pp. 15-16
    • Yu, E.1    Cysneiros, L.M.2
  • 91
    • 84942866002 scopus 로고    scopus 로고
    • Security and privacy requirements analysis within a social setting
    • Liu L, Yu E, Mylopoulos J (2003) Security and privacy requirements analysis within a social setting. Requir Eng IEEE Int Conf 0: 151.
    • (2003) Requir Eng IEEE Int Conf , vol.0 , pp. 151
    • Liu, L.1    Yu, E.2    Mylopoulos, J.3
  • 92
    • 67049134882 scopus 로고    scopus 로고
    • Computer-aided privacy requirements elicitation technique. Asia-Pacific conference on services computing
    • Miyazaki S, Mead N, Zhan J (2008) Computer-aided privacy requirements elicitation technique. Asia-Pacific conference on services computing. 2006 IEEE, pp 367-372.
    • (2008) 2006 IEEE , pp. 367-372
    • Miyazaki, S.1    Mead, N.2    Zhan, J.3
  • 93
    • 35048861274 scopus 로고    scopus 로고
    • In: RE '02: Proceedings of the 10th anniversary IEEE joint international conference on requirements engineering. IEEE Computer Society
    • Antón AI, Earp JB, Reese A (2002) Analyzing website privacy requirements using a privacy goal taxonomy. In: RE '02: Proceedings of the 10th anniversary IEEE joint international conference on requirements engineering. IEEE Computer Society, pp 23-31.
    • (2002) Analyzing website privacy requirements using a privacy goal taxonomy , pp. 23-31
    • Antón, A.I.1    Earp, J.B.2    Reese, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.