-
1
-
-
17744386105
-
-
Proceedings of the RE03 workshop on requirements for high assurance systems (RHAS03)
-
Lamsweerde AV, Brohez S, Landtsheer RD, Janssens D, Informatique DD (2003) From system goals to intruder anti-goals: attack generation and resolution for security requirements engineering. In: Proceedings of the RE03 workshop on requirements for high assurance systems (RHAS03), pp 49-56.
-
(2003)
From system goals to intruder anti-goals: attack generation and resolution for security requirements engineering.
, pp. 49-56
-
-
Lamsweerde, A.V.1
Brohez, S.2
Landtsheer, R.D.3
Janssens, D.4
Informatique, D.D.5
-
4
-
-
77950605126
-
Software security: building security
-
Boston, NY
-
Mcgraw G (2006) Software security: building security. Addison-Wesley Professional, Boston, NY.
-
(2006)
Addison-Wesley Professional
-
-
McGraw, G.1
-
6
-
-
79952002284
-
-
Proceedings of the 7th international workshop on requirements engineering, foundation for software quality
-
Andreas GS, Opdahl AL (2001) Templates for misuse case description. In: Proceedings of the 7th international workshop on requirements engineering, foundation for software quality, pp 4-5.
-
(2001)
Templates for misuse case description
, pp. 4-5
-
-
Andreas, G.S.1
Opdahl, A.L.2
-
7
-
-
60949097689
-
Experimental comparison of attack trees and misuse cases for security threat identification
-
SPECIAL ISSUE: Model-Driven Development for Secure Information Systems
-
Opdahl AL, Sindre G (2009) Experimental comparison of attack trees and misuse cases for security threat identification. Inf Softw Technol 51(5): 916-932. SPECIAL ISSUE: Model-Driven Development for Secure Information Systems.
-
(2009)
Inf Softw Technol
, vol.51
, Issue.5
, pp. 916-932
-
-
Opdahl, A.L.1
Sindre, G.2
-
8
-
-
33644925852
-
A taxonomy of privacy
-
GWU Law School Public Law Research Paper No. 129
-
Solove DJ (2006) A taxonomy of privacy. Univ PA Law Rev 154(3): 477; GWU Law School Public Law Research Paper No. 129.
-
(2006)
Univ PA Law Rev
, vol.154
, Issue.3
, pp. 477
-
-
Solove, D.J.1
-
10
-
-
78649989557
-
-
Version 0. 33 April 2010), technical report, TU Dresden and ULD Kiel
-
Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (Version 0. 33 April 2010), technical report, TU Dresden and ULD Kiel, http://dud. inf. tu-dresden. de/Anon_Terminology. shtml.
-
(2010)
A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management
-
-
Pfitzmann, A.1
Hansen, M.2
-
11
-
-
79952002252
-
-
Cunningham P, Cunningham M (eds) Collaboration and the knowledge economy: issues, applications, case studies, Proceedings of eChallenges, IOS Press, Amsterdam
-
Hansen M (2008) Linkage control integrating the essence of privacy protection into identity management systems. In: Cunningham P, Cunningham M (eds) Collaboration and the knowledge economy: issues, applications, case studies, Proceedings of eChallenges, IOS Press, Amsterdam, pp 1585-1592.
-
(2008)
Linkage control integrating the essence of privacy protection into identity management systems
, pp. 1585-1592
-
-
Hansen, M.1
-
12
-
-
79952003363
-
-
Talk: an introduction to u-prove privacy protection technology, and its role in the identity metasystem-what future for privacy technology
-
Danezis G (2008) Talk: an introduction to u-prove privacy protection technology, and its role in the identity metasystem-what future for privacy technology. http://www. petsfinebalance. com/agenda/index. php.
-
(2008)
-
-
Danezis, G.1
-
13
-
-
79952004582
-
-
ISO 17799 (2000) Information technology code of practice for information security management, technical report, British Standards Institute
-
ISO 17799 (2000) Information technology code of practice for information security management, technical report, British Standards Institute.
-
(2000)
-
-
-
14
-
-
0344661881
-
-
Clare College, PhD thesis, University of Cambridge
-
Roe M (1997) Cryptography and evidence. PhD thesis, University of Cambridge, Clare College.
-
(1997)
Cryptography and evidence
-
-
Roe, M.1
-
16
-
-
19944367736
-
Personal privacy through understanding and action: five pitfalls for designers
-
Lederer S, Hong JI, Dey AK, Landay JA (2004) Personal privacy through understanding and action: five pitfalls for designers. Pers Ubiquitous Comput 8: 440-454.
-
(2004)
Pers Ubiquitous Comput
, vol.8
, pp. 440-454
-
-
Lederer, S.1
Hong, J.I.2
Dey, A.K.3
Landay, J.A.4
-
18
-
-
79952002907
-
-
P3P, Platform for privacy preferences project, W3C P3P specifications
-
P3P, Platform for privacy preferences project, W3C P3P specifications. http://www. w3. org/TR/P3P/.
-
-
-
-
19
-
-
0003187764
-
Directive 95/46/EC of the European parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
EU
-
EU (1995) Directive 95/46/EC of the European parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off J Eur Commun 281: 31-50. http://europa. eu/scadplus/leg/en/lvb/l14012. htm.
-
(1995)
Off J Eur Commun
, vol.281
, pp. 31-50
-
-
-
20
-
-
79952006925
-
-
HIPAA administrative simplification: enforcement; final rul United States Department of Health & Human Service
-
HIPAA (2006) HIPAA administrative simplification: enforcement; final rule. United States Department of Health & Human Service. Fed Regist Rules Regul 71(32): 8390-8433. http://www. hhs. gov/ocr/privacy/hipaa/administrative/privacyrule/finalenforcementrule06. pdf.
-
(2006)
HIPAA administrative simplification: enforcement; final rule
, vol.71
, Issue.32
, pp. 8390-8433
-
-
-
21
-
-
79952009627
-
-
Personal information protection and electronic documents act (2000, c. 5)
-
PIPEDA (2009) Personal information protection and electronic documents act (2000, c. 5). http://laws. justice. gc. ca/en/showtdm/cs/P-8. 6.
-
(2009)
PIPEDA
-
-
-
22
-
-
79952004092
-
-
Australia's national privacy regulator: privacy act
-
Australia's national privacy regulator: privacy act. http://www. privacy. gov. au/law/act.
-
-
-
-
23
-
-
79952004251
-
-
Guidelines on the protection of privacy and transborder flows of personal data, organization for economic cooperation and development
-
OECD (1980) Guidelines on the protection of privacy and transborder flows of personal data, organization for economic cooperation and development. http://www. oecd. org/document/18/0, 2340, en_2649_34255_1815186_1_1_1_1, 00. html.
-
(1980)
OECD
-
-
-
24
-
-
58049178595
-
-
RE'08: Proceedings of the 16th IEEE international requirements engineering conference (RE'08), IEEE Society Press
-
Breaux TD, Anton AI, Boucher, Dorfman M (2008) Legal requirements, compliance and practice: an industry case study in accessibility. In: RE'08: Proceedings of the 16th IEEE international requirements engineering conference (RE'08), IEEE Society Press, pp 43-52.
-
(2008)
Legal requirements, compliance and practice: an industry case study in accessibility.
, pp. 43-52
-
-
Breaux, T.D.1
Anton, A.I.2
Boucher3
Dorfman, M.4
-
25
-
-
79952008075
-
-
United States Department of Justice, Workforce investment act of 1998, SEC. 508
-
United States Department of Justice, Workforce investment act of 1998, SEC. 508. electronic and information technology. http://www. justice. gov/crt/508/508law. php.
-
electronic and information technology
-
-
-
26
-
-
40449096076
-
Analyzing regulatory rules for privacy and security requirements
-
Breaux T, Antón A (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Softw Eng 34(1): 5-20.
-
(2008)
IEEE Trans Softw Eng
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.1
Antón, A.2
-
27
-
-
84862757673
-
-
Boca Raton, FL: Chapman and Hall
-
Danezis G, Diaz C, Syverson P (2009) Systems for anonymous communication. In: CRC handbook of financial cryptography and security. Chapman and Hall, Boca Raton, FL, p 61.
-
(2009)
Systems for Anonymous Communication. In: CRC Handbook of Financial Cryptography and Security
, pp. 61
-
-
Danezis, G.1
Diaz, C.2
Syverson, P.3
-
28
-
-
0036811662
-
K-anonymity: a model for protecting privacy
-
Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst 10(5): 557-570.
-
(2002)
Int J Uncertain Fuzziness Knowl-Based Syst
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
29
-
-
0037240812
-
Misuse cases: use cases with hostile intent
-
Alexander I (2003) Misuse cases: use cases with hostile intent. IEEE Softw 20(1): 58-66.
-
(2003)
IEEE Softw
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
30
-
-
79952005049
-
-
OWASP, Risk rating methodology
-
OWASP, Risk rating methodology. http://www. owasp. org/index. php/OWASP_Risk_Rating_Methodology.
-
-
-
-
31
-
-
0009793176
-
-
Improving web application security: threats and countermeasures
-
MSDN Library, Improving web application security: threats and countermeasures.
-
MSDN Library
-
-
-
32
-
-
79952006503
-
-
NIST, Risk management guide for information technology systems, special publication
-
NIST, Risk management guide for information technology systems, special publication 800-30. http://csrc. nist. gov/publications/nistpubs/800-30/sp800-30. pdf.
-
-
-
-
33
-
-
79952004930
-
-
C. S. E. Institute, OCTAVE
-
C. S. E. Institute, OCTAVE. http://www.cert.org/octave/
-
-
-
-
34
-
-
70349676044
-
Linking privacy solutions to developer goals
-
Wuyts K, Scandariato R, Decker BD, Joosen W (2009) Linking privacy solutions to developer goals. Availability, reliability and security, international conference on 0: 847-852.
-
(2009)
Availability, reliability and security, international conference on 0
, pp. 847-852
-
-
Wuyts, K.1
Scandariato, R.2
Decker, B.D.3
Joosen, W.4
-
35
-
-
50949085110
-
Addressing privacy requirements in system design: the pris method
-
Kalloniatis C, Kavakli E, Gritzalis S (2008) Addressing privacy requirements in system design: the pris method. Requir Eng 13: 241-255. http://dx. doi. org/10. 1007/s00766-008-0067-3.
-
(2008)
Requir Eng
, vol.13
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
36
-
-
79952005555
-
-
PETs, Annual symposium on privacy enhancing technologies, homepage
-
PETs, Annual symposium on privacy enhancing technologies, homepage. http://petsymposium. org/.
-
-
-
-
37
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2): 84-88.
-
(1981)
Commun ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
38
-
-
0022145479
-
Security without identification: transaction systems to make big brother obsolete
-
Chaum D (1985) Security without identification: transaction systems to make big brother obsolete. Commun ACM 28(10): 1030-1044.
-
(1985)
Commun ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
39
-
-
0023861309
-
The dining cryptographers problem: unconditional sender and recipient untraceability
-
Chaum D (1988) The dining cryptographers problem: unconditional sender and recipient untraceability. J Cryptol 1(1): 65-75.
-
(1988)
J Cryptol
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
41
-
-
84955557456
-
-
Anderson R (ed) Proceedings of information hiding: first international workshop. Springer-Verlag, LNCS 1174
-
Goldschlag DM, Reed MG, Syverson PF (1996) Hiding routing information. In: Anderson R (ed) Proceedings of information hiding: first international workshop. Springer-Verlag, LNCS 1174, pp 137-150.
-
(1996)
Hiding routing information
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
42
-
-
0002054934
-
Crowds: anonymity for web transactions
-
Reiter M, Rubin A (1998) Crowds: anonymity for web transactions. ACM Transact Inf Syst Secur 1(1): 1-23. http://avirubin. com/crowds. pdf.
-
(1998)
ACM Transact Inf Syst Secur
, vol.1
, Issue.1
, pp. 1-23
-
-
Reiter, M.1
Rubin, A.2
-
43
-
-
79952005132
-
-
to: Cypherpunk tutorial
-
Bacard A, Anonymous. to: Cypherpunk tutorial. http://www. andrebacard. com/remail. html.
-
-
-
Bacard, A.1
Anonymous2
-
44
-
-
79952009202
-
-
Mixmaster, Mixmaster homepage
-
Mixmaster, Mixmaster homepage. http://mixmaster. sourceforge. net/.
-
-
-
-
45
-
-
79952004822
-
-
Mixminion, Mixminion officia site
-
Mixminion, Mixminion officia site. http://mixminion. net/.
-
-
-
-
46
-
-
79952007803
-
-
Freedom systems 2. 1 security issues and analysis white paper, Zero Knowledge Systems, Inc
-
Back A, Goldberg I, Shostack A (2001) Freedom systems 2. 1 security issues and analysis, white paper, Zero Knowledge Systems, Inc.
-
(2001)
-
-
Back, A.1
Goldberg, I.2
Shostack, A.3
-
47
-
-
84937578170
-
-
In: Federrath H (ed) Proceedings of designing privacy enhancing technologies: workshop on design issues in anonymity and unobservability, Springer-Verlag, LNCS 2009
-
Berthold O, Federrath H, Köpsell S (2000) Web MIXes: a system for anonymous and unobservable internet access. In: Federrath H (ed) Proceedings of designing privacy enhancing technologies: workshop on design issues in anonymity and unobservability, Springer-Verlag, LNCS 2009, pp 115-129.
-
(2000)
Web MIXes: a system for anonymous and unobservable internet access
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
52
-
-
3142632089
-
Just fast keying: key agreement in a hostile internet
-
Aiello W, Bellovin SM, Blaze M, Canetti R, Ioannidis J, Keromytis AD, Reingold O (2004) Just fast keying: key agreement in a hostile internet. ACM Trans Inf Syst Secur 7: 2004.
-
(2004)
ACM Trans Inf Syst Secur
, vol.7
, pp. 2004
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Canetti, R.4
Ioannidis, J.5
Keromytis, A.D.6
Reingold, O.7
-
55
-
-
79960836060
-
-
Proceedings of crypto 2002, Springer-Verlag, LNCS 2442
-
Naor M (2002) Deniable ring authentication. In: Proceedings of crypto 2002, Springer-Verlag, LNCS 2442, pp 481-498.
-
(2002)
Deniable ring authentication
, pp. 481-498
-
-
Naor, M.1
-
56
-
-
20444490057
-
-
Proceedings of the 2004 ACM workshop on privacy in the electronic society. ACM New York, NY
-
Borisov N, Goldberg I, Brewer E (2004) Off-the-record communication, or, why not to use PGP. In: Proceedings of the 2004 ACM workshop on privacy in the electronic society. ACM New York, NY, pp. 77-84.
-
(2004)
Off-the-record communication, or, why not to use PGP
, pp. 77-84
-
-
Borisov, N.1
Goldberg, I.2
Brewer, E.3
-
57
-
-
0020312165
-
-
In: Proceedings of 23rd IEEE symposium on foundations of computer science
-
Yao ACC (1982) Protocols for secure computations. In: Proceedings of 23rd IEEE symposium on foundations of computer science, pp 160-164.
-
(1982)
Protocols for secure computations
, pp. 160-164
-
-
Yao, A.C.C.1
-
59
-
-
70449671086
-
-
In: Proceedings of the 11th ACM workshop on multimedia and security (Princeton, NJ). ACM, New York, NY
-
Deng M, Bianchi T, Piva A, Preneel B (2009) An efficient buyer-seller watermarking protocol based on composite signal representation. In: Proceedings of the 11th ACM workshop on multimedia and security (Princeton, NJ). ACM, New York, NY, pp 9-18.
-
(2009)
An efficient buyer-seller watermarking protocol based on composite signal representation
, pp. 9-18
-
-
Deng, M.1
Bianchi, T.2
Piva, A.3
Preneel, B.4
-
62
-
-
84957712978
-
On the foundations of oblivious transfer
-
Springer-Verlag, LNCS 1403
-
Cachin C (1998) On the foundations of oblivious transfer. In: Advances in cryptology-Eurocrypt 1998. Springer-Verlag, LNCS 1403, pp 361-374.
-
(1998)
Advances in cryptology-Eurocrypt 1998
, pp. 361-374
-
-
Cachin, C.1
-
63
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
Verykios V, Bertino E, Fovino I, Provenza L, Saygin Y, Theodoridis Y (2004) State-of-the-art in privacy preserving data mining. ACM SIGMOD Record 3: 50-57.
-
(2004)
ACM SIGMOD Record
, vol.3
, pp. 50-57
-
-
Verykios, V.1
Bertino, E.2
Fovino, I.3
Provenza, L.4
Saygin, Y.5
Theodoridis, Y.6
-
64
-
-
4544312695
-
Cryptographic techniques for privacy preserving data mining
-
Pinkas B (2002) Cryptographic techniques for privacy preserving data mining. SIGKDD Explor 4(2): 12-19.
-
(2002)
SIGKDD Explor
, vol.4
, Issue.2
, pp. 12-19
-
-
Pinkas, B.1
-
65
-
-
33745134401
-
-
In: Proceeding of CRYPTO. Springer-Verlag
-
Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. In: Proceeding of CRYPTO. Springer-Verlag, pp 205-222.
-
(2005)
Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions
, pp. 205-222
-
-
Abdalla, M.1
Bellare, M.2
Catalano, D.3
Kiltz, E.4
Kohno, T.5
Lange, T.6
Malone-lee, J.7
Neven, G.8
Paillier, P.9
Shi, H.10
-
66
-
-
33745177806
-
Private searching on streaming data
-
Ostrovsky R, Skeith WE III (2005) Private searching on streaming data. CRYPTO pp 223-240.
-
(2005)
CRYPTO
, pp. 223-240
-
-
Ostrovsky, R.1
Skeith III, W.E.2
-
67
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
Sweeney L (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzziness Knowl-Based Syst 10(5): 571-588.
-
(2002)
Int J Uncertain Fuzziness Knowl-Based Syst
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
70
-
-
1642355346
-
-
In, Workshop on privacy in the electronic society, ACM, Washington, DC
-
Moskowitz I, Newman RE, Crepeau DP, Miller AR (2003) Covert channels and anonymizing networks. In: Workshop on privacy in the electronic society, ACM, Washington, DC, pp 79-88.
-
(2003)
Covert channels and anonymizing networks
, pp. 79-88
-
-
Moskowitz, I.1
Newman, R.E.2
Crepeau, D.P.3
Miller, A.R.4
-
72
-
-
1642281602
-
-
Inf Secur Tech Rep (ISTR)
-
Hansen M, Berlich P, Camenisch J, Clauß S, Pfitzmann A, Waidner M (2004) Privacy-enhancing identity management. Inf Secur Tech Rep (ISTR) 9(1): 35-44. http://dx. doi. org/10. 1016/S1363-4127(04)00014-7).
-
(2004)
Privacy-enhancing identity management
, vol.9
, Issue.1
, pp. 35-44
-
-
Hansen, M.1
Berlich, P.2
Camenisch, J.3
Clauß, S.4
Pfitzmann, A.5
Waidner, M.6
-
74
-
-
70449640064
-
-
In: Proceedings of the 2009 30th IEEE symposium on security and privacy. IEEE Computer Society, Washington, DC
-
Simoens K, Tuyls P, Preneel B (2009) Privacy weaknesses in biometric sketches. In: Proceedings of the 2009 30th IEEE symposium on security and privacy. IEEE Computer Society, Washington, DC, pp 188-203.
-
(2009)
Privacy weaknesses in biometric sketches
, pp. 188-203
-
-
Simoens, K.1
Tuyls, P.2
Preneel, B.3
-
76
-
-
43949118608
-
A survey of homomorphic encryption for non-specialists
-
Fontaine C, Galand F (2007) A survey of homomorphic encryption for non-specialists. EURASIP J Inf Secur. http://www. hindawi. com/RecentlyAcceptedArticlePDF. aspx?journal=IS& number=13801.
-
(2007)
EURASIP J Inf Secur
-
-
Fontaine, C.1
Galand, F.2
-
77
-
-
0012647694
-
Verifiable encryption and applications to group signatures and signature sharing
-
BRICS, Department of Computer Science, University of Aarhus
-
Camenisch J, Damgard I (1998) Verifiable encryption and applications to group signatures and signature sharing. In: Technical report RS-98-32, BRICS, Department of Computer Science, University of Aarhus.
-
(1998)
In: Technical report RS-98-32
-
-
Camenisch, J.1
Damgard, I.2
-
78
-
-
0035790754
-
-
In, SACMAT
-
Georgiadis CK, Mavridis I, Pangalos G, Thomas RK (2001) Flexible team-based access control using contexts. In: SACMAT, pp 21-27.
-
(2001)
Flexible team-based access control using contexts
, pp. 21-27
-
-
Georgiadis, C.K.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.K.4
-
80
-
-
71849091813
-
Exploiting cryptography for privacy-enhanced access control: a result of the PRIME project
-
Ardagna CA, Camenisch J, Kohlweiss M, Leenes R, Neven G, Priem B, Samarati P, Sommer D, Verdicchio M (2009) Exploiting cryptography for privacy-enhanced access control: a result of the PRIME project. J Comput Secur 18(1): 123-160.
-
(2009)
J Comput Secur
, vol.18
, Issue.1
, pp. 123-160
-
-
Ardagna, C.A.1
Camenisch, J.2
Kohlweiss, M.3
Leenes, R.4
Neven, G.5
Priem, B.6
Samarati, P.7
Sommer, D.8
Verdicchio, M.9
-
81
-
-
79952005616
-
-
eXtensible access control markup language: XACML 3.0
-
OASIS, eXtensible access control markup language: XACML 3. 0. http://xml. coverpages. org/xacml. html.
-
OASIS
-
-
-
82
-
-
79952007297
-
-
Enterprise privacy authorization language: EPAL 1.2
-
IBM, Enterprise privacy authorization language: EPAL 1. 2. http://www. w3. org/Submission/2003/SUBM-E.
-
IBM
-
-
-
83
-
-
85091951704
-
-
In: Churchill EF, Dhamija R (eds) Proceedings of the 1st conference on usability, psychology, and security, USENIX Association, Berkeley, CA, USA
-
Lipford HR, Besmer A, Watson J (2008) Understanding privacy settings in facebook with an audience view. In: Churchill EF, Dhamija R (eds) Proceedings of the 1st conference on usability, psychology, and security, USENIX Association, Berkeley, CA, USA. http://www. usenix. org/events/upsec08/tech/full_papers/lipford/lipford. pdf.
-
(2008)
Understanding privacy settings in facebook with an audience view
-
-
Lipford, H.R.1
Besmer, A.2
Watson, J.3
-
85
-
-
79952003813
-
-
Enforcing access control in social networks. HotPets
-
Beato F, Kohlweiss M, Wouters K (2009) Enforcing access control in social networks. HotPets. http://www. cosic. esat. kuleuven. be/publications/article-1240. pdf.
-
(2009)
-
-
Beato, F.1
Kohlweiss, M.2
Wouters, K.3
-
86
-
-
79952009166
-
-
The European PrimeLife research project-privacy and identity management in Europe for life
-
PrimeLife, The European PrimeLife research project-privacy and identity management in Europe for life. http://www. primelife. eu/.
-
PrimeLife
-
-
-
87
-
-
0026883734
-
Representing and using non-functional requirements: a process-oriented approach
-
Mylopoulos J, Chung L, Nixon B (1992) Representing and using non-functional requirements: a process-oriented approach. IEEE Transact Softw Eng 18: 483-497.
-
(1992)
IEEE Transact Softw Eng
, vol.18
, pp. 483-497
-
-
Mylopoulos, J.1
Chung, L.2
Nixon, B.3
-
90
-
-
79952003114
-
-
In: Proceedings of the 2nd symposium on requirements engineering for information security, SREIS-02
-
Yu E, Cysneiros LM (2002) Designing for privacy and other competing requirements. In: Proceedings of the 2nd symposium on requirements engineering for information security, SREIS-02, pp 15-16.
-
(2002)
Designing for privacy and other competing requirements
, pp. 15-16
-
-
Yu, E.1
Cysneiros, L.M.2
-
91
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
Liu L, Yu E, Mylopoulos J (2003) Security and privacy requirements analysis within a social setting. Requir Eng IEEE Int Conf 0: 151.
-
(2003)
Requir Eng IEEE Int Conf
, vol.0
, pp. 151
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
92
-
-
67049134882
-
Computer-aided privacy requirements elicitation technique. Asia-Pacific conference on services computing
-
Miyazaki S, Mead N, Zhan J (2008) Computer-aided privacy requirements elicitation technique. Asia-Pacific conference on services computing. 2006 IEEE, pp 367-372.
-
(2008)
2006 IEEE
, pp. 367-372
-
-
Miyazaki, S.1
Mead, N.2
Zhan, J.3
-
93
-
-
35048861274
-
-
In: RE '02: Proceedings of the 10th anniversary IEEE joint international conference on requirements engineering. IEEE Computer Society
-
Antón AI, Earp JB, Reese A (2002) Analyzing website privacy requirements using a privacy goal taxonomy. In: RE '02: Proceedings of the 10th anniversary IEEE joint international conference on requirements engineering. IEEE Computer Society, pp 23-31.
-
(2002)
Analyzing website privacy requirements using a privacy goal taxonomy
, pp. 23-31
-
-
Antón, A.I.1
Earp, J.B.2
Reese, A.3
|