메뉴 건너뛰기




Volumn 352 AICT, Issue , 2011, Pages 271-282

Applying formal methods to detect and resolve ambiguities in privacy requirements

Author keywords

[No Author keywords available]

Indexed keywords

FORMAL NOTATIONS; NATURAL LANGUAGES; PRIVACY REQUIREMENTS;

EID: 79958010219     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-20769-3_22     Document Type: Conference Paper
Times cited : (11)

References (17)
  • 3
    • 70449644839 scopus 로고    scopus 로고
    • Information privacy consent and the "control" of personal data
    • doi:10.1016/j.istr, 10.001
    • Whitley, E.A.: Information privacy consent and the "control" of personal data, Inform. Secur. Tech. Rep. (2009), doi:10.1016/j.istr, 10.001
    • (2009) Inform. Secur. Tech. Rep.
    • Whitley, E.A.1
  • 4
    • 84865497154 scopus 로고    scopus 로고
    • Perceptions of government technology, surveillance and privacy: The UK identity cards scheme
    • Neyland, D., Goold, B. (eds.) William, Gullompton
    • Whitley, E.A.: Perceptions of government technology, surveillance and privacy: the UK identity cards scheme. In: Neyland, D., Goold, B. (eds.) New Directions in Privacy and Surveillance, pp. 133-156. William, Gullompton (2009)
    • (2009) New Directions in Privacy and Surveillance , pp. 133-156
    • Whitley, E.A.1
  • 5
    • 84864168760 scopus 로고    scopus 로고
    • EnCoRe, http://www.encore-project.info
  • 6
    • 84943621288 scopus 로고    scopus 로고
    • Reaching for informed revocation: Shutting off the tap on personal data
    • Bezzi, M., Duquenoy, P., Fischer-Hübner, S., Hansen, M., Zhang, G. (eds.) Privacy and Identity Management for Life. Springer, Heidelberg
    • Agrafiotis, I., Creese, S., Goldsmith, M., Papanikolaou, N.: Reaching for informed revocation: Shutting off the tap on personal data. In: Bezzi, M., Duquenoy, P., Fischer-Hübner, S., Hansen, M., Zhang, G. (eds.) Privacy and Identity Management for Life. IFIP AICT, vol. 320, pp. 246-258. Springer, Heidelberg (2010)
    • (2010) IFIP AICT , vol.320 , pp. 246-258
    • Agrafiotis, I.1    Creese, S.2    Goldsmith, M.3    Papanikolaou, N.4
  • 9
    • 77953096967 scopus 로고    scopus 로고
    • Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization
    • Ohm, P.: Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, University of Colorado Law Legal Studies Research Paper No. 09-12 (2009), http://ssrn.com/abstract=1450006
    • (2009) University of Colorado Law Legal Studies Research Paper No. 09-12
    • Ohm, P.1
  • 10
    • 0035517699 scopus 로고    scopus 로고
    • Protecting Respondents' Identities in Microdata Release
    • Samarati, P.: Protecting Respondents' Identities in Microdata Release. IEEE Trans. Knowl. Data Eng. 13(6) (2001)
    • (2001) IEEE Trans. Knowl. Data Eng. , vol.13 , Issue.6
    • Samarati, P.1
  • 12
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as contextual integrity
    • Nissenbaum, H.: Privacy as contextual integrity. Washington Law Review 79(1) (2004)
    • (2004) Washington Law Review , vol.79 , Issue.1
    • Nissenbaum, H.1
  • 15
    • 84855820494 scopus 로고    scopus 로고
    • Enterprise privacy authorization language (EPAL 1.2)
    • Powers, C., Schunter, M.: Enterprise privacy authorization language (EPAL 1.2). W3C Member Submission (2003)
    • (2003) W3C Member Submission
    • Powers, C.1    Schunter, M.2
  • 16
    • 70649102063 scopus 로고    scopus 로고
    • Formal Methods for Privacy
    • Cavalcanti, A., Dams, D.R. (eds.) FM 2009. Springer, Heidelberg
    • Tschantz, M.C., Wing, J.M.: Formal Methods for Privacy. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol. 5850, pp. 1-15. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5850 , pp. 1-15
    • Tschantz, M.C.1    Wing, J.M.2
  • 17
    • 79958014288 scopus 로고    scopus 로고
    • London School of Economics, June 29
    • EnCoRe Press Briefing, London School of Economics, June 29 (2010)
    • (2010) EnCoRe Press Briefing


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.