-
1
-
-
83055186748
-
-
Information & Privacy Commissioner Ontario Canada
-
A. Cavoukian (Information & Privacy Commissioner Ontario, Canada), "Privacy-by-design," http://www.privacybydesign.ca/.
-
Privacy-by-design
-
-
Cavoukian, A.1
-
2
-
-
80455130401
-
-
Consulting
-
I. Linden Consulting, "Privacy impact assessment," http://www.ico.gov.uk/for organisations/data protection/topic guides/privacy impact assessment.aspx, 2007.
-
(2007)
Privacy Impact Assessment
-
-
Linden, I.1
-
4
-
-
80052782295
-
Engineering privacy by design
-
S. F. Gürses, C. Troncoso, and C. Diaz, "Engineering privacy by design," in Computers, Privacy & Data Protection, 2011.
-
(2011)
Computers, Privacy & Data Protection
-
-
Gürses, S.F.1
Troncoso, C.2
Diaz, C.3
-
5
-
-
77957948213
-
Mandatory enforcement of privacy policies using trusted computing principles
-
Stanford: AAAI
-
F. Kargl, F. Schaub, and S. Dietzel, "Mandatory Enforcement of Privacy Policies using Trusted Computing Principles," in Intelligent Information Privacy Maangement Symposium, AAAI Spring Symposium Series. Stanford: AAAI, 2010.
-
(2010)
Intelligent Information Privacy Maangement Symposium, AAAI Spring Symposium Series
-
-
Kargl, F.1
Schaub, F.2
Dietzel, S.3
-
7
-
-
2342613982
-
Goal oriented requirements engineering: A unifying framework
-
Springer-Verlag London
-
E. Kavakli, "Goal oriented requirements engineering: a unifying framework," Requirements Engineering Journal, Springer-Verlag London, vol. 6, 2002.
-
(2002)
Requirements Engineering Journal
, vol.6
-
-
Kavakli, E.1
-
10
-
-
33745849657
-
Foundations of attack trees
-
D. Won and S. Kim, Eds. Springer
-
S. Mauw and M. Oostdijk, "Foundations of attack trees," in ICISC, ser. Lecture Notes in Computer Science, D. Won and S. Kim, Eds., vol. 3935. Springer, 2005.
-
(2005)
ICISC, Ser. Lecture Notes in Computer Science
, vol.3935
-
-
Mauw, S.1
Oostdijk, M.2
-
12
-
-
0002367651
-
Synthesis of synchronization skeletons for branching time temporal logic
-
Springer-Verlag
-
E. M. Clarke and E. A. Emerson, "Synthesis of synchronization skeletons for branching time temporal logic," in In Logic of Programs: Workshop. Springer-Verlag, 1981.
-
(1981)
Logic of Programs: Workshop
-
-
Clarke, E.M.1
Emerson, E.A.2
-
13
-
-
70649102063
-
Formal methods for privacy
-
A. Cavalcanti and D. Dams, Eds. Springer
-
M. Tschantz and J. Wing, "Formal methods for privacy," in Formal Methods, ser. Lecture Notes in Computer Science, A. Cavalcanti and D. Dams, Eds. Springer, 2009, vol. 5850.
-
(2009)
Formal Methods, Ser. Lecture Notes in Computer Science
, vol.5850
-
-
Tschantz, M.1
Wing, J.2
-
15
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
IEEE Computer Society
-
Barth, Adam et al., "Privacy and contextual integrity: Framework and applications," in Proc.s of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 2006.
-
(2006)
Proc.s of the IEEE Symposium on Security and Privacy
-
-
Adam, B.1
-
17
-
-
80455130399
-
A formal privacy management framework
-
P. Degano, J. Guttman, and F. Martinelli, Eds. Springer-Verlag
-
D. Métayer, "A formal privacy management framework," in Formal Aspects in Security and Trust, P. Degano, J. Guttman, and F. Martinelli, Eds. Springer-Verlag, 2009.
-
(2009)
Formal Aspects in Security and Trust
-
-
Métayer, D.1
-
18
-
-
79955080624
-
Ontologies and software engineering
-
S. Staab and R. Studer, Eds. Springer Publishing Company
-
D.Gasevic, N.Kaviani, and M.Milanovic, "Ontologies and software engineering," in Handbook on Ontologies, S. Staab and R. Studer, Eds. Springer Publishing Company, 2009.
-
(2009)
Handbook on Ontologies
-
-
Gasevic, D.1
Kaviani, N.2
Milanovic, M.3
|