-
1
-
-
28444446666
-
Extending relational database systems to automatically enforce privacy policies
-
IEEE Computer Society
-
Agrawal, R., Bird, P., Grandison, T., Kiernan, J., Logan, S., & Rjaibi, W. (2005). Extending Relational Database Systems to Automatically Enforce Privacy Policies. Int. Conf. on Data Engineering (ICDE 2005), (pp. 1013-1022). IEEE Computer Society.
-
(2005)
Int. Conf. on Data Engineering (ICDE 2005)
, pp. 1013-1022
-
-
Agrawal, R.1
Bird, P.2
Grandison, T.3
Kiernan, J.4
Logan, S.5
Rjaibi, W.6
-
4
-
-
10044278069
-
Development and evaluation of emerging design patterns for ubiquitous computing
-
New York, ACM Press
-
Chung, E. S., Hong, J. I., Lin, J., Prabaker, M. K., Landay, J. A., & Liu, A. L. (2004). Development and evaluation of emerging design patterns for ubiquitous computing. Int. Conf. on Designing Interactive Systems, New York: ACM Press.
-
(2004)
Int. Conf. on Designing Interactive Systems
-
-
Chung, E.S.1
Hong, J.I.2
Lin, J.3
Prabaker, M.K.4
Landay, J.A.5
Liu, A.L.6
-
6
-
-
84959045053
-
A conceptual model for privacy policies
-
Cambridge, MS
-
Coen-Porisini, A., Colombo, P., Sicari, S., & Trombetta, A. (2007). A Conceptual Model for Privacy Policies. In Proc. of Software Engineering Application (SEA '07). Cambridge, MS.
-
(2007)
In Proc. of Software Engineering Application (SEA '07)
-
-
Coen-Porisini, A.1
Colombo, P.2
Sicari, S.3
Trombetta, A.4
-
7
-
-
0003880013
-
-
Reading, MA, Addison-Wesley
-
Gamma, E., Helm, R., Johnson, R., & Vlissides, J. M. (1994). Design Patterns: Elements of Reusable Object Oriented Software. Reading, MA: Addison-Wesley.
-
(1994)
Design Patterns: Elements of Reusable Object Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.M.4
-
9
-
-
50949085110
-
Addressing privacy requirements in system design: The PriS method
-
[New York: Springer], doi:10.1007/s00766-008-0067-3
-
Kavakli, E., Kalloniatis, C., Loucopoulos, P., & Gritzalis, S. (2008). Addressing Privacy Requirements in System Design: the PriS Method. [New York: Springer]. Journal Requirements Engineering, 13(3), 241-255. doi:10.1007/s00766-008-0067-3
-
(2008)
Journal Requirements Engineering
, vol.13
, Issue.3
, pp. 241-255
-
-
Kavakli, E.1
Kalloniatis, C.2
Loucopoulos, P.3
Gritzalis, S.4
-
10
-
-
0034291619
-
Obstacles in goal-oriented requirement engineering
-
doi:10.1109/32.879820
-
Lamsweerde, A. V., & Letier, Handling, E. (2000). Obstacles in Goal-Oriented Requirement Engineering. IEEE Transactions on Software Engineering, 26, 978-1005. doi:10.1109/32.879820
-
(2000)
IEEE Transactions on Software Engineering
, vol.26
, pp. 978-1005
-
-
Lamsweerde, A.V.1
Letier2
Handling, E.3
-
11
-
-
27644544786
-
Analyzing security requirements as relationships among strategic actors
-
Raleigh, North Carolina, USA
-
Liu, L., Yu, E., & Mylopoulos, J. (2002) Analyzing Security Requirements as Relationships among Strategic Actors. Symposium on Requirements Engineering for Information Security (SREIS '02). Raleigh, North Carolina, USA.
-
(2002)
Symposium on Requirements Engineering for Information Security (SREIS '02)
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
12
-
-
77956197266
-
Privacy problems with anonymized transaction databases
-
Vol 3245 of Lecture Notes in Computer Science 3245, Springer
-
Mielikinen, T. (2004). Privacy Problems with Anonymized Transaction Databases. Int. Conf. on Discovery Science (DS 2004), Vol 3245 of Lecture Notes in Computer Science 3245, Springer.
-
(2004)
Int. Conf. on Discovery Science (DS 2004)
-
-
Mielikinen, T.1
-
13
-
-
34249004734
-
Secure tropos: A security-oriented extension of the tropos methodology
-
[IJSEKE]. doi:10.1142/S0218194007003240
-
Mouratidis, H., & Giorgini, P. (2007). Secure Tropos: A Security-Oriented Extension of the Tropos methodology. [IJSEKE]. International Journal of Software Engineering and Knowledge Engineering, 17(2), 285-309. doi:10.1142/S0218194007003240
-
(2007)
International Journal of Software Engineering and Knowledge Engineering
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
14
-
-
8344270973
-
An ontology for modelling security: The tropos approach
-
Vol. 2773 of Lecture Notes in Computer Science, Springer
-
Mouratidis, H., Giorgini, P., & Manson, G. A. (2003b). An Ontology for Modelling Security: The Tropos Approach. Int Conf. on KnowledgeBased Intelligent Information & Engineering Systems (KES 2003), Vol. 2773 of Lecture Notes in Computer Science, (pp. 1387-1394). Springer.
-
(2003)
Int Conf. on KnowledgeBased Intelligent Information & Engineering Systems (KES 2003)
, pp. 1387-1394
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.A.3
-
15
-
-
35048845022
-
Integrating security and systems engineering towards the modelling of secure information system
-
Vol. 2681 of Lecture Notes in Computer Science, Springer
-
Mouratidis, H., Giorgini, P., & Mason, G. A. (2003a). Integrating Security and Systems Engineering towards the Modelling of Secure Information System. Int. Conf. on Advanced Information System Engineering (CAiSE '03), Vol. 2681 of Lecture Notes in Computer Science, (pp. 63-78). Springer.
-
(2003)
Int. Conf. on Advanced Information System Engineering (CAiSE '03)
, pp. 63-78
-
-
Mouratidis, H.1
Giorgini, P.2
Mason, G.A.3
-
16
-
-
0026883734
-
Representing and using non functional requirements: A process oriented approach
-
doi:10.1109/32.142871
-
Mylopolulos, J., Chung, L., & Nixon, B. (1992). Representing and Using non Functional Requirements: a Process Oriented Approach. IEEE Transactions on Software Engineering, 18, 483-497. doi:10.1109/32.142871
-
(1992)
IEEE Transactions on Software Engineering
, vol.18
, pp. 483-497
-
-
Mylopolulos, J.1
Chung, L.2
Nixon, B.3
-
17
-
-
33745784545
-
Obfuscated databases and group privacy
-
New York, NY, USA. ACM Press
-
Narayanan, A., & Shmatikov, V. (2005). Obfuscated Databases and Group Privacy. ACM Int. Conference on Computer and Communications Security (CCS '05), (pp. 102-111). New York, NY, USA. ACM Press.
-
(2005)
ACM Int. Conference on Computer and Communications Security (CCS '05)
, pp. 102-111
-
-
Narayanan, A.1
Shmatikov, V.2
-
18
-
-
34548016110
-
Privacy-aware role-based access control
-
Sophia Antipolis, France
-
Ni, Q., Trombetta, A., Bertino, E., & Lobo, J. (2007). Privacy-aware Role-Based Access Control. ACM Symp. on Access Control Methods And Technologies (SACMAT '07). Sophia Antipolis, France.
-
(2007)
ACM Symp. on Access Control Methods and Technologies (SACMAT '07)
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
19
-
-
67449101466
-
Privacy patterns for online interactions
-
New York, NY, USA
-
Romanosky, S., Acquisti, A., Hong, J., Cranor, L., & Friedman, B. (2006). Privacy Patterns for Online Interactions. Int. Conf. on Pattern Languages of Programs Conference (PLOP). New York, NY, USA.
-
(2006)
Int. Conf. on Pattern Languages of Programs Conference (PLOP)
-
-
Romanosky, S.1
Acquisti, A.2
Hong, J.3
Cranor, L.4
Friedman, B.5
-
21
-
-
33750050331
-
-
John Wiley & Sons
-
Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., & Sommerlad, P. (2006). Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
23
-
-
33750490069
-
-
Prentice Hall
-
Steel, C., Nagappan, R., & Lai, R. (2005). Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management. Prentice Hall.
-
(2005)
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
-
-
Steel, C.1
Nagappan, R.2
Lai, R.3
|