메뉴 건너뛰기




Volumn , Issue , 2010, Pages 232-259

Privacy aware systems: From models to patterns

Author keywords

[No Author keywords available]

Indexed keywords


EID: 80755141545     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-61520-837-1.ch009     Document Type: Chapter
Times cited : (13)

References (24)
  • 9
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: The PriS method
    • [New York: Springer], doi:10.1007/s00766-008-0067-3
    • Kavakli, E., Kalloniatis, C., Loucopoulos, P., & Gritzalis, S. (2008). Addressing Privacy Requirements in System Design: the PriS Method. [New York: Springer]. Journal Requirements Engineering, 13(3), 241-255. doi:10.1007/s00766-008-0067-3
    • (2008) Journal Requirements Engineering , vol.13 , Issue.3 , pp. 241-255
    • Kavakli, E.1    Kalloniatis, C.2    Loucopoulos, P.3    Gritzalis, S.4
  • 12
    • 77956197266 scopus 로고    scopus 로고
    • Privacy problems with anonymized transaction databases
    • Vol 3245 of Lecture Notes in Computer Science 3245, Springer
    • Mielikinen, T. (2004). Privacy Problems with Anonymized Transaction Databases. Int. Conf. on Discovery Science (DS 2004), Vol 3245 of Lecture Notes in Computer Science 3245, Springer.
    • (2004) Int. Conf. on Discovery Science (DS 2004)
    • Mielikinen, T.1
  • 13
    • 34249004734 scopus 로고    scopus 로고
    • Secure tropos: A security-oriented extension of the tropos methodology
    • [IJSEKE]. doi:10.1142/S0218194007003240
    • Mouratidis, H., & Giorgini, P. (2007). Secure Tropos: A Security-Oriented Extension of the Tropos methodology. [IJSEKE]. International Journal of Software Engineering and Knowledge Engineering, 17(2), 285-309. doi:10.1142/S0218194007003240
    • (2007) International Journal of Software Engineering and Knowledge Engineering , vol.17 , Issue.2 , pp. 285-309
    • Mouratidis, H.1    Giorgini, P.2
  • 15
    • 35048845022 scopus 로고    scopus 로고
    • Integrating security and systems engineering towards the modelling of secure information system
    • Vol. 2681 of Lecture Notes in Computer Science, Springer
    • Mouratidis, H., Giorgini, P., & Mason, G. A. (2003a). Integrating Security and Systems Engineering towards the Modelling of Secure Information System. Int. Conf. on Advanced Information System Engineering (CAiSE '03), Vol. 2681 of Lecture Notes in Computer Science, (pp. 63-78). Springer.
    • (2003) Int. Conf. on Advanced Information System Engineering (CAiSE '03) , pp. 63-78
    • Mouratidis, H.1    Giorgini, P.2    Mason, G.A.3
  • 16
    • 0026883734 scopus 로고
    • Representing and using non functional requirements: A process oriented approach
    • doi:10.1109/32.142871
    • Mylopolulos, J., Chung, L., & Nixon, B. (1992). Representing and Using non Functional Requirements: a Process Oriented Approach. IEEE Transactions on Software Engineering, 18, 483-497. doi:10.1109/32.142871
    • (1992) IEEE Transactions on Software Engineering , vol.18 , pp. 483-497
    • Mylopolulos, J.1    Chung, L.2    Nixon, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.