-
1
-
-
77950536938
-
A comparison of security requirements engineering methods
-
B. Fabian, S. Gürses, M. Heisel, T. Santen, and H. Schmidt, "A comparison of security requirements engineering methods," Requirements Engineering - Special Issue on Security Requirements Engineering, vol. 15, no. 1, pp. 7-40, 2010.
-
(2010)
Requirements Engineering - Special Issue on Security Requirements Engineering
, vol.15
, Issue.1
, pp. 7-40
-
-
Fabian, B.1
Gürses, S.2
Heisel, M.3
Santen, T.4
Schmidt, H.5
-
2
-
-
50949085110
-
Addressing privacy requirements in system design: The pris method
-
August
-
C. Kalloniatis, E. Kavakli, and S. Gritzalis, "Addressing privacy requirements in system design: the pris method," Requir. Eng., vol. 13, pp. 241-255, August 2008.
-
(2008)
Requir. Eng.
, vol.13
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
3
-
-
79952002261
-
A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
-
March
-
M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, "A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements," Requir. Eng., vol. 16, pp. 3-32, March 2011.
-
(2011)
Requir. Eng.
, vol.16
, pp. 3-32
-
-
Deng, M.1
Wuyts, K.2
Scandariato, R.3
Preneel, B.4
Joosen, W.5
-
4
-
-
60449120378
-
Engineering Privacy
-
Jan.
-
S. Spiekermann and L. F. Cranor, "Engineering Privacy," IEEE Transactions on Software Engineering, vol. 35, no. 1, pp. 67-82, Jan. 2009.
-
(2009)
IEEE Transactions on Software Engineering
, vol.35
, Issue.1
, pp. 67-82
-
-
Spiekermann, S.1
Cranor, L.F.2
-
5
-
-
0038405113
-
-
Organisation for Economic Co-operation and Development (OECD), Tech. Rep., [Online]. Available
-
OECD, "OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data," Organisation for Economic Co-operation and Development (OECD), Tech. Rep., 1980. [Online]. Available: http://www.oecd.org/ document/18/0,3746,en-2649-34255-1815186-1-1-1-1,00&&en-USS-01DBC.html
-
(1980)
OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
-
-
-
7
-
-
41949117635
-
Privacy and identity management
-
M. Hansen, A. Schwartz, and A. Cooper, "Privacy and identity management," IEEE Security and Privacy, vol. 6, no. 2, pp. 38-45, 2008.
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.2
, pp. 38-45
-
-
Hansen, M.1
Schwartz, A.2
Cooper, A.3
-
8
-
-
80455162368
-
Characterising and analysing security requirements modelling initiatives
-
IEEE Computer Society
-
P. Karpati, G. Sindre, and A. L. Opdahl, "Characterising and analysing security requirements modelling initiatives," in Proceedings of the International Conference on Availability, Reliability and Security (ARES). IEEE Computer Society, 2011, pp. 710-715.
-
(2011)
Proceedings of the International Conference on Availability, Reliability and Security (ARES)
, pp. 710-715
-
-
Karpati, P.1
Sindre, G.2
Opdahl, A.L.3
-
12
-
-
78649989557
-
-
and ULD Kiel, Tech. Rep., [Online]. Available
-
A. Pfitzmann and M. Hansen, "A terminology for talking about privacy by data minimization: Anonymity, unlinkability, unobservability, pseudonymity, and identity management - version v0.34," TU Dresden and ULD Kiel, Tech. Rep., 2011. [Online]. Available: http://dud.inf.tu-dresden.de/literatur/Anon- Terminology-v0.34.pdf
-
(2011)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - Version V0.34
-
-
Pfitzmann, A.1
Hansen, M.2
-
13
-
-
0003765587
-
-
ISO and IEC, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), ISO/IEC 15408
-
ISO and IEC, "Common Criteria for Information Technology Security Evaluation," International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), ISO/IEC 15408, 2009.
-
(2009)
Common Criteria for Information Technology Security Evaluation
-
-
-
14
-
-
1842538795
-
Privacy as contextual integrity
-
H. Nissenbaum, "Privacy as contextual integrity," Washington Law Review, vol. 79, no. 1, pp. 101-139, 2004.
-
(2004)
Washington Law Review
, vol.79
, Issue.1
, pp. 101-139
-
-
Nissenbaum, H.1
-
15
-
-
84869449779
-
Privacy-by-design in its applications: The way forward
-
IEEE Computer Society, June
-
A. Kung, J.-C. Freytag, and F. Kargl, "Privacy-by-design in its applications : The way forward," in Second International Workshop on Data Security and PrivAcy in wireless Networks, D-SPAN 2011. IEEE Computer Society, June 2011.
-
(2011)
Second International Workshop on Data Security and PrivAcy in Wireless Networks, D-SPAN 2011
-
-
Kung, A.1
Freytag, J.-C.2
Kargl, F.3
-
17
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
Washington, DC, USA: IEEE Computer Society
-
L. Liu, E. Yu, and J. Mylopoulos, "Security and privacy requirements analysis within a social setting," in Proceedings of the 11th IEEE International Conference on Requirements Engineering. Washington, DC, USA: IEEE Computer Society, 2003, pp. 151-161.
-
(2003)
Proceedings of the 11th IEEE International Conference on Requirements Engineering
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
|