-
2
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
Washington, DC, USA
-
A. Barth, A. Datta, J. C. Mitchell, and H. Nissenbaum, "Privacy and Contextual Integrity: Framework and Applications, " in Proc. of the IEEE Symp. on Security and Privacy, Washington, DC, USA, 2006, pp. 184-198.
-
(2006)
Proc. of the IEEE Symp. on Security and Privacy
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
4
-
-
84993894931
-
Privacy regulation: Culturally universal or culturally specific?
-
Jul.
-
I. Altman, "Privacy Regulation: Culturally Universal or Culturally Specific?, " Journal of Social Issues, vol. 33, no. 3, pp. 66-84, Jul. 1977.
-
(1977)
Journal of Social Issues
, vol.33
, Issue.3
, pp. 66-84
-
-
Altman, I.1
-
5
-
-
84991061352
-
Social translucence: An approach to designing systems that support social processes
-
Mar.
-
T. Erickson and W. A. Kellogg, "Social translucence: an approach to designing systems that support social processes, " ACM Trans. Comput.-Hum. Interact., vol. 7, no. 1, pp. 59-83, Mar. 2000.
-
(2000)
ACM Trans. Comput.-Hum. Interact.
, vol.7
, Issue.1
, pp. 59-83
-
-
Erickson, T.1
Kellogg, W.A.2
-
8
-
-
40449096402
-
Security requirements engineering: A framework for representation and analysis
-
C. Haley, R. Laney, J. Moffett, and B. Nuseibeh, "Security Requirements Engineering: A Framework for Representation and Analysis, " IEEE Trans. Softw. Eng., vol. 34, no. 1, pp. 133-153, 2008.
-
(2008)
IEEE Trans. Softw. Eng.
, vol.34
, Issue.1
, pp. 133-153
-
-
Haley, C.1
Laney, R.2
Moffett, J.3
Nuseibeh, B.4
-
9
-
-
82455210659
-
Risk and argument: A risk-based argumentation method for practical security
-
Trento, Italy
-
V. N. L. Franqueira, T. T. Tun, Y. Yu, R. Wieringa, and B. Nuseibeh, "Risk and argument: A risk-based argumentation method for practical security, " in Proc. of 19th Int. Conf. on Requirements Engineering, Trento, Italy, 2011, pp. 239-248.
-
(2011)
Proc. of 19th Int. Conf. on Requirements Engineering
, pp. 239-248
-
-
Franqueira, V.N.L.1
Tun, T.T.2
Yu, Y.3
Wieringa, R.4
Nuseibeh, B.5
-
11
-
-
84870703690
-
-
The Open University, Milton Keynes, TR2012/05, Jun.
-
T. T. Tun, A. Bandara, B. A. Price, Y. Yu, C. B. Haley, I. Omoronyia, and B. Nuseibeh, "Privacy Arguments: Analysing Selective Disclosure Requirements for Mobile Applications, " The Open University, Milton Keynes, TR2012/05, Jun. 2012.
-
(2012)
Privacy Arguments: Analysing Selective Disclosure Requirements for Mobile Applications
-
-
Tun, T.T.1
Bandara, A.2
Price, B.A.3
Yu, Y.4
Haley, C.B.5
Omoronyia, I.6
Nuseibeh, B.7
-
12
-
-
67650809008
-
Specifying features of an evolving software system
-
Aug.
-
T. T. Tun, T. Trew, M. Jackson, R. Laney, and B. Nuseibeh, "Specifying features of an evolving software system, " Software: Practice and Experience, vol. 39, no. 11, pp. 973-1002, Aug. 2009.
-
(2009)
Software: Practice and Experience
, vol.39
, Issue.11
, pp. 973-1002
-
-
Tun, T.T.1
Trew, T.2
Jackson, M.3
Laney, R.4
Nuseibeh, B.5
-
13
-
-
80051893382
-
Representing and reasoning about preferences in requirements engineering
-
Aug.
-
S. Liaskos, S. A. McIlraith, S. Sohrabi, and J. Mylopoulos, "Representing and reasoning about preferences in requirements engineering, " Requir. Eng., vol. 16, no. 3, pp. 227-249, Aug. 2011.
-
(2011)
Requir. Eng.
, vol.16
, Issue.3
, pp. 227-249
-
-
Liaskos, S.1
McIlraith, S.A.2
Sohrabi, S.3
Mylopoulos, J.4
-
14
-
-
33646831658
-
The TXL source transformation language
-
Aug.
-
J. R. Cordy, "The TXL source transformation language, " Sci. Comput. Program., vol. 61, no. 3, pp. 190-210, Aug. 2006.
-
(2006)
Sci. Comput. Program.
, vol.61
, Issue.3
, pp. 190-210
-
-
Cordy, J.R.1
-
15
-
-
82455212651
-
OpenArgue: Supporting argumentation to evolve secure software systems
-
Y. Yu, T. T. Tun, A. Tedeschi, V. N. Franqueira, and B. Nuseibeh, "OpenArgue: Supporting argumentation to evolve secure software systems, " in Proc. of 19th Int. Conf. on Requirements Engineering, 2011, pp. 351-352.
-
(2011)
Proc. of 19th Int. Conf. on Requirements Engineering
, pp. 351-352
-
-
Yu, Y.1
Tun, T.T.2
Tedeschi, A.3
Franqueira, V.N.4
Nuseibeh, B.5
-
16
-
-
67651247161
-
Learning rules from user behaviour
-
D. Corapi, O. Ray, A. Russo, A. Bandara, and E. Lupu, "Learning Rules from User Behaviour, " in Proc. of AIAI, Boston, MA, 2009, vol. 296, pp. 459-468.
-
(2009)
Proc. of AIAI, Boston, MA
, vol.296
, pp. 459-468
-
-
Corapi, D.1
Ray, O.2
Russo, A.3
Bandara, A.4
Lupu, E.5
-
17
-
-
84965470336
-
Privacy and the family: Conceptual and empirical reflections
-
Nov.
-
T. Fahey, "Privacy and the Family: Conceptual and Empirical Reflections, " Sociology, vol. 29, no. 4, pp. 687-702, Nov. 1995.
-
(1995)
Sociology
, vol.29
, Issue.4
, pp. 687-702
-
-
Fahey, T.1
-
18
-
-
52649118020
-
SpaceTwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
-
M. L. Yiu, C. S. Jensen, X. Huang, and H. Lu, "SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services, " in Proc. of 24th Int. Conf. on Data Engineering, 2008, pp. 366-375.
-
(2008)
Proc. of 24th Int. Conf. on Data Engineering
, pp. 366-375
-
-
Yiu, M.L.1
Jensen, C.S.2
Huang, X.3
Lu, H.4
-
19
-
-
0038037379
-
Unpacking 'privacy' for a networked world
-
New York, NY, USA
-
L. Palen and P. Dourish, "Unpacking 'privacy' for a networked world, " in Proc. of SIGCHI Conf. on Human factors in computing systems, New York, NY, USA, 2003, pp. 129-136.
-
(2003)
Proc. of SIGCHI Conf. on Human Factors in Computing Systems
, pp. 129-136
-
-
Palen, L.1
Dourish, P.2
-
20
-
-
40449096076
-
Analyzing regulatory rules for privacy and security requirements
-
Feb.
-
T. D. Breaux and A. I. Anton, "Analyzing Regulatory Rules for Privacy and Security Requirements, " IEEE Transactions on Software Engineering, vol. 34, no. 1, pp. 5-20, Feb. 2008.
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.D.1
Anton, A.I.2
-
22
-
-
70450172446
-
From spaces to places: Emerging contexts in mobile privacy
-
C. Mancini, K. Thomas, Y. Rogers, B. A. Price, L. Jedrzejczyk, A. K. Bandara, A. N. Joinson, and B. Nuseibeh, "From spaces to places: Emerging contexts in mobile privacy, " in Proc. of 11th Int. Conf. on Ubiquitous Computing, 2009, pp. 1-10.
-
(2009)
Proc. of 11th Int. Conf. on Ubiquitous Computing
, pp. 1-10
-
-
Mancini, C.1
Thomas, K.2
Rogers, Y.3
Price, B.A.4
Jedrzejczyk, L.5
Bandara, A.K.6
Joinson, A.N.7
Nuseibeh, B.8
-
23
-
-
67349263032
-
Exploring how to use scenarios to discover requirements
-
Apr.
-
N. Seyff, N. Maiden, K. Karlsen, J. Lockerbie, P. Grunbacher, F. Graf, and C. Ncube, "Exploring how to use scenarios to discover requirements, " Requir. Eng., vol. 14, no. 2, pp. 91-111, Apr. 2009.
-
(2009)
Requir. Eng.
, vol.14
, Issue.2
, pp. 91-111
-
-
Seyff, N.1
Maiden, N.2
Karlsen, K.3
Lockerbie, J.4
Grunbacher, P.5
Graf, F.6
Ncube, C.7
-
24
-
-
84863246374
-
A language for automatically enforcing privacy policies
-
New York, NY, USA
-
J. Yang, K. Yessenov, and A. Solar-Lezama, "A language for automatically enforcing privacy policies, " in Proc. of 39th Symp. on Princ. of Prog. Lang., New York, NY, USA, 2012, pp. 85-96.
-
(2012)
Proc. of 39th Symp. on Princ. of Prog. Lang.
, pp. 85-96
-
-
Yang, J.1
Yessenov, K.2
Solar-Lezama, A.3
|