메뉴 건너뛰기




Volumn , Issue , 2012, Pages 131-140

Privacy arguments: Analysing selective disclosure requirements for mobile applications

Author keywords

mobile applications; privacy arguments; privacy requirements

Indexed keywords

CONTEXT-SENSITIVE; KEY PRIVACY; MOBILE APPLICATIONS; PRIVACY REQUIREMENTS; RESEARCH PROGRAMMES; RUNTIMES;

EID: 84870703690     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RE.2012.6345797     Document Type: Conference Paper
Times cited : (15)

References (24)
  • 4
    • 84993894931 scopus 로고
    • Privacy regulation: Culturally universal or culturally specific?
    • Jul.
    • I. Altman, "Privacy Regulation: Culturally Universal or Culturally Specific?, " Journal of Social Issues, vol. 33, no. 3, pp. 66-84, Jul. 1977.
    • (1977) Journal of Social Issues , vol.33 , Issue.3 , pp. 66-84
    • Altman, I.1
  • 5
    • 84991061352 scopus 로고    scopus 로고
    • Social translucence: An approach to designing systems that support social processes
    • Mar.
    • T. Erickson and W. A. Kellogg, "Social translucence: an approach to designing systems that support social processes, " ACM Trans. Comput.-Hum. Interact., vol. 7, no. 1, pp. 59-83, Mar. 2000.
    • (2000) ACM Trans. Comput.-Hum. Interact. , vol.7 , Issue.1 , pp. 59-83
    • Erickson, T.1    Kellogg, W.A.2
  • 8
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: A framework for representation and analysis
    • C. Haley, R. Laney, J. Moffett, and B. Nuseibeh, "Security Requirements Engineering: A Framework for Representation and Analysis, " IEEE Trans. Softw. Eng., vol. 34, no. 1, pp. 133-153, 2008.
    • (2008) IEEE Trans. Softw. Eng. , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.1    Laney, R.2    Moffett, J.3    Nuseibeh, B.4
  • 13
    • 80051893382 scopus 로고    scopus 로고
    • Representing and reasoning about preferences in requirements engineering
    • Aug.
    • S. Liaskos, S. A. McIlraith, S. Sohrabi, and J. Mylopoulos, "Representing and reasoning about preferences in requirements engineering, " Requir. Eng., vol. 16, no. 3, pp. 227-249, Aug. 2011.
    • (2011) Requir. Eng. , vol.16 , Issue.3 , pp. 227-249
    • Liaskos, S.1    McIlraith, S.A.2    Sohrabi, S.3    Mylopoulos, J.4
  • 14
    • 33646831658 scopus 로고    scopus 로고
    • The TXL source transformation language
    • Aug.
    • J. R. Cordy, "The TXL source transformation language, " Sci. Comput. Program., vol. 61, no. 3, pp. 190-210, Aug. 2006.
    • (2006) Sci. Comput. Program. , vol.61 , Issue.3 , pp. 190-210
    • Cordy, J.R.1
  • 17
    • 84965470336 scopus 로고
    • Privacy and the family: Conceptual and empirical reflections
    • Nov.
    • T. Fahey, "Privacy and the Family: Conceptual and Empirical Reflections, " Sociology, vol. 29, no. 4, pp. 687-702, Nov. 1995.
    • (1995) Sociology , vol.29 , Issue.4 , pp. 687-702
    • Fahey, T.1
  • 18
    • 52649118020 scopus 로고    scopus 로고
    • SpaceTwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
    • M. L. Yiu, C. S. Jensen, X. Huang, and H. Lu, "SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services, " in Proc. of 24th Int. Conf. on Data Engineering, 2008, pp. 366-375.
    • (2008) Proc. of 24th Int. Conf. on Data Engineering , pp. 366-375
    • Yiu, M.L.1    Jensen, C.S.2    Huang, X.3    Lu, H.4
  • 20
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulatory rules for privacy and security requirements
    • Feb.
    • T. D. Breaux and A. I. Anton, "Analyzing Regulatory Rules for Privacy and Security Requirements, " IEEE Transactions on Software Engineering, vol. 34, no. 1, pp. 5-20, Feb. 2008.
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.D.1    Anton, A.I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.