-
1
-
-
84872063014
-
-
European Commission, COM(2010) 245 final/2., EC, Tech. Rep.
-
European Commission, "A Digital Agenda for Europe," COM(2010) 245 final/2., EC, Tech. Rep., 2011.
-
(2011)
A Digital Agenda for Europe
-
-
-
4
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum D., "Security without identification: transaction systems to make big brother obsolete," CACM, vol. 28, no. 10, pp. 1030-1044, 1985.
-
(1985)
CACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
9
-
-
84861352176
-
-
European Commission, EC, Tech. Rep. COM(2012) 11 final
-
European Commission, "General Data Protection Regulation," EC, Tech. Rep. COM(2012) 11 final, 2012.
-
(2012)
General Data Protection Regulation
-
-
-
10
-
-
0002670359
-
Attack trees
-
[Online]. Available
-
Schneier B., "Attack trees," Dr Dobb's, vol. 24, no. 12, 1999. [Online]. Available: http://www.schneier.com/paper-attacktrees-ddj-ft.html
-
(1999)
Dr Dobb's
, vol.24
, Issue.12
-
-
Schneier, B.1
-
11
-
-
79952002261
-
A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
-
Deng M., et.al., "A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements," Requirements Engineering, vol. 16, pp. 3 - 32, 2011.
-
(2011)
Requirements Engineering
, vol.16
, pp. 3-32
-
-
Deng, M.1
-
13
-
-
84872083297
-
-
Department of Homeland Security, Online
-
Department of Homeland Security, "Attack Patterns," Online: https://buildsecurityin.us-cert.gov/, 2009.
-
(2009)
Attack Patterns
-
-
-
14
-
-
33947368645
-
Model-based security analysis in seven steps - A guided tour to the CORAS method
-
Braber F., et.al., "Model-based security analysis in seven steps - a guided tour to the CORAS method," BT Technology Journal, vol. 25, no. 1, pp. 101 - 117, 2007.
-
(2007)
BT Technology Journal
, vol.25
, Issue.1
, pp. 101-117
-
-
Braber, F.1
-
15
-
-
84870424212
-
Architecture for Attribute-based Credential Technologies - Version 1
-
Tech. Rep.
-
Krontiris I. (ed.), "Architecture for Attribute-based Credential Technologies - Version 1," ABC4Trust Deliverable D2.1, Tech. Rep., 2011.
-
(2011)
ABC4Trust Deliverable D2.1
-
-
Krontiris, I.1
-
18
-
-
80052184686
-
A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs
-
Dandan R., et.al., "A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs," in Proc. of the IEEE Intl. Conference on Communications, 2011, pp. 1-5.
-
Proc. of the IEEE Intl. Conference on Communications, 2011
, pp. 1-5
-
-
Dandan, R.1
-
21
-
-
17844381878
-
ISRAM: Information security risk analysis method
-
Karabacak B. and Sogukpinar I., "ISRAM: information security risk analysis method," Computers and Security, vol. 24, no. 2, pp. 147 - 159, 2005.
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 147-159
-
-
Karabacak, B.1
Sogukpinar, I.2
-
24
-
-
63249117089
-
Security analysis of the dependability, security reconfigurability framework
-
Hartog T. and Kleinhuis G., "Security analysis of the dependability, security reconfigurability framework," in Proc. of the Third Intl. Conference on Risks and Security of Internet and Systems, 2008, pp. 93-100.
-
Proc. of the Third Intl. Conference on Risks and Security of Internet and Systems, 2008
, pp. 93-100
-
-
Hartog, T.1
Kleinhuis, G.2
|