메뉴 건너뛰기




Volumn , Issue , 2013, Pages 632-641

Engineering adaptive privacy: On the role of privacy awareness requirements

Author keywords

adaptation; Privacy; selective disclosure; utility

Indexed keywords

ADAPTATION; INFORMATION DISCLOSURE; PERSONAL INFORMATION; PRIVACY AWARENESS; PRIVACY CONCERNS; PRIVACY REQUIREMENTS; SELECTIVE DISCLOSURE; UTILITY;

EID: 84886376961     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2013.6606609     Document Type: Conference Paper
Times cited : (48)

References (25)
  • 1
    • 2442539759 scopus 로고    scopus 로고
    • A privacy awareness system for ubiquitous computing environments, ubiquitous comp
    • G. Borriello and L. Holmquist, eds
    • M. Langheinrich., A Privacy Awareness System for Ubiquitous Computing Environments, Ubiquitous Comp., Lec. Notes in Comp. Sc. G. Borriello and L. Holmquist, eds., 315-320, 2002.
    • (2002) Lec. Notes in Comp. Sc , pp. 315-320
    • Langheinrich, M.1
  • 2
    • 14544292118 scopus 로고    scopus 로고
    • Privacy and trust issues with invisible computers
    • S. Lahlou, M. Langheinrich and C. Röcker, Privacy and trust issues with invisible computers, Com. ACM, 48(3), 59-60, 2005.
    • (2005) Com. ACM , vol.48 , Issue.3 , pp. 59-60
    • Lahlou, S.1    Langheinrich, M.2    Röcker, C.3
  • 3
    • 84870703690 scopus 로고    scopus 로고
    • Privacy arguments: Analysing selective disclosure requirements for mobile applications
    • T. Tun, A. Bandara, B. Price, Y. Yu, C. Haley, I. Omoronyia and B. Nuseibeh, Privacy Arguments: Analysing Selective Disclosure Requirements for Mobile Applications. RE'12., 2012
    • (2012) RE'12
    • Tun, T.1    Bandara, A.2    Price, B.3    Yu, Y.4    Haley, C.5    Omoronyia, I.6    Nuseibeh, B.7
  • 7
    • 84864222699 scopus 로고    scopus 로고
    • A requirements-based approach for the design of adaptive systems
    • V. Silva Souza. A requirements-based approach for the design of adaptive systems. In ICSE, 1635-1637, 2012.
    • (2012) ICSE , pp. 1635-1637
    • Souza, V.S.1
  • 8
    • 0037253062 scopus 로고    scopus 로고
    • The vision of autonomic computing
    • J. Kephart and D. Chess. The vision of autonomic computing. Computer, 36(1):41-50, 2003.
    • (2003) Computer , vol.36 , Issue.1 , pp. 41-50
    • Kephart, J.1    Chess, D.2
  • 9
    • 84861547915 scopus 로고    scopus 로고
    • Towards context adaptive privacy decisions in ubiquitous computing
    • F. Schaub, B. Könings, M. Weber, and F. Kargl. Towards context adaptive privacy decisions in ubiquitous computing, PERCOM Workshops, 2012.
    • (2012) PERCOM Workshops
    • Schaub, F.1    Könings, B.2    Weber, M.3    Kargl, F.4
  • 10
    • 0038037379 scopus 로고    scopus 로고
    • Unpacking privacy for a networked world
    • L. Palen and P. Dourish. Unpacking privacy for a networked world. In Proceedings of the SIGCHI, pages 129-136. 2003.
    • (2003) Proceedings of the SIGCHI , pp. 129-136
    • Palen, L.1    Dourish, P.2
  • 11
    • 40149085356 scopus 로고    scopus 로고
    • Information flow security in boundary ambients
    • C. Braghin, A. Cortesi, and R. Focardi. Information flow security in boundary ambients. Info. and Comp., 206(2):460-489, 2008.
    • (2008) Info. and Comp. , vol.206 , Issue.2 , pp. 460-489
    • Braghin, C.1    Cortesi, A.2    Focardi, R.3
  • 12
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: The PriS method
    • C. Kalloniatis, E. Kavakli, and S. Gritzalis. Addressing privacy requirements in system design: the PriS method. Requirements Engineering, 13(3):241-255, 2008.
    • (2008) Requirements Engineering , vol.13 , Issue.3 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 13
    • 84942866002 scopus 로고    scopus 로고
    • Security and privacy requirements analysis within a social setting
    • L. Liu, E. Yu, and J. Mylopoulos. Security and privacy requirements analysis within a social setting. In RE, 151-161, 2003.
    • (2003) RE , pp. 151-161
    • Liu, L.1    Yu, E.2    Mylopoulos, J.3
  • 15
    • 84886388573 scopus 로고    scopus 로고
    • Privacy Awareness: A Means to Solve the Privacy Paradox?, The Future of Identity in the Info. Society
    • V. MatyáŠ, S. Fischer-Hübner, D. Cvrcek et al., eds: Springer Boston
    • S. Pötzsch, Privacy Awareness: A Means to Solve the Privacy Paradox?, The Future of Identity in the Info. Society, IFIP Advances in Inf. and Commun Tech. V. MatyáŠ, S. Fischer-Hübner, D. Cvrcek et al., eds., 226-236: Springer Boston, 2009.
    • (2009) IFIP Advances in Inf. and Commun Tech , pp. 226-236
    • Pötzsch, S.1
  • 16
    • 79955599955 scopus 로고    scopus 로고
    • A personalized approach to web privacy: Awareness, attitudes and actions
    • C.E. Wills and M. Zeljkovic. A personalized approach to web privacy: awareness, attitudes and actions. Information Management & Computer Security, 19(1):53-73, 2011.
    • (2011) Information Management & Computer Security , vol.19 , Issue.1 , pp. 53-73
    • Wills, C.E.1    Zeljkovic, M.2
  • 18
    • 85047040703 scopus 로고
    • The temporal logic of programs
    • A. Pnueli, The temporal logic of programs. FOCS, 1977, 46-57.
    • (1977) FOCS , pp. 46-46
    • Pnueli, A.1
  • 19
    • 32344449269 scopus 로고    scopus 로고
    • Reasoning about confidentiality at requirements engineering time
    • R. De Landtsheer and A. van Lamsweerde. Reasoning about confidentiality at requirements engineering time. In ESEC/FSE-13., 41-49. 2005
    • (2005) ESEC/FSE-13 , pp. 41-49
    • De Landtsheer, R.1    Van, A.Lamsweerde.2
  • 22
    • 84886379918 scopus 로고    scopus 로고
    • Rethinking reasonable expectations of privacy in online social networks
    • B. Newell. Rethinking Reasonable Expectations of Privacy in Online Social Networks. Richmond Journal of Law and Technology. 16, 1-61, 2011.
    • (2011) Richmond Journal of Law and Technology , vol.16 , pp. 1-61
    • Newell, B.1
  • 23
    • 84876231279 scopus 로고    scopus 로고
    • Multi-agent simulation and netlogo in the introductory computer science curriculum
    • M. Dickerson, Multi-agent simulation and NetLogo in the introductory computer science curriculum. Journal of Computing Sciences in Colleges, 27(1), 2011.
    • (2011) Journal of Computing Sciences in Colleges , vol.27 , Issue.1
    • Dickerson, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.