-
1
-
-
2442539759
-
A privacy awareness system for ubiquitous computing environments, ubiquitous comp
-
G. Borriello and L. Holmquist, eds
-
M. Langheinrich., A Privacy Awareness System for Ubiquitous Computing Environments, Ubiquitous Comp., Lec. Notes in Comp. Sc. G. Borriello and L. Holmquist, eds., 315-320, 2002.
-
(2002)
Lec. Notes in Comp. Sc
, pp. 315-320
-
-
Langheinrich, M.1
-
2
-
-
14544292118
-
Privacy and trust issues with invisible computers
-
S. Lahlou, M. Langheinrich and C. Röcker, Privacy and trust issues with invisible computers, Com. ACM, 48(3), 59-60, 2005.
-
(2005)
Com. ACM
, vol.48
, Issue.3
, pp. 59-60
-
-
Lahlou, S.1
Langheinrich, M.2
Röcker, C.3
-
3
-
-
84870703690
-
Privacy arguments: Analysing selective disclosure requirements for mobile applications
-
T. Tun, A. Bandara, B. Price, Y. Yu, C. Haley, I. Omoronyia and B. Nuseibeh, Privacy Arguments: Analysing Selective Disclosure Requirements for Mobile Applications. RE'12., 2012
-
(2012)
RE'12
-
-
Tun, T.1
Bandara, A.2
Price, B.3
Yu, Y.4
Haley, C.5
Omoronyia, I.6
Nuseibeh, B.7
-
4
-
-
84866914809
-
-
Tool demo track, ASE
-
I. Omoronyia, L. Pasquale, M. Salehie, L. Cavallaro, G. Doherty and B. Nuseibeh, Caprice: A tool for engineering adaptive privacy, Tool demo track, ASE 2012
-
(2012)
Caprice: A Tool for Engineering Adaptive Privacy
-
-
Omoronyia, I.1
Pasquale, L.2
Salehie, M.3
Cavallaro, L.4
Doherty, G.5
Nuseibeh, B.6
-
5
-
-
79959572241
-
Awareness requirements for adaptive systems
-
V. Silva Souza, A. Lapouchnian, W. N. Robinson, and J. Mylopoulos. Awareness requirements for adaptive systems. In SEAMS, 60-69, 2011.
-
(2011)
SEAMS
, pp. 60-69
-
-
Souza, V.S.1
Lapouchnian, A.2
Robinson, W.N.3
Mylopoulos, J.4
-
6
-
-
60449120378
-
Engineering Privacy
-
S. Spiekermann, and L. Cranor, Engineering Privacy, Sof. Eng., IEEE Trans on, 35(1) 67-82, 2009.
-
(2009)
Sof. Eng., IEEE Trans on
, vol.35
, Issue.1
, pp. 67-82
-
-
Spiekermann, S.1
Cranor, L.2
-
7
-
-
84864222699
-
A requirements-based approach for the design of adaptive systems
-
V. Silva Souza. A requirements-based approach for the design of adaptive systems. In ICSE, 1635-1637, 2012.
-
(2012)
ICSE
, pp. 1635-1637
-
-
Souza, V.S.1
-
8
-
-
0037253062
-
The vision of autonomic computing
-
J. Kephart and D. Chess. The vision of autonomic computing. Computer, 36(1):41-50, 2003.
-
(2003)
Computer
, vol.36
, Issue.1
, pp. 41-50
-
-
Kephart, J.1
Chess, D.2
-
10
-
-
0038037379
-
Unpacking privacy for a networked world
-
L. Palen and P. Dourish. Unpacking privacy for a networked world. In Proceedings of the SIGCHI, pages 129-136. 2003.
-
(2003)
Proceedings of the SIGCHI
, pp. 129-136
-
-
Palen, L.1
Dourish, P.2
-
11
-
-
40149085356
-
Information flow security in boundary ambients
-
C. Braghin, A. Cortesi, and R. Focardi. Information flow security in boundary ambients. Info. and Comp., 206(2):460-489, 2008.
-
(2008)
Info. and Comp.
, vol.206
, Issue.2
, pp. 460-489
-
-
Braghin, C.1
Cortesi, A.2
Focardi, R.3
-
12
-
-
50949085110
-
Addressing privacy requirements in system design: The PriS method
-
C. Kalloniatis, E. Kavakli, and S. Gritzalis. Addressing privacy requirements in system design: the PriS method. Requirements Engineering, 13(3):241-255, 2008.
-
(2008)
Requirements Engineering
, vol.13
, Issue.3
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
13
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
L. Liu, E. Yu, and J. Mylopoulos. Security and privacy requirements analysis within a social setting. In RE, 151-161, 2003.
-
(2003)
RE
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
14
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
A. Barth, A. Datta, J.C. Mitchell, and H. Nissenbaum. Privacy and contextual integrity: Framework and applications. In IEEE Symposium on Security and Privacy, 15-pp., 2006.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 15
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
15
-
-
84886388573
-
Privacy Awareness: A Means to Solve the Privacy Paradox?, The Future of Identity in the Info. Society
-
V. MatyáŠ, S. Fischer-Hübner, D. Cvrcek et al., eds: Springer Boston
-
S. Pötzsch, Privacy Awareness: A Means to Solve the Privacy Paradox?, The Future of Identity in the Info. Society, IFIP Advances in Inf. and Commun Tech. V. MatyáŠ, S. Fischer-Hübner, D. Cvrcek et al., eds., 226-236: Springer Boston, 2009.
-
(2009)
IFIP Advances in Inf. and Commun Tech
, pp. 226-236
-
-
Pötzsch, S.1
-
16
-
-
79955599955
-
A personalized approach to web privacy: Awareness, attitudes and actions
-
C.E. Wills and M. Zeljkovic. A personalized approach to web privacy: awareness, attitudes and actions. Information Management & Computer Security, 19(1):53-73, 2011.
-
(2011)
Information Management & Computer Security
, vol.19
, Issue.1
, pp. 53-73
-
-
Wills, C.E.1
Zeljkovic, M.2
-
17
-
-
77950189737
-
A survey of context modelling and reasoning techniques
-
C. Bettini, O. Brdiczka, K. Henricksen, J. Indulska, D. Nicklas, A. Ranganathan, D. Riboni, A survey of context modelling and reasoning techniques, Pervasive and Mobile Computing, 6(2):161-180, 2010.
-
(2010)
Pervasive and Mobile Computing
, vol.6
, Issue.2
, pp. 161-180
-
-
Bettini, C.1
Brdiczka, O.2
Henricksen, K.3
Indulska, J.4
Nicklas, D.5
Ranganathan, A.6
Riboni, D.7
-
18
-
-
85047040703
-
The temporal logic of programs
-
A. Pnueli, The temporal logic of programs. FOCS, 1977, 46-57.
-
(1977)
FOCS
, pp. 46-46
-
-
Pnueli, A.1
-
19
-
-
32344449269
-
Reasoning about confidentiality at requirements engineering time
-
R. De Landtsheer and A. van Lamsweerde. Reasoning about confidentiality at requirements engineering time. In ESEC/FSE-13., 41-49. 2005
-
(2005)
ESEC/FSE-13
, pp. 41-49
-
-
De Landtsheer, R.1
Van, A.Lamsweerde.2
-
22
-
-
84886379918
-
Rethinking reasonable expectations of privacy in online social networks
-
B. Newell. Rethinking Reasonable Expectations of Privacy in Online Social Networks. Richmond Journal of Law and Technology. 16, 1-61, 2011.
-
(2011)
Richmond Journal of Law and Technology
, vol.16
, pp. 1-61
-
-
Newell, B.1
-
23
-
-
84876231279
-
Multi-agent simulation and netlogo in the introductory computer science curriculum
-
M. Dickerson, Multi-agent simulation and NetLogo in the introductory computer science curriculum. Journal of Computing Sciences in Colleges, 27(1), 2011.
-
(2011)
Journal of Computing Sciences in Colleges
, vol.27
, Issue.1
-
-
Dickerson, M.1
-
24
-
-
4644229772
-
Rulebased runtime verification
-
H. Barringer, A. Goldberg, K. Havelund, and K. Sen. Rulebased runtime verification. In Verification, Model Checking, and Abstract Interpretation, 2004, 277-306.
-
(2004)
Verification, Model Checking, and Abstract Interpretation
, pp. 277-277
-
-
Barringer, H.1
Goldberg, A.2
Havelund, K.3
Sen, K.4
|