메뉴 건너뛰기




Volumn 19, Issue 3, 2014, Pages 281-307

Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements

Author keywords

Description logic; Formal analysis; Privacy; Requirements; Standardization

Indexed keywords

COMPUTER SIMULATION; DATA DESCRIPTION; DATA TRANSFER; FACSIMILE; FORMAL LANGUAGES; INFORMATION MANAGEMENT; LOCATION BASED SERVICES; SOCIAL NETWORKING (ONLINE); SPECIFICATIONS; STANDARDIZATION; SUPPLY CHAINS;

EID: 84906230637     PISSN: 09473602     EISSN: 1432010X     Source Type: Journal    
DOI: 10.1007/s00766-013-0190-7     Document Type: Article
Times cited : (83)

References (41)
  • 1
    • 77954321643 scopus 로고    scopus 로고
    • A comparison of two privacy policy languages: EPAL and XACML
    • Anderson A (2006) A comparison of two privacy policy languages: EPAL and XACML. ACM workshop on secure web services, pp 53-60.
    • (2006) ACM workshop on secure web services , pp. 53-60
    • Anderson, A.1
  • 4
    • 17744389340 scopus 로고    scopus 로고
    • A requirements taxonomy for reducing web site privacy vulnerabilities
    • Antón AI, Earp JB (2004) A requirements taxonomy for reducing web site privacy vulnerabilities. Requir Eng J 9(3): 169-185.
    • (2004) Requir Eng J , vol.9 , Issue.3 , pp. 169-185
    • Antón, A.I.1    Earp, J.B.2
  • 9
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulatory rules for privacy and security requirements
    • Breaux TD, Antón AI (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Softw Eng 34(1): 5-20.
    • (2008) IEEE Trans Softw Eng , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.D.1    Antón, A.I.2
  • 10
    • 56149121201 scopus 로고    scopus 로고
    • Semantic parameterization: a conceptual modeling process for domain descriptions
    • (article 5)
    • Breaux TD, Antón AI, Doyle J (2009) Semantic parameterization: a conceptual modeling process for domain descriptions. ACM Trans Softw Eng Method 18(2) (article 5).
    • (2009) ACM Trans Softw Eng Method , vol.18 , Issue.2
    • Breaux, T.D.1    Antón, A.I.2    Doyle, J.3
  • 11
    • 38149018837 scopus 로고    scopus 로고
    • Towards regulatory compliance: extracting rights and obligations to align requirements with regulations
    • Breaux TD, Vail MW, Antón AI (2006) Towards regulatory compliance: extracting rights and obligations to align requirements with regulations. In: IEEE requirements engineering conference, pp 49-58.
    • (2006) IEEE requirements engineering conference , pp. 49-58
    • Breaux, T.D.1    Vail, M.W.2    Antón, A.I.3
  • 12
    • 79955475331 scopus 로고    scopus 로고
    • Legally 'reasonable' security requirements: a 10-year FTC retrospective
    • Breaux TD, Baumer DL (2011) Legally 'reasonable' security requirements: a 10-year FTC retrospective. Comput Secur 30(4): 178-193.
    • (2011) Comput Secur , vol.30 , Issue.4 , pp. 178-193
    • Breaux, T.D.1    Baumer, D.L.2
  • 15
    • 84906272860 scopus 로고    scopus 로고
    • Platform for privacy preferences (P3P) specification
    • Cranor L et al (2006) Platform for privacy preferences (P3P) specification. W3C working group note.
    • (2006) W3C working group note
    • Cranor, L.1
  • 16
    • 58149412516 scopus 로고
    • Weighted kappa: nominal scale agreement with provision for scaled disagreement or partial credit
    • Cohen J (1968) Weighted kappa: nominal scale agreement with provision for scaled disagreement or partial credit. Psychol Bull 70(4): 213-220.
    • (1968) Psychol Bull , vol.70 , Issue.4 , pp. 213-220
    • Cohen, J.1
  • 19
    • 84891087623 scopus 로고    scopus 로고
    • FTC charges deceptive privacy practices in Google's rollout of its buzz social network
    • March 30, 2011
    • Farrell CB (2011) FTC charges deceptive privacy practices in Google's rollout of its buzz social network. In: U. S. Federal Trade Commission News Release, March 30, 2011.
    • (2011) U. S. Federal Trade Commission News Release
    • Farrell, C.B.1
  • 21
    • 21344483234 scopus 로고
    • Deontic logic as founded in non-monotonic logic
    • Horty JF (1993) Deontic logic as founded in non-monotonic logic. Ann Math Artif Intell 9: 69-91.
    • (1993) Ann Math Artif Intell , vol.9 , pp. 69-91
    • Horty, J.F.1
  • 31
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as contextual integrity
    • Nissenbaum H (2004) Privacy as contextual integrity. Wash Law Rev 791: 119-158.
    • (2004) Wash Law Rev , vol.791 , pp. 119-158
    • Nissenbaum, H.1
  • 33
    • 3142523603 scopus 로고    scopus 로고
    • The UCONABC usage control model
    • Park J, Sandhu R (2004) The UCONABC usage control model. ACM Trans Inf Syst Secur 7(1): 128-174.
    • (2004) ACM Trans Inf Syst Secur , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.2
  • 34
    • 80052895803 scopus 로고    scopus 로고
    • Facebook in privacy breach
    • Steel E, Fowler GA (2010) Facebook in privacy breach. Wall Street J. http://online. wsj. com/news/articles/SB10001424052702304772804575558484075236968.
    • (2010) Wall Street J
    • Steel, E.1    Fowler, G.A.2
  • 35
    • 0036811662 scopus 로고    scopus 로고
    • k-Anonymity: a model for protecting privacy
    • Sweeney Latanya (2002) k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(5): 557-570.
    • (2002) Int J Uncertain Fuzziness Knowl Based Syst , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 36
    • 0242308055 scopus 로고    scopus 로고
    • Semantic web languages for policy representation and reasoning: a comparison of KAoS, Rei, and Ponder
    • Tonti G, Bradshaw JM, Jeffers R, Montanari R, Suri N, Uszok A (2003) Semantic web languages for policy representation and reasoning: a comparison of KAoS, Rei, and Ponder. LNCS 2870: 419-437.
    • (2003) Lncs , vol.2870 , pp. 419-437
    • Tonti, G.1    Bradshaw, J.M.2    Jeffers, R.3    Montanari, R.4    Suri, N.5    Uszok, A.6
  • 41
    • 79952008961 scopus 로고    scopus 로고
    • Commitment analysis to operationalize software requirements from privacy policies
    • Young J (2011) Commitment analysis to operationalize software requirements from privacy policies. Requir Eng J 16: 33-46.
    • (2011) Requir Eng J , vol.16 , pp. 33-46
    • Young, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.