-
1
-
-
0037240812
-
Misuse cases: Use cases with hostile intent
-
I. Alexander Misuse cases: use cases with hostile intent IEEE Softw. 20 1 2003 58 66
-
(2003)
IEEE Softw.
, vol.20
, Issue.1
, pp. 58-66
-
-
Alexander, I.1
-
5
-
-
73549085406
-
Exercising due diligence in legal requirements acquisition: A tool-supported, frame-based approach
-
T.D. Breaux Exercising due diligence in legal requirements acquisition: a tool-supported, frame-based approach IEEE International Requirements Engineering Conference (RE) 2009 225 230
-
(2009)
IEEE International Requirements Engineering Conference (RE)
, pp. 225-230
-
-
Breaux, T.D.1
-
6
-
-
76749115228
-
A checklist for integrating student empirical studies with research and teaching goals
-
J.C. Carver, L. Jaccheri, S. Morasca, and F. Shull A checklist for integrating student empirical studies with research and teaching goals Empir. Softw. Eng. 15 1 2010 35 59
-
(2010)
Empir. Softw. Eng.
, vol.15
, Issue.1
, pp. 35-59
-
-
Carver, J.C.1
Jaccheri, L.2
Morasca, S.3
Shull, F.4
-
10
-
-
79952002261
-
A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
-
M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements Requir. Eng. J. 16 1 2011 3 32
-
(2011)
Requir. Eng. J.
, vol.16
, Issue.1
, pp. 3-32
-
-
Deng, M.1
Wuyts, K.2
Scandariato, R.3
Preneel, B.4
Joosen, W.5
-
13
-
-
84867705167
-
Conducting a privacy impact analysis for the analysis of communication records
-
S. Hofbauer, K. Beckers, and G. Quirchmayr Conducting a privacy impact analysis for the analysis of communication records Perspect. Bus. Inf. Res. 2012 148 161
-
(2012)
Perspect. Bus. Inf. Res.
, pp. 148-161
-
-
Hofbauer, S.1
Beckers, K.2
Quirchmayr, G.3
-
14
-
-
10044248787
-
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
-
ACM Press
-
J.I. Hong, J.D. Ng, and S. Lederer Privacy risk models for designing privacy-sensitive ubiquitous computing systems Designing Interactive Systems (DIS2004) 2004 ACM Press 91 100
-
(2004)
Designing Interactive Systems (DIS2004)
, pp. 91-100
-
-
Hong, J.I.1
Ng, J.D.2
Lederer, S.3
-
17
-
-
50949085110
-
Addressing privacy requirements in system design: The PriS method
-
C. Kalloniatis, E. Kavakli, and S. Gritzalis Addressing privacy requirements in system design: the PriS method Requir. Eng. 13 3 2008 241 255
-
(2008)
Requir. Eng.
, vol.13
, Issue.3
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
19
-
-
84945556728
-
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
-
Ubicomp 2001: Ubiquitous Computing
-
M. Langheinrich Privacy by design - principles of privacy-aware ubiquitous systems Proceedings of the 3rd International Conference on Ubiquitous Computing, UbiComp'01 2001 273 291 (Pubitemid 33347314)
-
(2001)
Lecture Notes In Computer Science
, Issue.2201
, pp. 273-291
-
-
Langheinrich, M.1
-
21
-
-
84906950284
-
-
LINDDUN portal.
-
LINDDUN portal, https://distrinet.cs.kuleuven.be/software/linddun/.
-
-
-
-
28
-
-
84881474672
-
A framework to support selection of cloud providers based on security and privacy requirements
-
H. Mouratidis, S. Islam, C. Kalloniatis, and S. Gritzalis A framework to support selection of cloud providers based on security and privacy requirements J. Syst. Soft. 86 9 2013 2276 2293
-
(2013)
J. Syst. Soft.
, vol.86
, Issue.9
, pp. 2276-2293
-
-
Mouratidis, H.1
Islam, S.2
Kalloniatis, C.3
Gritzalis, S.4
-
30
-
-
85008523798
-
Weaving together requirements and architectures
-
B. Nuseibeh Weaving together requirements and architectures Computer 34 3 2001 115 119
-
(2001)
Computer
, vol.34
, Issue.3
, pp. 115-119
-
-
Nuseibeh, B.1
-
31
-
-
84886376961
-
Engineering adaptive privacy: On the role of privacy awareness requirements
-
IEEE Press
-
I. Omoronyia, L. Cavallaro, M. Salehie, L. Pasquale, and B. Nuseibeh Engineering adaptive privacy: on the role of privacy awareness requirements Proceedings of the 2013 International Conference on Software Engineering, ICSE'13 2013 IEEE Press 632 641
-
(2013)
Proceedings of the 2013 International Conference on Software Engineering, ICSE'13
, pp. 632-641
-
-
Omoronyia, I.1
Cavallaro, L.2
Salehie, M.3
Pasquale, L.4
Nuseibeh, B.5
-
32
-
-
60949097689
-
Experimental comparison of attack trees and misuse cases for security threat identification
-
A. Opdahl, and G. Sindre Experimental comparison of attack trees and misuse cases for security threat identification Inf. Softw. Technol. 51 5 2009 916 932
-
(2009)
Inf. Softw. Technol.
, vol.51
, Issue.5
, pp. 916-932
-
-
Opdahl, A.1
Sindre, G.2
-
34
-
-
84930450739
-
A descriptive study of Microsoft's threat modeling technique
-
R. Scandariato, K. Wuyts, and W. Joosen A descriptive study of Microsoft's threat modeling technique Requir. Eng. 2013 11 18
-
(2013)
Requir. Eng.
, pp. 11-18
-
-
Scandariato, R.1
Wuyts, K.2
Joosen, W.3
-
36
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requir. Eng. 10 1 2005 34 44
-
(2005)
Requir. Eng.
, vol.10
, Issue.1
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
38
-
-
84906950286
-
-
The code of fair information practices, Tech. rep., U.S. Dep't. of Health, Education and Welfare, Secretary's Advisory Committee on Automated Personal Data Systems, Records, computers, and the Rights of Citizens viii (1973).
-
The code of fair information practices, Tech. rep., U.S. Dep't. of Health, Education and Welfare, Secretary's Advisory Committee on Automated Personal Data Systems, Records, computers, and the Rights of Citizens viii (1973).
-
-
-
-
39
-
-
0000140772
-
Hints for reviewing empirical work in software engineering
-
W.F. Tichy Hints for reviewing empirical work in software engineering Empir. Softw. Eng. 5 4 2000 309 312
-
(2000)
Empir. Softw. Eng.
, vol.5
, Issue.4
, pp. 309-312
-
-
Tichy, W.F.1
|