메뉴 건너뛰기




Volumn 96, Issue , 2014, Pages 122-138

Empirical evaluation of a privacy-focused threat modeling methodology

Author keywords

Empirical study; Privacy; Threats

Indexed keywords

DATA PRIVACY; HARDWARE; SOFTWARE ENGINEERING;

EID: 84906950333     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2014.05.075     Document Type: Article
Times cited : (51)

References (40)
  • 1
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • I. Alexander Misuse cases: use cases with hostile intent IEEE Softw. 20 1 2003 58 66
    • (2003) IEEE Softw. , vol.20 , Issue.1 , pp. 58-66
    • Alexander, I.1
  • 5
    • 73549085406 scopus 로고    scopus 로고
    • Exercising due diligence in legal requirements acquisition: A tool-supported, frame-based approach
    • T.D. Breaux Exercising due diligence in legal requirements acquisition: a tool-supported, frame-based approach IEEE International Requirements Engineering Conference (RE) 2009 225 230
    • (2009) IEEE International Requirements Engineering Conference (RE) , pp. 225-230
    • Breaux, T.D.1
  • 6
    • 76749115228 scopus 로고    scopus 로고
    • A checklist for integrating student empirical studies with research and teaching goals
    • J.C. Carver, L. Jaccheri, S. Morasca, and F. Shull A checklist for integrating student empirical studies with research and teaching goals Empir. Softw. Eng. 15 1 2010 35 59
    • (2010) Empir. Softw. Eng. , vol.15 , Issue.1 , pp. 35-59
    • Carver, J.C.1    Jaccheri, L.2    Morasca, S.3    Shull, F.4
  • 10
    • 79952002261 scopus 로고    scopus 로고
    • A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
    • M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements Requir. Eng. J. 16 1 2011 3 32
    • (2011) Requir. Eng. J. , vol.16 , Issue.1 , pp. 3-32
    • Deng, M.1    Wuyts, K.2    Scandariato, R.3    Preneel, B.4    Joosen, W.5
  • 13
    • 84867705167 scopus 로고    scopus 로고
    • Conducting a privacy impact analysis for the analysis of communication records
    • S. Hofbauer, K. Beckers, and G. Quirchmayr Conducting a privacy impact analysis for the analysis of communication records Perspect. Bus. Inf. Res. 2012 148 161
    • (2012) Perspect. Bus. Inf. Res. , pp. 148-161
    • Hofbauer, S.1    Beckers, K.2    Quirchmayr, G.3
  • 14
    • 10044248787 scopus 로고    scopus 로고
    • Privacy risk models for designing privacy-sensitive ubiquitous computing systems
    • ACM Press
    • J.I. Hong, J.D. Ng, and S. Lederer Privacy risk models for designing privacy-sensitive ubiquitous computing systems Designing Interactive Systems (DIS2004) 2004 ACM Press 91 100
    • (2004) Designing Interactive Systems (DIS2004) , pp. 91-100
    • Hong, J.I.1    Ng, J.D.2    Lederer, S.3
  • 17
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: The PriS method
    • C. Kalloniatis, E. Kavakli, and S. Gritzalis Addressing privacy requirements in system design: the PriS method Requir. Eng. 13 3 2008 241 255
    • (2008) Requir. Eng. , vol.13 , Issue.3 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 19
    • 84945556728 scopus 로고    scopus 로고
    • Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
    • Ubicomp 2001: Ubiquitous Computing
    • M. Langheinrich Privacy by design - principles of privacy-aware ubiquitous systems Proceedings of the 3rd International Conference on Ubiquitous Computing, UbiComp'01 2001 273 291 (Pubitemid 33347314)
    • (2001) Lecture Notes In Computer Science , Issue.2201 , pp. 273-291
    • Langheinrich, M.1
  • 21
    • 84906950284 scopus 로고    scopus 로고
    • LINDDUN portal.
    • LINDDUN portal, https://distrinet.cs.kuleuven.be/software/linddun/.
  • 28
    • 84881474672 scopus 로고    scopus 로고
    • A framework to support selection of cloud providers based on security and privacy requirements
    • H. Mouratidis, S. Islam, C. Kalloniatis, and S. Gritzalis A framework to support selection of cloud providers based on security and privacy requirements J. Syst. Soft. 86 9 2013 2276 2293
    • (2013) J. Syst. Soft. , vol.86 , Issue.9 , pp. 2276-2293
    • Mouratidis, H.1    Islam, S.2    Kalloniatis, C.3    Gritzalis, S.4
  • 30
    • 85008523798 scopus 로고    scopus 로고
    • Weaving together requirements and architectures
    • B. Nuseibeh Weaving together requirements and architectures Computer 34 3 2001 115 119
    • (2001) Computer , vol.34 , Issue.3 , pp. 115-119
    • Nuseibeh, B.1
  • 32
    • 60949097689 scopus 로고    scopus 로고
    • Experimental comparison of attack trees and misuse cases for security threat identification
    • A. Opdahl, and G. Sindre Experimental comparison of attack trees and misuse cases for security threat identification Inf. Softw. Technol. 51 5 2009 916 932
    • (2009) Inf. Softw. Technol. , vol.51 , Issue.5 , pp. 916-932
    • Opdahl, A.1    Sindre, G.2
  • 34
    • 84930450739 scopus 로고    scopus 로고
    • A descriptive study of Microsoft's threat modeling technique
    • R. Scandariato, K. Wuyts, and W. Joosen A descriptive study of Microsoft's threat modeling technique Requir. Eng. 2013 11 18
    • (2013) Requir. Eng. , pp. 11-18
    • Scandariato, R.1    Wuyts, K.2    Joosen, W.3
  • 36
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requir. Eng. 10 1 2005 34 44
    • (2005) Requir. Eng. , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 38
    • 84906950286 scopus 로고    scopus 로고
    • The code of fair information practices, Tech. rep., U.S. Dep't. of Health, Education and Welfare, Secretary's Advisory Committee on Automated Personal Data Systems, Records, computers, and the Rights of Citizens viii (1973).
    • The code of fair information practices, Tech. rep., U.S. Dep't. of Health, Education and Welfare, Secretary's Advisory Committee on Automated Personal Data Systems, Records, computers, and the Rights of Citizens viii (1973).
  • 39
    • 0000140772 scopus 로고    scopus 로고
    • Hints for reviewing empirical work in software engineering
    • W.F. Tichy Hints for reviewing empirical work in software engineering Empir. Softw. Eng. 5 4 2000 309 312
    • (2000) Empir. Softw. Eng. , vol.5 , Issue.4 , pp. 309-312
    • Tichy, W.F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.