-
1
-
-
84943592192
-
-
Privacy and Security Online, Carnegie Mellon University, Accessed 19 April 2015
-
Rainie, L, Kiesler, S., Kang, R, Madden, M: Anonymity, Privacy and Security Online, Carnegie Mellon University. http://www.pewinternet.org/2013/09/05/anonymity-privacyand- security-online/. Accessed 19 April 2015
-
Anonymity
-
-
Rainie, L.1
Kiesler, S.2
Kang, R.3
Madden, M.4
-
2
-
-
84943630443
-
-
TRUSTe, US Consumer Confidence Privacy Report, Accessed 19 April 2015
-
TRUSTe: US Consumer Confidence Privacy Report. http://www.truste.com/us-consumerconfidence-index-2014/. Accessed 19 April 2015
-
-
-
-
3
-
-
9244222724
-
Enhancing web privacy and anonymity in the digital era
-
Emerald Group Publishing Limited
-
Gritzalis, S.: Enhancing web privacy and anonymity in the digital era. Inf. Manage. Comput. Secur. 12(3), 255–288 (2004). Emerald Group Publishing Limited
-
(2004)
Inf. Manage. Comput. Secur
, vol.12
, Issue.3
, pp. 255-288
-
-
Gritzalis, S.1
-
4
-
-
50949105593
-
-
Ministry of the Interior and Kingdom Relations, The Netherlands
-
Koorn, R., van Gils, H., Hart, J., Overbeek, P., Tellegen, R.: Privacy Enhancing Technologies, White paper for Decision Makers. Ministry of the Interior and Kingdom Relations, The Netherlands (2004)
-
(2004)
Privacy Enhancing Technologies, White Paper for Decision Makers
-
-
Koorn, R.1
Van Gils, H.2
Hart, J.3
Overbeek, P.4
Tellegen, R.5
-
5
-
-
50949085110
-
Addressing privacy requirements in system design:
-
Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: The PriS method. Requirements Eng. J. 13(3), 241–255 (2008)
-
(2008)
The Pris Method. Requirements Eng. J
, vol.13
, Issue.3
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
6
-
-
84866253432
-
Aligning security and privacy to support the development of secure information systems
-
Mouratidis, H., Kalloniatis, C., Islam, S., Huget, M.P., Gritzalis, S.: Aligning security and privacy to support the development of secure information systems. J. Univ. Comput. Sci. 18 (12), 1608–1627 (2012)
-
(2012)
J. Univ. Comput. Sci
, vol.18
, Issue.12
, pp. 1608-1627
-
-
Mouratidis, H.1
Kalloniatis, C.2
Islam, S.3
Huget, M.P.4
Gritzalis, S.5
-
7
-
-
78649989557
-
-
white paper, v.0.34, Accessed 19 April 2015
-
Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, white paper, v.0.34. http://dud.inf.tu-dresden.de/Anon_Terminology.shtml. Accessed 19 April 2015
-
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
-
-
Pfitzmann, A.1
Hansen, M.2
-
8
-
-
84887724123
-
An analysis of security issues for cloud computing
-
Hashizume, K., Rosado, D.G., Fernández-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 1–13 (2013)
-
(2013)
J. Internet Serv. Appl
, vol.4
, pp. 1-13
-
-
Hashizume, K.1
Rosado, D.G.2
Fernández-Medina, E.3
Fernandez, E.B.4
-
9
-
-
84870622004
-
-
ITU Technology Watch, International Telecommuni cations Union, Geneva, Switzerland
-
ITU Technology Watch: Privacy in Cloud Computing. International Telecommuni cations Union, Geneva, Switzerland (2012)
-
(2012)
Privacy in Cloud Computing
-
-
-
10
-
-
84879869482
-
Privacy in the cloud: Bridging the gap between design and implementation
-
In: Franch, X., Soffer, P. (eds.), Springer, Heidelberg
-
Manousakis, V., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Privacy in the cloud: bridging the gap between design and implementation. In: Franch, X., Soffer, P. (eds.) CAiSE Workshops 2013. LNBIP, vol. 148, pp. 455–465. Springer, Heidelberg (2013)
-
(2013)
Caise Workshops 2013. LNBIP
, vol.148
, pp. 455-465
-
-
Manousakis, V.1
Kalloniatis, C.2
Kavakli, E.3
Gritzalis, S.4
-
11
-
-
84882955163
-
-
In: Douligeris, C., Polemi, N., Karantjias, A., Lamersdorf, W. (eds.), Springer, Heidelberg
-
Kalloniatis, C., Manousakis, V., Mouratidis, H., Gritzalis, S.: Migrating into the cloud: identifying themajor security and privacy concerns. In: Douligeris, C., Polemi, N., Karantjias, A., Lamersdorf, W. (eds.) Collaborative, Trusted and Privacy-Aware e/m-Services. IFIP AICT, vol. 399, pp. 73–87. Springer, Heidelberg (2013)
-
(2013)
Migrating into the Cloud: Identifying Themajor Security and Privacy Concerns
, vol.399
, pp. 73-87
-
-
Kalloniatis, C.1
Manousakis, V.2
Mouratidis, H.3
Gritzalis, S.4
-
12
-
-
84943640070
-
Top Threats to Cloud Computing Results update 2012
-
CSA Threats, Seattle, WA, USA
-
CSA Threats: Top Threats to Cloud Computing Results update 2012, Cloud Se-curity Alliance, Seattle, WA, USA (2012)
-
(2012)
Cloud Se-Curity Alliance
-
-
-
13
-
-
84863498411
-
Privacy, security and trust in cloud computing
-
In: Pearson, S., Yee, G. (eds.), Springer-Verlag, London
-
Pearson, S.: Privacy, security and trust in cloud computing. In: Pearson, S., Yee, G. (eds.) Computer Communications and Networks. Springer-Verlag, London (2013)
-
(2013)
Computer Communications and Networks
-
-
Pearson, S.1
-
14
-
-
84894259408
-
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
-
Kalloniatis, C., Mouratidis, H., Manousakis, V., Islam, S., Gritzalis, S., Kavakli, E.: Towards the design of secure and privacy-oriented information systems in the cloud: identifying the major concepts. Comput. Stan. Interfaces 36, 759–775 (2014)
-
(2014)
Comput. Stan. Interfaces
, vol.36
, pp. 759-775
-
-
Kalloniatis, C.1
Mouratidis, H.2
Manousakis, V.3
Islam, S.4
Gritzalis, S.5
Kavakli, E.6
-
16
-
-
84869403221
-
-
Article 29 Data Protection Working Party, Accessed 09 December 2014
-
Article 29 Data Protection Working Party, Opinion 05/2012 on Cloud Computing (2012). Accessed 09 December 2014
-
(2012)
Opinion 05/2012 on Cloud Computing
-
-
-
17
-
-
84941945944
-
Privacy in the cloud computing era
-
Microsoft Technical report, Microsoft Corp, Redmond, USA, November, Accessed 10 January 2015
-
Microsoft Technical report: Privacy in the cloud computing era, a Microsoft perspective, Microsoft Corp, Redmond, USA, November 2009. Accessed 10 January 2015
-
(2009)
A Microsoft Perspective
-
-
-
18
-
-
74049145625
-
Managing security of virtual machine images in a cloud environment
-
ACM, New York
-
Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW 2009), pp. 91–96. ACM, New York (2009). doi: 10.1145/1655008.1655021 http://doi.acm.org/10.1145/1655008.1655021
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW 2009)
, pp. 91-96
-
-
Wei, J.1
Zhang, X.2
Ammons, G.3
Bala, V.4
Ning, P.5
-
20
-
-
33644968219
-
IT-Security and Privacy: Design and Use of Privacy Enhancing Security Mechanisms
-
Springer, Heidelberg
-
Fischer-Hübner, S.: IT-Security and Privacy: Design and Use of Privacy Enhancing Security Mechanisms. LNCS, vol. 1958. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1958
-
-
Fischer-Hübner, S.1
-
21
-
-
84943622683
-
PriS tool: A case tool for privacy-oriented RE
-
Doukidis, G., et al. (eds.)
-
Kalloniatis, C., Kavakli, E., Kontellis, E.: PriS tool: a case tool for privacy-oriented RE. In: Doukidis, G., et al. (eds.) Proceedings of the MCIS 2009 4th Mediterranean Conference on Information Systems, Athens, Greece, pp. 913–925 (e-version), September 2009
-
(2009)
Proceedings of the MCIS 2009 4Th Mediterranean Conference on Information Systems, Athens, Greece, Pp. 913–925 (E-Version)
-
-
Kalloniatis, C.1
Kavakli, E.2
Kontellis, E.3
-
22
-
-
84864680369
-
PriS Methodology: Incorporating privacy requirements into the system design process
-
In: Mylopoulos, J., Spafford, G. (eds.), Paris, France. IEEE CPS Conference Publishing Services, August
-
Kalloniatis, C., Kavakli, E., Gritzalis, S.: PriS Methodology: incorporating privacy requirements into the system design process. In: Mylopoulos, J., Spafford, G. (eds.) Proceedings of the 13th IEEE International Requirements Engineering Conference–SREIS 2005 Symposium on Requirements Engineering for Information Security, Paris, France. IEEE CPS Conference Publishing Services, August 2005
-
(2005)
Proceedings of the 13Th IEEE International Requirements Engineering Conference–SREIS 2005 Symposium on Requirements Engineering for Information Security
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
23
-
-
34249004734
-
Secure tropos: A security-oriented extension of the tropos methodology
-
Mouratidis, H., Giorgini, G.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Software Eng. Knowl. Eng. 17, 285–309 (2007)
-
(2007)
Int. J. Software Eng. Knowl. Eng
, vol.17
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, G.2
-
24
-
-
77950516884
-
Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec
-
Houmb, S.H., Islam, S., Knauss, E., Jürjens, J., Schneider, K.: Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec. Requirements Eng. J. 15, 63–93 (2010)
-
(2010)
Requirements Eng. J
, vol.15
, pp. 63-93
-
-
Houmb, S.H.1
Islam, S.2
Knauss, E.3
Jürjens, J.4
Schneider, K.5
-
25
-
-
13644252644
-
Eliciting security requirements with misuse cases
-
Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Eng. J. 10, 34–44 (2005)
-
(2005)
Requirements Eng. J
, vol.10
, pp. 34-44
-
-
Sindre, G.1
Opdahl, A.L.2
-
26
-
-
67449101466
-
Privacy patterns for online interactions
-
Portland, Oregon, ACM, New York, 21–23 October
-
Romanosky, S., Acquisti, A., Hong, J., Cranor, L.F., Friedman, B.: Privacy patterns for online interactions. In: Proceedings of the 2006 Conference on Pattern Languages of Programs (PloP 2006), Portland, Oregon, pp. 12:1–12:9. ACM, New York, 21–23 October 2006
-
(2006)
Proceedings of the 2006 Conference on Pattern Languages of Programs (Plop 2006)
-
-
Romanosky, S.1
Acquisti, A.2
Hong, J.3
Cranor, L.F.4
Friedman, B.5
-
27
-
-
84878677619
-
A Pattern Language for Developing Privacy Enhancing Technologies
-
Hafiz, M.: A Pattern Language for Developing Privacy Enhancing Technologies. Software Practice and Experience. 43, 769–787 (2013)
-
(2013)
Software Practice and Experience
, vol.43
, pp. 769-787
-
-
Hafiz, M.1
-
28
-
-
77955462130
-
Towards a framework to elicit and manage security and privacy requirements from laws and regulations
-
In: Wieringa, R., Persson, A. (eds.), Springer, Heidelberg
-
Islam, S., Mouratidis, H., Wagner, S.: Towards a framework to elicit and manage security and privacy requirements from laws and regulations. In: Wieringa, R., Persson, A. (eds.) REFSQ 2010. LNCS, vol. 6182, pp. 255–261. Springer, Heidelberg (2010)
-
(2010)
REFSQ 2010. LNCS
, vol.6182
, pp. 255-261
-
-
Islam, S.1
Mouratidis, H.2
Wagner, S.3
-
29
-
-
77950519059
-
Evaluating existing secu-rity and privacy requirements for legal compliance
-
Massey, A.K., Otto, P.N., Hayward, L.J., Antón, A.I.: Evaluating existing secu-rity and privacy requirements for legal compliance. Requirements Eng. J. 15, 119–137 (2010)
-
(2010)
Requirements Eng. J
, vol.15
, pp. 119-137
-
-
Massey, A.K.1
Otto, P.N.2
Hayward, L.J.3
Antón, A.I.4
-
30
-
-
84863932631
-
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
-
San Fransisco, CA, USENIX Association, Berkeley, 8–12 August
-
Mulazzani, M., Schrittwieser, S., Leithner, M., Huber, M., Weippl, E.: Dark clouds on the horizon: using cloud storage as attack vector and online slack space. In: Proceedings of the 20th USENIX Conference on Security, San Fransisco, CA, p. 5. USENIX Association, Berkeley, 8–12 August 2011
-
(2011)
Proceedings of the 20Th USENIX Conference on Security
, pp. 5
-
-
Mulazzani, M.1
Schrittwieser, S.2
Leithner, M.3
Huber, M.4
Weippl, E.5
-
31
-
-
78649899214
-
The characteristics of cloud computing
-
San Diego, CA, IEEE Computer Society, Washington, DC, 13-16 September
-
Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z.: The characteristics of cloud computing. In: Proceedings of the 2010 39th International Conference on Parallel Processing Workshop, San Diego, CA, pp. 275–279. IEEE Computer Society, Washington, DC, 13-16 September 2010
-
(2010)
Proceedings of the 2010 39Th International Conference on Parallel Processing Workshop
, pp. 275-279
-
-
Gong, C.1
Liu, J.2
Zhang, Q.3
Chen, H.4
Gong, Z.5
-
32
-
-
79952367895
-
Privacy, security and trust issues arising from cloud computing
-
Indianapolis, Indiana, USA, IEEE Computer Society, UK, 30 November–3 December
-
Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science, Indianapolis, Indiana, USA, pp. 693–702. IEEE Computer Society, UK, 30 November–3 December 2010
-
(2010)
Proceedings of the 2Nd IEEE International Conference on Cloud Computing Technology and Science
, pp. 693-702
-
-
Pearson, S.1
Benameur, A.2
|