-
2
-
-
17744389340
-
A requirements taxonomy for reducing web site privacy vulnerabilities
-
A.I. Antón, J.B. Earp, "A requirements taxonomy for reducing web site privacy vulnerabilities," Req'ts Engr. J., 9(3):169-185, 2004.
-
(2004)
Req'Ts Engr. J.
, vol.9
, Issue.3
, pp. 169-185
-
-
Antón, A.I.1
Earp, J.B.2
-
4
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
A. Barth, A. Datta, J.C. Mitchell, H. Nissenbaum, "Privacy and contextual integrity: framework and applications," IEEE Symp. on Sec. & Priv., 2006, pp. 184-198.
-
(2006)
IEEE Symp. on Sec. & Priv.
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
5
-
-
40449096076
-
Analyzing regulatory rules for privacy and security requirements
-
T.D. Breaux, A.I. Anton. "Analyzing regulatory rules for privacy and security requirements," IEEE Trans. Soft. Engr., 34(1): 5-20, 2008.
-
(2008)
IEEE Trans. Soft. Engr.
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.D.1
Anton, A.I.2
-
6
-
-
56149121201
-
Semantic parameterization: A conceptual modeling process for domain descriptions
-
T.D. Breaux, A.I. Antón, J. Doyle, "Semantic parameterization: a conceptual modeling process for domain descriptions." ACM Trans. Soft. Engr. Method., 18(2): Article 5, 2009.
-
(2009)
ACM Trans. Soft. Engr. Method.
, vol.18
, Issue.2
-
-
Breaux, T.D.1
Antón, A.I.2
Doyle, J.3
-
7
-
-
79955475331
-
Legally 'reasonable' security requirements: A 10-year FTC retrospective
-
T.D. Breaux, D.L. Baumer, "Legally 'Reasonable' Security Requirements: A 10-year FTC Retrospective." Computers & Security, 30(4):178-193. 2011.
-
(2011)
Computers & Security
, vol.30
, Issue.4
, pp. 178-193
-
-
Breaux, T.D.1
Baumer, D.L.2
-
8
-
-
84906230637
-
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements
-
T.D. Breaux, H. Hibshi, A. Rao. "Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements," Req'ts Engr. J., 19(3): 281-307, 2014.
-
(2014)
Req'Ts Engr. J.
, vol.19
, Issue.3
, pp. 281-307
-
-
Breaux, T.D.1
Hibshi, H.2
Rao, A.3
-
13
-
-
21344483234
-
Deontic logic as founded in non-monotonic logic
-
J.F. Horty. "Deontic logic as founded in non-monotonic logic." Annals of Math. & Art. Intel., 9: 69-91, 1993.
-
(1993)
Annals of Math. & Art. Intel.
, vol.9
, pp. 69-91
-
-
Horty, J.F.1
-
21
-
-
84870703690
-
Privacy arguments: Analysing selective disclosure requirements for mobile applications
-
th Int'l Req'ts Engr. Conf., pp. 131-140, 2012.
-
(2012)
th Int'l req'Ts Engr. Conf.
, pp. 131-140
-
-
Tun, T.T.1
Bandara, A.K.2
Price, B.A.3
Yu, Y.4
Haley, C.5
Omoronyia, I.6
Nuseibeh, B.7
-
22
-
-
51849130014
-
New developments in ontology-based policy management: Increasing the practicality and comprehensiveness of KAoS
-
A. Uszok, J.M. Bradshaw, J. Lott, M. Breedy, L. Bunch. "New developments in ontology-based policy management: increasing the practicality and comprehensiveness of KAoS." IEEE Work. on Pol. Dist. Sys. & Nets., pp. 145-152, 2008.
-
(2008)
IEEE Work. on Pol. Dist. Sys. & Nets.
, pp. 145-152
-
-
Uszok, A.1
Bradshaw, J.M.2
Lott, J.3
Breedy, M.4
Bunch, L.5
-
23
-
-
33746264432
-
Formalizing and achieving multiparty agreements via commitments
-
F. Wan, M.P. Singh. "Formalizing and achieving multiparty agreements via commitments." Auto. Agents & Multi-Agent Sys., pp. 770-777, 2005.
-
(2005)
Auto. Agents & Multi-Agent Sys.
, pp. 770-777
-
-
Wan, F.1
Singh, M.P.2
-
26
-
-
79952008961
-
Commitment analysis to operationalize software requirements from privacy policies
-
J. Young. "Commitment analysis to operationalize software requirements from privacy policies." Req'ts Engr. J., 16:33-46, 2011
-
(2011)
Req'Ts Engr. J.
, vol.16
, pp. 33-46
-
-
Young, J.1
|