-
1
-
-
84897889797
-
-
Carnegie Mellon University, accessed: 03 February 2016
-
L. Rainie, S. Kiesler, R. Kang and M. Madden, Anonymity, Privacy and Security Online, Carnegie Mellon University, available at: http: //www. pewinternet. org/2013/09/05/anonymity-privacy-andsecurity-online/, accessed: 03 February 2016.
-
Anonymity, Privacy and Security Online
-
-
Rainie, L.1
Kiesler, S.2
Kang, R.3
Madden, M.4
-
2
-
-
84987670335
-
-
TRUSTe, accessed: 03 February 2016
-
TRUSTe, US Consumer Confidence Privacy Report, available at: http: //www. Truste. com/us-consumer-confidence-index-2014/, accessed: 03 February 2016.
-
US Consumer Confidence Privacy Report
-
-
-
4
-
-
50949085110
-
Addressing privacy requirements in system design: The PriS method
-
C. Kalloniatis, E. Kavakli and S. Gritzalis, Addressing privacy requirements in system design: The PriS method, Requirements Engineering, 13 (3), 241-255, 2008.
-
(2008)
Requirements Engineering
, vol.13
, Issue.3
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
5
-
-
34249004734
-
Secure tropos: A security-oriented extension of the tropos methodology
-
H. Mouratidis and P. Giorgini, Secure tropos: A security-oriented extension of the tropos methodology, International Journal of Software Engineering and Knowledge Engineering, 17 (02), 285-309, 2007.
-
(2007)
International Journal of Software Engineering and Knowledge Engineering
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
6
-
-
84952324302
-
Towards the derivation of secure business process designs
-
Springer
-
N. Argyropoulos, H. Mouratidis and A. Fish, Towards the Derivation of Secure Business Process Designs, Advances in Conceptual Modelling, pp. 248-258, Springer, 2015.
-
(2015)
Advances in Conceptual Modelling
, pp. 248-258
-
-
Argyropoulos, N.1
Mouratidis, H.2
Fish, A.3
-
7
-
-
84952642987
-
Eliciting security requirements for business processes of legacy systems
-
Springer
-
N. Argyropoulos, L. M. Alcañiz, H. Mouratidis, A. Fish, D. G. Rosado, I. G. R. de Guzmán and E. Fernández-Medina, Eliciting Security Requirements for Business Processes of Legacy Systems, The Practice of Enterprise Modelling, pp. 91-107, Springer, 2015.
-
(2015)
The Practice of Enterprise Modelling
, pp. 91-107
-
-
Argyropoulos, N.1
Alcañiz, L.M.2
Mouratidis, H.3
Fish, A.4
Rosado, D.G.5
De Guzmán, I.G.R.6
Fernández-Medina, E.7
-
8
-
-
77950516884
-
Eliciting security requirements and tracing them to design: An integration of common criteria
-
S. H. Houmb, S. Islam, E. Knauss, J. Jürjens and K. Schneider, Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec, Requirements Engineering Journal, 15, 63-93, 2010.
-
(2010)
Heuristics, and UMLsec, Requirements Engineering Journal
, vol.15
, pp. 63-93
-
-
Houmb, S.H.1
Islam, S.2
Knauss, E.3
Jürjens, J.4
Schneider, K.5
-
10
-
-
67449101466
-
Privacy patterns for online interactions
-
ACM New York, NY, USA. Portland, Oregon
-
S. Romanosky, A. Acquisti, J. Hong, L. F. Cranor and Friedman B., Privacy patterns for online interactions, Proceedings of the 2006 conference on Pattern languages of programs (PloP 06), Portland, Oregon, pp. 12: 1-12: 9. ACM New York, NY, USA, 2006.
-
(2006)
Proceedings of the 2006 Conference on Pattern Languages of Programs (PloP 06)
, pp. 121-129
-
-
Romanosky, S.1
Acquisti, A.2
Hong, J.3
Cranor, L.F.4
Friedman, B.5
-
11
-
-
84878677619
-
A pattern language for developing privacy enhancing technologies
-
M. Hafiz, A Pattern Language for Developing Privacy Enhancing Technologies, Software Practice and Experience. 43, 769-787, 2013.
-
(2013)
Software Practice and Experience
, vol.43
, pp. 769-787
-
-
Hafiz, M.1
-
12
-
-
77955462130
-
Toward a framework to elicit and manage security and privacy requirements from laws and regulation
-
Springer-Verlag, Berlin, Heidelberg, Essen, Germany
-
S. Islam, H. Mouratidis and S. Wagner, Toward a framework to elicit and manage security and privacy requirements from laws and regulation, Proceeding of Requirements Engineering: Foundation for Software Quality (REFSQ), Essen, Germany, pp. 255-261. Springer-Verlag, Berlin, Heidelberg, 2010.
-
(2010)
Proceeding of Requirements Engineering: Foundation for Software Quality (REFSQ)
, pp. 255-261
-
-
Islam, S.1
Mouratidis, H.2
Wagner, S.3
-
13
-
-
77950519059
-
Evaluating existing security and privacy requirements for legal compliance
-
A. K. Massey, P. N. Otto, L. J. Hayward and A. I. Antón, Evaluating existing security and privacy requirements for legal compliance, Requirements Engineering Journal, 15, 119-137, 2010.
-
(2010)
Requirements Engineering Journal
, vol.15
, pp. 119-137
-
-
Massey, A.K.1
Otto, P.N.2
Hayward, L.J.3
Antón, A.I.4
-
14
-
-
84863932631
-
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
-
USENIX Association Berkeley, CA, USA, San Fransisco, CA
-
M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber and E. Weippl, Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space, Proceedings of the 20th USENIX conference on Security, San Fransisco, CA, pp. 5-5. USENIX Association Berkeley, CA, USA, 2011.
-
(2011)
Proceedings of the 20th USENIX Conference on Security
, pp. 5
-
-
Mulazzani, M.1
Schrittwieser, S.2
Leithner, M.3
Huber, M.4
Weippl, E.5
-
15
-
-
78649899214
-
The characteristics of cloud computing
-
IEEE Computer Society, Washington, DC, USA, San Diego, CA
-
C. Gong, J. Liu, Q. Zhang, H. Chen and Z. Gong, The Characteristics of Cloud Computing, Proceedings of the 2010 39th International Conference on Parallel Processing Workshop, San Diego, CA, pp. 275-279. IEEE Computer Society, Washington, DC, USA, 2010.
-
(2010)
Proceedings of the 2010 39th International Conference on Parallel Processing Workshop
, pp. 275-279
-
-
Gong, C.1
Liu, J.2
Zhang, Q.3
Chen, H.4
Gong, Z.5
-
16
-
-
79952367895
-
Privacy security and trust issues arising from cloud computing
-
IEEE Computer Society, UK, Indianapolis, Indiana, USA
-
S. Pearson and A. Benameur, Privacy, Security and Trust Issues Arising from Cloud Computing, Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science, Indianapolis, Indiana, USA, pp. 693-702, IEEE Computer Society, UK, 2010.
-
(2010)
Proceedings of the 2nd IEEE International Conference on Cloud Computing Technology and Science
, pp. 693-702
-
-
Pearson, S.1
Benameur, A.2
-
18
-
-
77049089544
-
Modeling languages for business processes and business rules: A representational analysis
-
M. zur Muehlen and M. Indulska, Modeling languages for business processes and business rules: A representational analysis, Information Systems, 35 (4), 379-390, 2010.
-
(2010)
Information Systems
, vol.35
, Issue.4
, pp. 379-390
-
-
Zur Muehlen, M.1
Indulska, M.2
-
20
-
-
84904562479
-
Modeling and verifying security policies in business processes
-
Springer
-
M. Salnitri, F. Dalpiaz and P. Giorgini, Modeling and verifying security policies in business processes, Enterprise, Business-Process and Information Systems Modeling, pp. 200-214. Springer, 2014.
-
(2014)
Enterprise, Business-Process and Information Systems Modeling
, pp. 200-214
-
-
Salnitri, M.1
Dalpiaz, F.2
Giorgini, P.3
-
21
-
-
34247151648
-
A BPMN extension for the modeling of security requirements in business processes
-
A. Rodrguez, E. Fernández-Medina and M. Piattini, A BPMN extension for the modeling of security requirements in business processes, IEICE Transactions on Information and Systems, E90-D (4), 745-752, 2007.
-
(2007)
IEICE Transactions on Information and Systems
, vol.E90-D
, Issue.4
, pp. 745-752
-
-
Rodrguez, A.1
Fernández-Medina, E.2
Piattini, M.3
-
22
-
-
84937451342
-
-
Technical Report, University of Trento
-
M. Salnitri, E. Paja and P. Giorgini, P., From Socio-Technical Requirements to Technical Security Design: An STS-based Framework, Technical Report, University of Trento, 2015.
-
(2015)
From Socio-Technical Requirements to Technical Security Design: An STS-based Framework
-
-
Salnitri, M.1
Paja, E.2
Giorgini, P.P.3
-
23
-
-
60349095685
-
Goal-equivalent secure business process re-engineering
-
Springer
-
H. A. López, F. Massacci and N. Zannone, Goal-equivalent secure business process re-engineering, Service-Oriented Computing-ICSOC 2007 Workshops, pp. 212-223, Springer, 2009.
-
(2009)
Service-Oriented Computing-ICSOC 2007 Workshops
, pp. 212-223
-
-
López, H.A.1
Massacci, F.2
Zannone, N.3
-
24
-
-
79957972168
-
Deriving business processes with service level agreements from early requirements
-
G, Frankova, M. Séguran, F. Gilcher, S. Trabelsi, J. Dörflinger and M. Aiello, Deriving business processes with service level agreements from early requirements, Journal of Systems and Software, 84 (8), 1351-1363, 2011.
-
(2011)
Journal of Systems and Software
, vol.84
, Issue.8
, pp. 1351-1363
-
-
Frankova, G.1
Séguran, M.2
Gilcher, F.3
Trabelsi, S.4
Dörflinger, J.5
Aiello, M.6
-
25
-
-
84987631282
-
-
EU-Information Society DG, E-VOTE: An Internet-Based Electronic Voting System, Project Deliverable D 7. 6. University of the Aegean, Greece
-
EU-Information Society DG, E-VOTE: An Internet-Based Electronic Voting System, IST Programme 2000#29518, Project Deliverable D 7. 6, University of the Aegean, Greece, 2000.
-
(2000)
IST Programme 2000#29518
-
-
|