메뉴 건너뛰기




Volumn 2016-August, Issue , 2016, Pages

Incorporating privacy patterns into semi-automatic business process derivation

Author keywords

[No Author keywords available]

Indexed keywords

AIR NAVIGATION; INFORMATION SCIENCE;

EID: 84987615841     PISSN: 21511349     EISSN: 21511357     Source Type: Conference Proceeding    
DOI: 10.1109/RCIS.2016.7549305     Document Type: Conference Paper
Times cited : (10)

References (25)
  • 2
    • 84987670335 scopus 로고    scopus 로고
    • TRUSTe, accessed: 03 February 2016
    • TRUSTe, US Consumer Confidence Privacy Report, available at: http: //www. Truste. com/us-consumer-confidence-index-2014/, accessed: 03 February 2016.
    • US Consumer Confidence Privacy Report
  • 4
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: The PriS method
    • C. Kalloniatis, E. Kavakli and S. Gritzalis, Addressing privacy requirements in system design: The PriS method, Requirements Engineering, 13 (3), 241-255, 2008.
    • (2008) Requirements Engineering , vol.13 , Issue.3 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 9
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre and A. L. Opdahl, Eliciting security requirements with misuse cases, Requirements Engineering Journal, 10, 34-44, 2005.
    • (2005) Requirements Engineering Journal , vol.10 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 11
    • 84878677619 scopus 로고    scopus 로고
    • A pattern language for developing privacy enhancing technologies
    • M. Hafiz, A Pattern Language for Developing Privacy Enhancing Technologies, Software Practice and Experience. 43, 769-787, 2013.
    • (2013) Software Practice and Experience , vol.43 , pp. 769-787
    • Hafiz, M.1
  • 12
    • 77955462130 scopus 로고    scopus 로고
    • Toward a framework to elicit and manage security and privacy requirements from laws and regulation
    • Springer-Verlag, Berlin, Heidelberg, Essen, Germany
    • S. Islam, H. Mouratidis and S. Wagner, Toward a framework to elicit and manage security and privacy requirements from laws and regulation, Proceeding of Requirements Engineering: Foundation for Software Quality (REFSQ), Essen, Germany, pp. 255-261. Springer-Verlag, Berlin, Heidelberg, 2010.
    • (2010) Proceeding of Requirements Engineering: Foundation for Software Quality (REFSQ) , pp. 255-261
    • Islam, S.1    Mouratidis, H.2    Wagner, S.3
  • 14
    • 84863932631 scopus 로고    scopus 로고
    • Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
    • USENIX Association Berkeley, CA, USA, San Fransisco, CA
    • M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber and E. Weippl, Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space, Proceedings of the 20th USENIX conference on Security, San Fransisco, CA, pp. 5-5. USENIX Association Berkeley, CA, USA, 2011.
    • (2011) Proceedings of the 20th USENIX Conference on Security , pp. 5
    • Mulazzani, M.1    Schrittwieser, S.2    Leithner, M.3    Huber, M.4    Weippl, E.5
  • 17
  • 18
    • 77049089544 scopus 로고    scopus 로고
    • Modeling languages for business processes and business rules: A representational analysis
    • M. zur Muehlen and M. Indulska, Modeling languages for business processes and business rules: A representational analysis, Information Systems, 35 (4), 379-390, 2010.
    • (2010) Information Systems , vol.35 , Issue.4 , pp. 379-390
    • Zur Muehlen, M.1    Indulska, M.2
  • 25
    • 84987631282 scopus 로고    scopus 로고
    • EU-Information Society DG, E-VOTE: An Internet-Based Electronic Voting System, Project Deliverable D 7. 6. University of the Aegean, Greece
    • EU-Information Society DG, E-VOTE: An Internet-Based Electronic Voting System, IST Programme 2000#29518, Project Deliverable D 7. 6, University of the Aegean, Greece, 2000.
    • (2000) IST Programme 2000#29518


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.