메뉴 건너뛰기




Volumn 1, Issue 4, 2007, Pages 307-332

Protecting privacy in system design: The electronic voting case

Author keywords

Automation; Data security; Privacy

Indexed keywords


EID: 84992927367     PISSN: 17506166     EISSN: None     Source Type: Journal    
DOI: 10.1108/17506160710839150     Document Type: Article
Times cited : (17)

References (39)
  • 1
    • 84992925300 scopus 로고    scopus 로고
    • Privacy and e-government: privacy impact assessments and privacy commissioners – two mechanisms for protecting privacy to promote citizen trust online
    • www.internetpolicy.net/practices/030501pia.pdf memo available at
    • Anderson, P. and Dempsey, J. (2003), “Privacy and e-government: privacy impact assessments and privacy commissioners – two mechanisms for protecting privacy to promote citizen trust online”, memo available at: www.internetpolicy.net/practices/030501pia.pdf.
    • (2003)
    • Anderson, P.1    Dempsey, J.2
  • 6
    • 33645586953 scopus 로고    scopus 로고
    • The Anonymizer: protecting user privacy on the web
    • www.anonymizer.com available at
    • Boyan, J. (1997), “The Anonymizer: protecting user privacy on the web”, Computer-Mediated Communication Magazine, Vol. 4 No. 9, pp. 7-13, available at: www.anonymizer.com.
    • (1997) Computer-Mediated Communication Magazine , vol.4 , Issue.9 , pp. 7-13
    • Boyan, J.1
  • 8
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D. (1981), “Untraceable electronic mail, return addresses, and digital pseudonyms”, Communications of the ACM, Vol. 24 No. 2, pp. 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 9
    • 0022145479 scopus 로고
    • Security without identification: transactions systems to make big brother obsolete
    • Chaum, D. (1985), “Security without identification: transactions systems to make big brother obsolete”, Communications of the ACM, Vol. 28 No. 10, pp. 1030-44.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 10
    • 0023861309 scopus 로고
    • The dining cryptographers problem: unconditional sender and recipient untraceability
    • Chaum, D. (1988), “The dining cryptographers problem: unconditional sender and recipient untraceability”, Journal of Cryptology, Vol. 1 No. 1, pp. 65-75.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 12
    • 84992930593 scopus 로고
    • (The) Code of Fair Information Practices Education and Welfare, Washington, DC.
    • (The) Code of Fair Information Practices (1973), US Department of Health, Education and Welfare, Washington, DC.
    • (1973) US Department of Health
  • 14
    • 84992928184 scopus 로고    scopus 로고
    • EU-Information Society DG, IST Programme 2000#29518
    • Project Deliverable D 7.6, Quality and Reliability SA – University of the Aegean, Greece.
    • EU-Information Society DG, IST Programme 2000#29518 (2000), E-vote: An Internet-based Electronic Voting System, Project Deliverable D 7.6, Quality and Reliability SA – University of the Aegean, Greece.
    • (2000) E-vote: An Internet-based Electronic Voting System
  • 15
    • 33644968219 scopus 로고    scopus 로고
    • IT-security and privacy, design and use of privacy enhancing security mechanisms
    • Springer-Verlag Berlin
    • Fischer-Hübner, S. (2001), “IT-security and privacy, design and use of privacy enhancing security mechanisms”, Lecture Notes in Computer Science, Vol. 1958, Springer-Verlag, Berlin.
    • (2001) Lecture Notes in Computer Science , vol.1958
    • Fischer-Hübner, S.1
  • 16
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • Goldschlag, D., Syverson, P. and Reed, M. (1999), “Onion routing for anonymous and private internet connections”, Communications of the ACM, Vol. 42 No. 2, pp. 39-41.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Syverson, P.2    Reed, M.3
  • 17
    • 9244222724 scopus 로고    scopus 로고
    • Enhancing web privacy and anonymity in the digital era
    • Gritzalis, S. (2004), “Enhancing web privacy and anonymity in the digital era”, Information Management & Computer Security, Vol. 12 No. 3, pp. 255-288.
    • (2004) Information Management & Computer Security , vol.12 , Issue.3 , pp. 255-288
    • Gritzalis, S.1
  • 18
    • 24344462080 scopus 로고    scopus 로고
    • A framework for modelling privacy requirements in role engineering
    • 16-17 June paper presented at International Workshop on Requirements Engineering for Software Quality (REFSQ), Austria Klagenfurt/Velden
    • He, Q. and Antón, I.A. (2003), “A framework for modelling privacy requirements in role engineering”, paper presented at International Workshop on Requirements Engineering for Software Quality (REFSQ), Austria Klagenfurt/Velden, 16-17 June, pp. 115-124.
    • (2003) , pp. 115-124
    • He, Q.1    Antón, I.A.2
  • 20
    • 33646345792 scopus 로고    scopus 로고
    • STRAP: a structured analysis framework for privacy
    • GVU Technical Report.
    • Jensen, C., Tullio, J., Potts, C. and Mynatt, D. (2005), “STRAP: a structured analysis framework for privacy”, GVU Technical Report.
    • (2005)
    • Jensen, C.1    Tullio, J.2    Potts, C.3    Mynatt, D.4
  • 23
    • 33646358507 scopus 로고    scopus 로고
    • Incorporating privacy requirements into the system design process: the PriS conceptual framework
    • Kavakli, E., Kalloniatis, C., Loucopoulos, P. and Gritzalis, S. (2006), “Incorporating privacy requirements into the system design process: the PriS conceptual framework”, Internet Research, Vol. 16 No. 2, pp. 140-158.
    • (2006) Internet Research , vol.16 , Issue.2 , pp. 140-158
    • Kavakli, E.1    Kalloniatis, C.2    Loucopoulos, P.3    Gritzalis, S.4
  • 24
    • 50949105593 scopus 로고    scopus 로고
    • Privacy enhancing technologies
    • December White paper for Decision Makers. Ministry of the Interior and Kingdom Relations, The Hague
    • Koorn, R., van Gils, H., ter Hart, J., Overbeek, P. and Tellegen, R. (2004), “Privacy enhancing technologies”, White paper for Decision Makers. Ministry of the Interior and Kingdom Relations, The Hague, December.
    • (2004)
    • Koorn, R.1    van Gils, H.2    ter Hart, J.3    Overbeek, P.4    Tellegen, R.5
  • 25
    • 1142293423 scopus 로고    scopus 로고
    • Analyzing security requirements as relationships among strategic actors
    • www.sreis.org/old/2002/finalpaper9.pdf available at
    • Liu, L., Yu, E. and Mylopoulos, J. (2002), “Analyzing security requirements as relationships among strategic actors”, Proceedings of the SREIS'02, Raleigh, NC, available at: www.sreis.org/old/2002/finalpaper9.pdf.
    • (2002) Proceedings of the SREIS'02, Raleigh, NC
    • Liu, L.1    Yu, E.2    Mylopoulos, J.3
  • 28
    • 33644508508 scopus 로고    scopus 로고
    • Enterprise knowledge management and conceptual modelling
    • Loucopoulos, P. and Kavakli, V. (1999), “Enterprise knowledge management and conceptual modelling”, LNCS, Vol. 1565, pp. 123-143.
    • (1999) LNCS , vol.1565 , pp. 123-143
    • Loucopoulos, P.1    Kavakli, V.2
  • 29
    • 12344314483 scopus 로고    scopus 로고
    • A framework for security requirements engineering
    • Department of Computer Science, University of York Heslington
    • Moffett, D.J. and Nuseibeh, A.B. (2003), “A framework for security requirements engineering”, Report YCS 368, Department of Computer Science, University of York, Heslington.
    • (2003) Report YCS 368
    • Moffett, D.J.1    Nuseibeh, A.B.2
  • 31
    • 35048845022 scopus 로고    scopus 로고
    • Integrating security and systems engineering: towards the modelling of secure information systems
    • LNCS 2681 Springer-Verlag Berlin and Heidelberg
    • Mouratidis, H., Giorgini, P. and Manson, G. (2003b), “Integrating security and systems engineering: towards the modelling of secure information systems”, Proceedings of the CAiSE '03, LNCS 2681, Springer-Verlag, Berlin and Heidelberg, pp. 63-78.
    • (2003) Proceedings of the CAiSE '03 , pp. 63-78
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 32
    • 0026883734 scopus 로고
    • Representing and using non-functional requirements a process oriented approach
    • Mylopoulos, J., Chung, L. and Nixon, B. (1992), “Representing and using non-functional requirements a process oriented approach”, IEEE Transactions on Software Engineering, Vol. 18, pp. 483-497.
    • (1992) IEEE Transactions on Software Engineering , vol.18 , pp. 483-497
    • Mylopoulos, J.1    Chung, L.2    Nixon, B.3
  • 33
    • 0023331864 scopus 로고
    • Networks without user observability
    • Pfitzmann, A. and Waidner, M. (1987), “Networks without user observability”, Computers & Security, Vol. 6 No. 2, pp. 158-166.
    • (1987) Computers & Security , vol.6 , Issue.2 , pp. 158-166
    • Pfitzmann, A.1    Waidner, M.2
  • 36
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous web transactions with crowds
    • Reiter, K.M. and Rubin, D.A. (1999), “Anonymous web transactions with crowds”, Communications of the ACM, Vol. 42 No. 2, pp. 32-38.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 32-38
    • Reiter, K.M.1    Rubin, D.A.2
  • 38
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • van Lamsweerde, A. and Letier, E. (2000), “Handling obstacles in goal-oriented requirements engineering”, IEEE Transactions on Software Engineering, Vol. 26, pp. 978-1005.
    • (2000) IEEE Transactions on Software Engineering , vol.26 , pp. 978-1005
    • van Lamsweerde, A.1    Letier, E.2
  • 39
    • 34548539185 scopus 로고
    • European Parliament and the Council
    • Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and of the Free Movement of Such Data, European Parliament and the Council, Brussels, October.
    • European Parliament and the Council (1995), Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and of the Free Movement of Such Data, European Parliament and the Council, Brussels, October.
    • (1995)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.