-
1
-
-
84992925300
-
Privacy and e-government: privacy impact assessments and privacy commissioners – two mechanisms for protecting privacy to promote citizen trust online
-
www.internetpolicy.net/practices/030501pia.pdf memo available at
-
Anderson, P. and Dempsey, J. (2003), “Privacy and e-government: privacy impact assessments and privacy commissioners – two mechanisms for protecting privacy to promote citizen trust online”, memo available at: www.internetpolicy.net/practices/030501pia.pdf.
-
(2003)
-
-
Anderson, P.1
Dempsey, J.2
-
3
-
-
84992926393
-
Strategies for developing policies and requirements for secure electronic commerce systems
-
Antón, I.A. and Earp, B. (2000), “Strategies for developing policies and requirements for secure electronic commerce systems”, Proceedings of the 1st ACM Workshop on Security and Privacy in E-Commerce (in Conjunction with ACM CCS 2000), 1-4 November, pp. 1-10.
-
(2000)
Proceedings of the 1st ACM Workshop on Security and Privacy in E-Commerce (in Conjunction with ACM CCS 2000), 1-4 November
, pp. 1-10
-
-
Antón, I.A.1
Earp, B.2
-
4
-
-
0002131454
-
Design for privacy in ubiquitous computing environments
-
Bellotti, V. and Sellen, A. (1993), “Design for privacy in ubiquitous computing environments”, in Ed. Michelis, G., Ed. Simone, C. and Ed. Schmidt, K. (Eds), Proceedings of the Third European Conference on Computer Supported Cooperative Work – ECSCW 93, pp. 93-108.
-
(1993)
Proceedings of the Third European Conference on Computer Supported Cooperative Work – ECSCW 93
, pp. 93-108
-
-
Bellotti, V.1
Sellen, A.2
Michelis, G.3
Simone, C.4
Schmidt, K.5
-
6
-
-
33645586953
-
The Anonymizer: protecting user privacy on the web
-
www.anonymizer.com available at
-
Boyan, J. (1997), “The Anonymizer: protecting user privacy on the web”, Computer-Mediated Communication Magazine, Vol. 4 No. 9, pp. 7-13, available at: www.anonymizer.com.
-
(1997)
Computer-Mediated Communication Magazine
, vol.4
, Issue.9
, pp. 7-13
-
-
Boyan, J.1
-
8
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D. (1981), “Untraceable electronic mail, return addresses, and digital pseudonyms”, Communications of the ACM, Vol. 24 No. 2, pp. 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
9
-
-
0022145479
-
Security without identification: transactions systems to make big brother obsolete
-
Chaum, D. (1985), “Security without identification: transactions systems to make big brother obsolete”, Communications of the ACM, Vol. 28 No. 10, pp. 1030-44.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
10
-
-
0023861309
-
The dining cryptographers problem: unconditional sender and recipient untraceability
-
Chaum, D. (1988), “The dining cryptographers problem: unconditional sender and recipient untraceability”, Journal of Cryptology, Vol. 1 No. 1, pp. 65-75.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
11
-
-
84979855000
-
Dealing with security requirements during the development of information systems
-
Chung, L. (1993), “Dealing with security requirements during the development of information systems”, Proceedings of the CaiSE '93 5th International Conference of Advanced Information Systems Engineering, Paris, France, pp. 234-251.
-
(1993)
Proceedings of the CaiSE '93 5th International Conference of Advanced Information Systems Engineering, Paris, France
, pp. 234-251
-
-
Chung, L.1
-
12
-
-
84992930593
-
-
(The) Code of Fair Information Practices Education and Welfare, Washington, DC.
-
(The) Code of Fair Information Practices (1973), US Department of Health, Education and Welfare, Washington, DC.
-
(1973)
US Department of Health
-
-
-
13
-
-
85084161366
-
Tor: the second-generator onion router
-
Dingledine, R., Mathewson, N. and Syverson, P. (2004), “Tor: the second-generator onion router”, Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA.
-
(2004)
Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
14
-
-
84992928184
-
EU-Information Society DG, IST Programme 2000#29518
-
Project Deliverable D 7.6, Quality and Reliability SA – University of the Aegean, Greece.
-
EU-Information Society DG, IST Programme 2000#29518 (2000), E-vote: An Internet-based Electronic Voting System, Project Deliverable D 7.6, Quality and Reliability SA – University of the Aegean, Greece.
-
(2000)
E-vote: An Internet-based Electronic Voting System
-
-
-
15
-
-
33644968219
-
IT-security and privacy, design and use of privacy enhancing security mechanisms
-
Springer-Verlag Berlin
-
Fischer-Hübner, S. (2001), “IT-security and privacy, design and use of privacy enhancing security mechanisms”, Lecture Notes in Computer Science, Vol. 1958, Springer-Verlag, Berlin.
-
(2001)
Lecture Notes in Computer Science
, vol.1958
-
-
Fischer-Hübner, S.1
-
16
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
Goldschlag, D., Syverson, P. and Reed, M. (1999), “Onion routing for anonymous and private internet connections”, Communications of the ACM, Vol. 42 No. 2, pp. 39-41.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Syverson, P.2
Reed, M.3
-
17
-
-
9244222724
-
Enhancing web privacy and anonymity in the digital era
-
Gritzalis, S. (2004), “Enhancing web privacy and anonymity in the digital era”, Information Management & Computer Security, Vol. 12 No. 3, pp. 255-288.
-
(2004)
Information Management & Computer Security
, vol.12
, Issue.3
, pp. 255-288
-
-
Gritzalis, S.1
-
18
-
-
24344462080
-
A framework for modelling privacy requirements in role engineering
-
16-17 June paper presented at International Workshop on Requirements Engineering for Software Quality (REFSQ), Austria Klagenfurt/Velden
-
He, Q. and Antón, I.A. (2003), “A framework for modelling privacy requirements in role engineering”, paper presented at International Workshop on Requirements Engineering for Software Quality (REFSQ), Austria Klagenfurt/Velden, 16-17 June, pp. 115-124.
-
(2003)
, pp. 115-124
-
-
He, Q.1
Antón, I.A.2
-
19
-
-
33646346559
-
-
Designing Interactive Systems Boston, MA
-
Hong, J.I., Ng, J., Lederer, S. and Landay, J.A. (2004), Privacy Risk Models for Designing Privacy-sensitive Ubiquitous Computing Systems, Designing Interactive Systems, Boston, MA.
-
(2004)
Privacy Risk Models for Designing Privacy-sensitive Ubiquitous Computing Systems
-
-
Hong, J.I.1
Ng, J.2
Lederer, S.3
Landay, J.A.4
-
20
-
-
33646345792
-
STRAP: a structured analysis framework for privacy
-
GVU Technical Report.
-
Jensen, C., Tullio, J., Potts, C. and Mynatt, D. (2005), “STRAP: a structured analysis framework for privacy”, GVU Technical Report.
-
(2005)
-
-
Jensen, C.1
Tullio, J.2
Potts, C.3
Mynatt, D.4
-
21
-
-
34548145633
-
Using privacy process patterns for incorporating privacy requirements into the system design process
-
Kalloniatis, C., Kavakli, E. and Gritzalis, S. (2007), “Using privacy process patterns for incorporating privacy requirements into the system design process”, Proceedings of the Workshop on Secure Software Engineering (SecSe 2007), in Conjunction with the ARES 2007 International Conference on Availability, Reliability and Security, Vienna, Austria, April, pp. 1009-16.
-
(2007)
Proceedings of the Workshop on Secure Software Engineering (SecSe 2007), in Conjunction with the ARES 2007 International Conference on Availability, Reliability and Security, Vienna, Austria, April
, pp. 1009-1016
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
22
-
-
84992926879
-
Addressing privacy: matching user requirements with implementation techniques
-
LEA Publications Hillsdale, NJ
-
Kavakli, E., Kalloniatis, C. and Gritzalis, S. (2005), “Addressing privacy: matching user requirements with implementation techniques”, Proceedings of the 7th Hellenic European Conference on Computer Mathematics and its Applications, Athens, Greece, September, LEA Publications, Hillsdale, NJ, pp. 1-8.
-
(2005)
Proceedings of the 7th Hellenic European Conference on Computer Mathematics and its Applications, Athens, Greece, September
, pp. 1-8
-
-
Kavakli, E.1
Kalloniatis, C.2
Gritzalis, S.3
-
23
-
-
33646358507
-
Incorporating privacy requirements into the system design process: the PriS conceptual framework
-
Kavakli, E., Kalloniatis, C., Loucopoulos, P. and Gritzalis, S. (2006), “Incorporating privacy requirements into the system design process: the PriS conceptual framework”, Internet Research, Vol. 16 No. 2, pp. 140-158.
-
(2006)
Internet Research
, vol.16
, Issue.2
, pp. 140-158
-
-
Kavakli, E.1
Kalloniatis, C.2
Loucopoulos, P.3
Gritzalis, S.4
-
24
-
-
50949105593
-
Privacy enhancing technologies
-
December White paper for Decision Makers. Ministry of the Interior and Kingdom Relations, The Hague
-
Koorn, R., van Gils, H., ter Hart, J., Overbeek, P. and Tellegen, R. (2004), “Privacy enhancing technologies”, White paper for Decision Makers. Ministry of the Interior and Kingdom Relations, The Hague, December.
-
(2004)
-
-
Koorn, R.1
van Gils, H.2
ter Hart, J.3
Overbeek, P.4
Tellegen, R.5
-
25
-
-
1142293423
-
Analyzing security requirements as relationships among strategic actors
-
www.sreis.org/old/2002/finalpaper9.pdf available at
-
Liu, L., Yu, E. and Mylopoulos, J. (2002), “Analyzing security requirements as relationships among strategic actors”, Proceedings of the SREIS'02, Raleigh, NC, available at: www.sreis.org/old/2002/finalpaper9.pdf.
-
(2002)
Proceedings of the SREIS'02, Raleigh, NC
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
26
-
-
84942866002
-
Security and privacy requirements analysis within a social setting
-
Liu, L., Yu, E. and Mylopoulos, J. (2003), “Security and privacy requirements analysis within a social setting”, Proceedings of the RE'03 11th IEEE International Requirements Engineering Conference, Monterey Bay, CA, USA, pp. 151-161.
-
(2003)
Proceedings of the RE'03 11th IEEE International Requirements Engineering Conference, Monterey Bay, CA, USA
, pp. 151-161
-
-
Liu, L.1
Yu, E.2
Mylopoulos, J.3
-
28
-
-
33644508508
-
Enterprise knowledge management and conceptual modelling
-
Loucopoulos, P. and Kavakli, V. (1999), “Enterprise knowledge management and conceptual modelling”, LNCS, Vol. 1565, pp. 123-143.
-
(1999)
LNCS
, vol.1565
, pp. 123-143
-
-
Loucopoulos, P.1
Kavakli, V.2
-
29
-
-
12344314483
-
A framework for security requirements engineering
-
Department of Computer Science, University of York Heslington
-
Moffett, D.J. and Nuseibeh, A.B. (2003), “A framework for security requirements engineering”, Report YCS 368, Department of Computer Science, University of York, Heslington.
-
(2003)
Report YCS 368
-
-
Moffett, D.J.1
Nuseibeh, A.B.2
-
30
-
-
8344270973
-
An ontology for modelling security: the Tropos project
-
Lecture Notes in Artificial Intelligence 2773 Springer-Verlag Berlin
-
Mouratidis, H., Giorgini, P. and Manson, G. (2003a), “An ontology for modelling security: the Tropos project”, in Ed. Palade, V., Ed. Howlett, R.J. and Ed. Jain, L. (Eds), Proceedings of the KES 2003, Session: Ontology and Multi-agent Systems Design, UK, University of Oxford, Lecture Notes in Artificial Intelligence 2773, Springer-Verlag, Berlin, pp. 1387-94.
-
(2003)
Proceedings of the KES 2003, Session: Ontology and Multi-agent Systems Design, UK, University of Oxford
, pp. 1387-1394
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
Palade, V.4
Howlett, R.J.5
Jain, L.6
-
31
-
-
35048845022
-
Integrating security and systems engineering: towards the modelling of secure information systems
-
LNCS 2681 Springer-Verlag Berlin and Heidelberg
-
Mouratidis, H., Giorgini, P. and Manson, G. (2003b), “Integrating security and systems engineering: towards the modelling of secure information systems”, Proceedings of the CAiSE '03, LNCS 2681, Springer-Verlag, Berlin and Heidelberg, pp. 63-78.
-
(2003)
Proceedings of the CAiSE '03
, pp. 63-78
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
32
-
-
0026883734
-
Representing and using non-functional requirements a process oriented approach
-
Mylopoulos, J., Chung, L. and Nixon, B. (1992), “Representing and using non-functional requirements a process oriented approach”, IEEE Transactions on Software Engineering, Vol. 18, pp. 483-497.
-
(1992)
IEEE Transactions on Software Engineering
, vol.18
, pp. 483-497
-
-
Mylopoulos, J.1
Chung, L.2
Nixon, B.3
-
33
-
-
0023331864
-
Networks without user observability
-
Pfitzmann, A. and Waidner, M. (1987), “Networks without user observability”, Computers & Security, Vol. 6 No. 2, pp. 158-166.
-
(1987)
Computers & Security
, vol.6
, Issue.2
, pp. 158-166
-
-
Pfitzmann, A.1
Waidner, M.2
-
34
-
-
0032074579
-
Anonymous connections and onion routing
-
Reed, M., Syverson, P. and Goldschlag, D. (1998), “Anonymous connections and onion routing”, IEEE Journal on Selected Areas in Communications, Vol. 16 No. 4, pp. 482-494.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
35
-
-
0002054934
-
Crowds: anonymity for web transactions
-
Reiter, K.M. and Rubin, D.A. (1998), “Crowds: anonymity for web transactions”, ACM Transactions of Information and Systems Security, Vol. 1 No. 1, pp. 66-92.
-
(1998)
ACM Transactions of Information and Systems Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, K.M.1
Rubin, D.A.2
-
36
-
-
0001777423
-
Anonymous web transactions with crowds
-
Reiter, K.M. and Rubin, D.A. (1999), “Anonymous web transactions with crowds”, Communications of the ACM, Vol. 42 No. 2, pp. 32-38.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 32-38
-
-
Reiter, K.M.1
Rubin, D.A.2
-
37
-
-
0034447260
-
A protocol for anonymous communication over the internet
-
ACM Press New York, NY
-
Shields, C. and Levine, N.B. (2000), “A protocol for anonymous communication over the internet”, in Ed. Samarati, P. and Ed. Jajodia, S. (Eds), Proceedings of the 7th ACM Conference on Computer and Communications Security, ACM Press, New York, NY, pp. 33-42.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 33-42
-
-
Shields, C.1
Levine, N.B.2
Samarati, P.3
Jajodia, S.4
-
38
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
van Lamsweerde, A. and Letier, E. (2000), “Handling obstacles in goal-oriented requirements engineering”, IEEE Transactions on Software Engineering, Vol. 26, pp. 978-1005.
-
(2000)
IEEE Transactions on Software Engineering
, vol.26
, pp. 978-1005
-
-
van Lamsweerde, A.1
Letier, E.2
-
39
-
-
34548539185
-
European Parliament and the Council
-
Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and of the Free Movement of Such Data, European Parliament and the Council, Brussels, October.
-
European Parliament and the Council (1995), Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and of the Free Movement of Such Data, European Parliament and the Council, Brussels, October.
-
(1995)
-
-
|