메뉴 건너뛰기




Volumn , Issue , 2016, Pages 293-302

Experiences in the Development and Usage of a Privacy Requirements Framework

Author keywords

Ontologies; Privacy; Privacy Engineering; Requirements; Semantics

Indexed keywords

COMPLIANCE CONTROL; DATA PRIVACY; ONTOLOGY; REQUIREMENTS ENGINEERING; RISK ANALYSIS; RISK ASSESSMENT; SEMANTICS; SOFTWARE ENGINEERING;

EID: 85007227232     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RE.2016.59     Document Type: Conference Paper
Times cited : (8)

References (35)
  • 1
    • 80053267657 scopus 로고    scopus 로고
    • A contextual approach to privacy online
    • Fall
    • H. Nissenbaum, "A contextual approach to privacy online," Daedalus, vol. 140, no. 4, pp. 32-48, Fall 2011.
    • (2011) Daedalus , vol.140 , Issue.4 , pp. 32-48
    • Nissenbaum, H.1
  • 2
    • 33644925852 scopus 로고    scopus 로고
    • A taxonomy of privacy
    • January, gWU Law School Public Law Research Paper No. 129
    • D. J. Solove, "A taxonomy of privacy," University of Pennsylvania Law Review, vol. 154, no. 3, p. 477, January 2006, gWU Law School Public Law Research Paper No. 129.
    • (2006) University of Pennsylvania Law Review , vol.154 , Issue.3 , pp. 477
    • Solove, D.J.1
  • 3
    • 0036045758 scopus 로고    scopus 로고
    • Conceptualizing privacy
    • -, "Conceptualizing Privacy," California Law Review, vol. 90, no. 4, pp. 1087-1155, 2002.
    • (2002) California Law Review , vol.90 , Issue.4 , pp. 1087-1155
    • Solove, D.J.1
  • 6
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulatory rules for privacy and security requirements
    • T. D. Breaux and A. I. Anton, "Analyzing regulatory rules for privacy and security requirements," IEEE Transactions on Software Engineering, vol. 34, no. 1, pp. 5-20, 2008.
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.D.1    Anton, A.I.2
  • 7
    • 84963509914 scopus 로고    scopus 로고
    • Towards an information type lexicon for privacy policies
    • Ottawa, ON, Canada, August 25, 2015. IEEE, [Online]
    • J. Bhatia and T. D. Breaux, "Towards an information type lexicon for privacy policies," in Eighth IEEE International Workshop on Requirements Engineering and Law, RELAW 2015, Ottawa, ON, Canada, August 25, 2015. IEEE, 2015, pp. 19-24. [Online]. Available: http://dx.doi.org/10.1109/RELAW.2015.7330207
    • (2015) Eighth IEEE International Workshop on Requirements Engineering and Law, RELAW 2015 , pp. 19-24
    • Bhatia, J.1    Breaux, T.D.2
  • 10
    • 84962431723 scopus 로고    scopus 로고
    • Detecting repurposing and over-collection in multi-party privacy requirements specifications
    • RE 2015, Ottawa, ON, Canada, August 24-28, D. Zowghi, V. Gervasi, and D. Amyot, Eds. IEEE Computer Society, 2015, [Online]
    • T. D. Breaux, D. Smullen, and H. Hibshi, "Detecting repurposing and over-collection in multi-party privacy requirements specifications," in 23rd IEEE International Requirements Engineering Conference, RE 2015, Ottawa, ON, Canada, August 24-28, 2015, D. Zowghi, V. Gervasi, and D. Amyot, Eds. IEEE Computer Society, 2015, pp. 166-175. [Online]. Available: http://dx.doi.org/10.1109/RE.2015.7320419
    • (2015) 23rd IEEE International Requirements Engineering Conference , pp. 166-175
    • Breaux, T.D.1    Smullen, D.2    Hibshi, H.3
  • 13
    • 78651112728 scopus 로고    scopus 로고
    • Reflections on provenance ontology encodings
    • ser. Lecture Notes in Computer Science, D. McGuinness, J. Michaelis, and L. Moreau, Eds. Springer Berlin Heidelberg
    • L. Ding, J. Bao, J. Michaelis, J. Zhao, and D. McGuinness, "Reflections on provenance ontology encodings," in Provenance and Annotation of Data and Processes, ser. Lecture Notes in Computer Science, D. McGuinness, J. Michaelis, and L. Moreau, Eds. Springer Berlin Heidelberg, 2010, vol. 6378, pp. 198-205.
    • (2010) Provenance and Annotation of Data and Processes , vol.6378 , pp. 198-205
    • Ding, L.1    Bao, J.2    Michaelis, J.3    Zhao, J.4    McGuinness, D.5
  • 14
    • 77955083454 scopus 로고    scopus 로고
    • The Open Group
    • Risk Taxonomy, The Open Group, 2009.
    • (2009) Risk Taxonomy
  • 15
    • 64849116975 scopus 로고    scopus 로고
    • A requirements-based comparison of privacy taxonomies
    • ser. RELAW '08. Washington, DC, USA: IEEE Computer Society
    • A. K. Massey and A. I. Antón, "A requirements-based comparison of privacy taxonomies," in Proceedings of the 2008 Requirements Engineering and Law, ser. RELAW '08. Washington, DC, USA: IEEE Computer Society, 2008, pp. 1-5.
    • (2008) Proceedings of the 2008 Requirements Engineering and Law , pp. 1-5
    • Massey, A.K.1    Antón, A.I.2
  • 16
    • 0034271735 scopus 로고    scopus 로고
    • Risky business: What we have yet to learn about risk management
    • S. L. Pfleeger, "Risky business: what we have yet to learn about risk management," Journal of Systems and Software, vol. 53, no. 3, pp. 265-273, 2000.
    • (2000) Journal of Systems and Software , vol.53 , Issue.3 , pp. 265-273
    • Pfleeger, S.L.1
  • 17
    • 17744389340 scopus 로고    scopus 로고
    • A requirements taxonomy for reducing web site privacy vulnerabilities
    • A. I. Antón and J. B. Earp, "A requirements taxonomy for reducing web site privacy vulnerabilities," Requirements Engineering, vol. 9, no. 3, pp. 169-185, 2004.
    • (2004) Requirements Engineering , vol.9 , Issue.3 , pp. 169-185
    • Antón, A.I.1    Earp, J.B.2
  • 24
    • 34250785707 scopus 로고    scopus 로고
    • Engineering and theoretical underpinnings of retrenchment
    • R. Banach, M. Poppleton, C. Jeske, and S. Stepney, "Engineering and theoretical underpinnings of retrenchment." Sci. Comput. Program., vol. 67, no. 2-3, pp. 301-329, 2007.
    • (2007) Sci. Comput. Program. , vol.67 , Issue.2-3 , pp. 301-329
    • Banach, R.1    Poppleton, M.2    Jeske, C.3    Stepney, S.4
  • 27
    • 84966784696 scopus 로고    scopus 로고
    • Aligning the conflicting needs of privacy, malware detection and network protection
    • Helsinki, Finland, August 20-22, 2015, IEEE, [Online]
    • I. Oliver and S. Holtmanns, "Aligning the conflicting needs of privacy, malware detection and network protection," in 2015 IEEE Trust Com/Big Data SE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1. IEEE, 2015, pp. 547-554. [Online]. Available: http://dx.doi.org/10.1109/Trustcom.2015.418
    • (2015) 2015 IEEE Trust Com/Big Data SE/ISPA , vol.1 , pp. 547-554
    • Oliver, I.1    Holtmanns, S.2
  • 28
    • 84891069246 scopus 로고    scopus 로고
    • Protecting privacy: Towards a visual framework for handling end-user data
    • San Jose, CA, USA, September 15-19, 2013, C. Kelleher, M. M. Burnett, and S. Sauer, Eds. IEEE Computer Society, [Online]
    • I. Oliver, J. Howse, and G. Stapleton, "Protecting privacy: Towards a visual framework for handling end-user data," in 2013 IEEE Symposium on Visual Languages and Human Centric Computing, San Jose, CA, USA, September 15-19, 2013, C. Kelleher, M. M. Burnett, and S. Sauer, Eds. IEEE Computer Society, 2013, pp. 67-74. [Online]. Available: http://dx.doi.org/10.1109/VLHCC.2013.6645245
    • (2013) 2013 IEEE Symposium on Visual Languages and Human Centric Computing , pp. 67-74
    • Oliver, I.1    Howse, J.2    Stapleton, G.3
  • 30
    • 84886379651 scopus 로고    scopus 로고
    • Technical debt in software development: From metaphor to theory report on the third international workshop on managing technical debt
    • P. Kruchten, R. L. Nord, I. Ozkaya, and J. Visser, "Technical debt in software development: from metaphor to theory report on the third international workshop on managing technical debt." ACM SIGSOFT Software Engineering Notes, vol. 37, no. 5, pp. 36-38, 2012.
    • (2012) ACM SIGSOFT Software Engineering Notes , vol.37 , Issue.5 , pp. 36-38
    • Kruchten, P.1    Nord, R.L.2    Ozkaya, I.3    Visser, J.4
  • 34
    • 79952002261 scopus 로고    scopus 로고
    • A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
    • [Online]
    • M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, "A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements," Requirements Engineering Journal, vol. 16, no. 1, pp. 3-32, 2011. [Online]. Available: https://lirias.kuleuven.be/handle/123456789/281181
    • (2011) Requirements Engineering Journal , vol.16 , Issue.1 , pp. 3-32
    • Deng, M.1    Wuyts, K.2    Scandariato, R.3    Preneel, B.4    Joosen, W.5
  • 35
    • 84906950333 scopus 로고    scopus 로고
    • Empirical evaluation of a privacy-focused threat modeling methodology
    • October. [Online]
    • K. Wuyts, R. Scandariato, and W. Joosen, "Empirical evaluation of a privacy-focused threat modeling methodology," The Journal of Systems and Software, vol. 96, pp. 122-138, October 2014. [Online]. Available: https://lirias.kuleuven.be/handle/123456789/460343
    • (2014) The Journal of Systems and Software , vol.96 , pp. 122-138
    • Wuyts, K.1    Scandariato, R.2    Joosen, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.