-
1
-
-
80053267657
-
A contextual approach to privacy online
-
Fall
-
H. Nissenbaum, "A contextual approach to privacy online," Daedalus, vol. 140, no. 4, pp. 32-48, Fall 2011.
-
(2011)
Daedalus
, vol.140
, Issue.4
, pp. 32-48
-
-
Nissenbaum, H.1
-
2
-
-
33644925852
-
A taxonomy of privacy
-
January, gWU Law School Public Law Research Paper No. 129
-
D. J. Solove, "A taxonomy of privacy," University of Pennsylvania Law Review, vol. 154, no. 3, p. 477, January 2006, gWU Law School Public Law Research Paper No. 129.
-
(2006)
University of Pennsylvania Law Review
, vol.154
, Issue.3
, pp. 477
-
-
Solove, D.J.1
-
3
-
-
0036045758
-
Conceptualizing privacy
-
-, "Conceptualizing Privacy," California Law Review, vol. 90, no. 4, pp. 1087-1155, 2002.
-
(2002)
California Law Review
, vol.90
, Issue.4
, pp. 1087-1155
-
-
Solove, D.J.1
-
6
-
-
40449096076
-
Analyzing regulatory rules for privacy and security requirements
-
T. D. Breaux and A. I. Anton, "Analyzing regulatory rules for privacy and security requirements," IEEE Transactions on Software Engineering, vol. 34, no. 1, pp. 5-20, 2008.
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.D.1
Anton, A.I.2
-
7
-
-
84963509914
-
Towards an information type lexicon for privacy policies
-
Ottawa, ON, Canada, August 25, 2015. IEEE, [Online]
-
J. Bhatia and T. D. Breaux, "Towards an information type lexicon for privacy policies," in Eighth IEEE International Workshop on Requirements Engineering and Law, RELAW 2015, Ottawa, ON, Canada, August 25, 2015. IEEE, 2015, pp. 19-24. [Online]. Available: http://dx.doi.org/10.1109/RELAW.2015.7330207
-
(2015)
Eighth IEEE International Workshop on Requirements Engineering and Law, RELAW 2015
, pp. 19-24
-
-
Bhatia, J.1
Breaux, T.D.2
-
8
-
-
34250717425
-
An empirical study of natural language parsing of privacy policy rules using the sparcle policy workbench
-
New York, NY, USA: ACM
-
C. A. Brodie, C.-M. Karat, and J. Karat, "An empirical study of natural language parsing of privacy policy rules using the sparcle policy workbench," in SOUPS '06: Proceedings of the second symposium on Usable privacy and security. New York, NY, USA: ACM, 2006, pp. 8-19.
-
(2006)
SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security
, pp. 8-19
-
-
Brodie, C.A.1
Karat, C.-M.2
Karat, J.3
-
9
-
-
85007244515
-
-
Springer International Publishing
-
Y. Miche, I. Oliver, S. Holtmanns, A. Akusok, A. Lendasse, and K.-M. Björk, On Mutual Information over Non-Euclidean Spaces, Data Mining and Data Privacy Levels. Springer International Publishing, 2016, pp. 371-383.
-
(2016)
On Mutual Information over Non-Euclidean Spaces, Data Mining and Data Privacy Levels
, pp. 371-383
-
-
Miche, Y.1
Oliver, I.2
Holtmanns, S.3
Akusok, A.4
Lendasse, A.5
Björk, K.-M.6
-
10
-
-
84962431723
-
Detecting repurposing and over-collection in multi-party privacy requirements specifications
-
RE 2015, Ottawa, ON, Canada, August 24-28, D. Zowghi, V. Gervasi, and D. Amyot, Eds. IEEE Computer Society, 2015, [Online]
-
T. D. Breaux, D. Smullen, and H. Hibshi, "Detecting repurposing and over-collection in multi-party privacy requirements specifications," in 23rd IEEE International Requirements Engineering Conference, RE 2015, Ottawa, ON, Canada, August 24-28, 2015, D. Zowghi, V. Gervasi, and D. Amyot, Eds. IEEE Computer Society, 2015, pp. 166-175. [Online]. Available: http://dx.doi.org/10.1109/RE.2015.7320419
-
(2015)
23rd IEEE International Requirements Engineering Conference
, pp. 166-175
-
-
Breaux, T.D.1
Smullen, D.2
Hibshi, H.3
-
12
-
-
84879921397
-
-
Tech. Rep
-
K. Belhajjame, J. Cheney, D. Corsar, D. Garijo, S. Soiland-Reyes, S. Zednik, and J. Zhao, "PROV-O: The PROV Ontology," W3C, Tech. Rep., 2012.
-
(2012)
PROV-O: The PROV Ontology
, vol.W3C
-
-
Belhajjame, K.1
Cheney, J.2
Corsar, D.3
Garijo, D.4
Soiland-Reyes, S.5
Zednik, S.6
Zhao, J.7
-
13
-
-
78651112728
-
Reflections on provenance ontology encodings
-
ser. Lecture Notes in Computer Science, D. McGuinness, J. Michaelis, and L. Moreau, Eds. Springer Berlin Heidelberg
-
L. Ding, J. Bao, J. Michaelis, J. Zhao, and D. McGuinness, "Reflections on provenance ontology encodings," in Provenance and Annotation of Data and Processes, ser. Lecture Notes in Computer Science, D. McGuinness, J. Michaelis, and L. Moreau, Eds. Springer Berlin Heidelberg, 2010, vol. 6378, pp. 198-205.
-
(2010)
Provenance and Annotation of Data and Processes
, vol.6378
, pp. 198-205
-
-
Ding, L.1
Bao, J.2
Michaelis, J.3
Zhao, J.4
McGuinness, D.5
-
14
-
-
77955083454
-
-
The Open Group
-
Risk Taxonomy, The Open Group, 2009.
-
(2009)
Risk Taxonomy
-
-
-
15
-
-
64849116975
-
A requirements-based comparison of privacy taxonomies
-
ser. RELAW '08. Washington, DC, USA: IEEE Computer Society
-
A. K. Massey and A. I. Antón, "A requirements-based comparison of privacy taxonomies," in Proceedings of the 2008 Requirements Engineering and Law, ser. RELAW '08. Washington, DC, USA: IEEE Computer Society, 2008, pp. 1-5.
-
(2008)
Proceedings of the 2008 Requirements Engineering and Law
, pp. 1-5
-
-
Massey, A.K.1
Antón, A.I.2
-
16
-
-
0034271735
-
Risky business: What we have yet to learn about risk management
-
S. L. Pfleeger, "Risky business: what we have yet to learn about risk management," Journal of Systems and Software, vol. 53, no. 3, pp. 265-273, 2000.
-
(2000)
Journal of Systems and Software
, vol.53
, Issue.3
, pp. 265-273
-
-
Pfleeger, S.L.1
-
17
-
-
17744389340
-
A requirements taxonomy for reducing web site privacy vulnerabilities
-
A. I. Antón and J. B. Earp, "A requirements taxonomy for reducing web site privacy vulnerabilities," Requirements Engineering, vol. 9, no. 3, pp. 169-185, 2004.
-
(2004)
Requirements Engineering
, vol.9
, Issue.3
, pp. 169-185
-
-
Antón, A.I.1
Earp, J.B.2
-
18
-
-
70350159316
-
-
NIST, Gaithersburg, MD, United States, Tech. Rep
-
E. McCallister, T. Grance, and K. A. Scarfone, "SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)," NIST, Gaithersburg, MD, United States, Tech. Rep., 2010.
-
(2010)
SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
-
-
McCallister, E.1
Grance, T.2
Scarfone, K.A.3
-
19
-
-
69549117388
-
Evaluating the risk of re-identification of patients from hospital prescription records
-
K. Emam, F. Dankar, R. Vaillancourt, T. Roffey, and M. Lysyk, "Evaluating the risk of re-identification of patients from hospital prescription records," The Canadian Journal of Hospital Pharmacy, vol. 62, no. 4, 2009.
-
(2009)
The Canadian Journal of Hospital Pharmacy
, vol.62
, Issue.4
-
-
Emam, K.1
Dankar, F.2
Vaillancourt, R.3
Roffey, T.4
Lysyk, M.5
-
20
-
-
84863508974
-
Estimating the reidentification risk of clinical data sets
-
9 July
-
F. Dankar, K. E. Emam, A. Neisa, and T. Roffey, "Estimating the reidentification risk of clinical data sets," BMC Medical Informatics and Decision Making, vol. 66, 9 July 2012.
-
(2012)
BMC Medical Informatics and Decision Making
, vol.66
-
-
Dankar, F.1
Emam, K.E.2
Neisa, A.3
Roffey, T.4
-
24
-
-
34250785707
-
Engineering and theoretical underpinnings of retrenchment
-
R. Banach, M. Poppleton, C. Jeske, and S. Stepney, "Engineering and theoretical underpinnings of retrenchment." Sci. Comput. Program., vol. 67, no. 2-3, pp. 301-329, 2007.
-
(2007)
Sci. Comput. Program.
, vol.67
, Issue.2-3
, pp. 301-329
-
-
Banach, R.1
Poppleton, M.2
Jeske, C.3
Stepney, S.4
-
25
-
-
10044248787
-
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
-
ser. DIS '04. ACM
-
J. I. Hong, J. D. Ng, S. Lederer, and J. A. Landay, "Privacy risk models for designing privacy-sensitive ubiquitous computing systems," in Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, ser. DIS '04. ACM, 2004, pp. 91-100.
-
(2004)
Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques
, pp. 91-100
-
-
Hong, J.I.1
Ng, J.D.2
Lederer, S.3
Landay, J.A.4
-
27
-
-
84966784696
-
Aligning the conflicting needs of privacy, malware detection and network protection
-
Helsinki, Finland, August 20-22, 2015, IEEE, [Online]
-
I. Oliver and S. Holtmanns, "Aligning the conflicting needs of privacy, malware detection and network protection," in 2015 IEEE Trust Com/Big Data SE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1. IEEE, 2015, pp. 547-554. [Online]. Available: http://dx.doi.org/10.1109/Trustcom.2015.418
-
(2015)
2015 IEEE Trust Com/Big Data SE/ISPA
, vol.1
, pp. 547-554
-
-
Oliver, I.1
Holtmanns, S.2
-
28
-
-
84891069246
-
Protecting privacy: Towards a visual framework for handling end-user data
-
San Jose, CA, USA, September 15-19, 2013, C. Kelleher, M. M. Burnett, and S. Sauer, Eds. IEEE Computer Society, [Online]
-
I. Oliver, J. Howse, and G. Stapleton, "Protecting privacy: Towards a visual framework for handling end-user data," in 2013 IEEE Symposium on Visual Languages and Human Centric Computing, San Jose, CA, USA, September 15-19, 2013, C. Kelleher, M. M. Burnett, and S. Sauer, Eds. IEEE Computer Society, 2013, pp. 67-74. [Online]. Available: http://dx.doi.org/10.1109/VLHCC.2013.6645245
-
(2013)
2013 IEEE Symposium on Visual Languages and Human Centric Computing
, pp. 67-74
-
-
Oliver, I.1
Howse, J.2
Stapleton, G.3
-
30
-
-
84886379651
-
Technical debt in software development: From metaphor to theory report on the third international workshop on managing technical debt
-
P. Kruchten, R. L. Nord, I. Ozkaya, and J. Visser, "Technical debt in software development: from metaphor to theory report on the third international workshop on managing technical debt." ACM SIGSOFT Software Engineering Notes, vol. 37, no. 5, pp. 36-38, 2012.
-
(2012)
ACM SIGSOFT Software Engineering Notes
, vol.37
, Issue.5
, pp. 36-38
-
-
Kruchten, P.1
Nord, R.L.2
Ozkaya, I.3
Visser, J.4
-
31
-
-
0003727420
-
-
New York, NY, USA: Cambridge University Press
-
F. Baader, D. Calvanese, D. L. McGuinness, D. Nardi, and P. F. Patel-Schneider, Eds., The description logic handbook: theory, implementation, and applications. New York, NY, USA: Cambridge University Press, 2003.
-
(2003)
The Description Logic Handbook: Theory, Implementation, and Applications
-
-
Baader, F.1
Calvanese, D.2
McGuinness, D.L.3
Nardi, D.4
Patel-Schneider, P.F.5
-
33
-
-
80052782295
-
Engineering privacy by design
-
S. Gürses, C. Gonzalez Troncoso, and C. Diaz, "Engineering privacy by design," Computers, Privacy & Data Protection, 2011.
-
(2011)
Computers, Privacy & Data Protection
-
-
Gürses, S.1
Gonzalez Troncoso, C.2
Diaz, C.3
-
34
-
-
79952002261
-
A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
-
[Online]
-
M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, "A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements," Requirements Engineering Journal, vol. 16, no. 1, pp. 3-32, 2011. [Online]. Available: https://lirias.kuleuven.be/handle/123456789/281181
-
(2011)
Requirements Engineering Journal
, vol.16
, Issue.1
, pp. 3-32
-
-
Deng, M.1
Wuyts, K.2
Scandariato, R.3
Preneel, B.4
Joosen, W.5
-
35
-
-
84906950333
-
Empirical evaluation of a privacy-focused threat modeling methodology
-
October. [Online]
-
K. Wuyts, R. Scandariato, and W. Joosen, "Empirical evaluation of a privacy-focused threat modeling methodology," The Journal of Systems and Software, vol. 96, pp. 122-138, October 2014. [Online]. Available: https://lirias.kuleuven.be/handle/123456789/460343
-
(2014)
The Journal of Systems and Software
, vol.96
, pp. 122-138
-
-
Wuyts, K.1
Scandariato, R.2
Joosen, W.3
|