메뉴 건너뛰기




Volumn 0, Issue , 2016, Pages 360-365

Supporting model-based privacy analysis by exploiting privacy level agreements

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING;

EID: 85013025310     PISSN: 23302194     EISSN: 23302186     Source Type: Conference Proceeding    
DOI: 10.1109/CloudCom.2016.0063     Document Type: Conference Paper
Times cited : (8)

References (31)
  • 3
    • 85080712019 scopus 로고    scopus 로고
    • Online Available
    • VisiOn Project. [Online]. Available: http://www.visioneuproject. eu/ 2016
    • (2016) VisiOn Project
  • 4
    • 85010038739 scopus 로고    scopus 로고
    • Accessed 08-07. [Online]. Available
    • Cloud Security Alliance. Accessed: 2016-08-07. [Online]. Available: http://cloudsecurityalliance.org/
    • (2016) Cloud Security Alliance
  • 6
    • 33750060125 scopus 로고    scopus 로고
    • Model-based security engineering with UML
    • ser. Lecture Notes in Computer Science, A. Aldini, R. Gorrieri, and F. Martinelli, Eds
    • J. Jürjens, "Model-based security engineering with UML," in Foundations of Security Analysis, and Desing III: FOSAD 2004/2005 Tutorial Lectures, ser. Lecture Notes in Computer Science, A. Aldini, R. Gorrieri, and F. Martinelli, Eds., 2005, vol. 3655, pp. 42-77
    • (2005) Foundations of Security Analysis, and Desing III: FOSAD 2004/2005 Tutorial Lectures , vol.3655 , pp. 42-77
    • Jürjens, J.1
  • 9
    • 85080755341 scopus 로고    scopus 로고
    • May Online]. Available
    • (2016, May) CARiSMA. [Online]. Available: https://rgse.uni-koblenz. de/carisma/
    • (2016) CARiSMA
  • 10
    • 84885216103 scopus 로고    scopus 로고
    • Secure information flow for concurrent processes
    • CONCUR 2000), ser. Lecture Notes in Computer Science Springer Verlag
    • J. Jürjens, "Secure information flow for concurrent processes," in 11th International Conference on Concurrency Theory (CONCUR 2000), ser. Lecture Notes in Computer Science, vol. 1877. Springer Verlag, 2000, pp. 395-409
    • (2000) 11th International Conference on Concurrency Theory , vol.1877 , pp. 395-409
    • Jürjens, J.1
  • 11
    • 84904204049 scopus 로고    scopus 로고
    • Security modelling for electronic commerce: The common electronic purse specifications
    • I3E Kluwer
    • J. Jürjens, and G. Wimmel, "Security modelling for electronic commerce: The Common Electronic Purse Specifications," in First IFIP Conference on e-Commerce, e-Business, and e-Government (I3E). Kluwer, 2001, pp. 489-505
    • (2001) First IFIP Conference on E-Commerce, E-Business, and E-Government , pp. 489-505
    • Jürjens, J.1    Wimmel, G.2
  • 14
    • 84899177670 scopus 로고    scopus 로고
    • An integrated security verification, and security solution design trade-off analysis approach
    • Vision, H. Mouratidis, Ed. Idea Group invited chapter
    • S. H. Houmb, G. Georg, J. Jürjens, and R. B. France, "An integrated security verification, and security solution design trade-off analysis approach," in Integrating Security, and Software Engineering: Advances, and Future Vision, H. Mouratidis, Ed. Idea Group, 2006, pp. 190-219, invited chapter
    • (2006) Integrating Security, and Software Engineering: Advances, and Future , pp. 190-219
    • Houmb, S.H.1    Georg, G.2    Jürjens, J.3    France, R.B.4
  • 17
    • 84939641193 scopus 로고    scopus 로고
    • Guiding a general-purpose c verifier to prove cryptographic protocols
    • special issue with best papers from the 24th IEEE Computer Security Foundations Symposium (CSF
    • F. Dupressoir, A. D. Gordon, J. Jürjens, and D. Naumann, "Guiding a general-purpose c verifier to prove cryptographic protocols," Journal of Computer Security, vol. 22, no. 5, pp. 823-866, 2014, special issue with best papers from the 24th IEEE Computer Security Foundations Symposium (CSF
    • (2014) Journal of Computer Security , vol.22 , Issue.5 , pp. 823-866
    • Dupressoir, F.1    Gordon, A.D.2    Jürjens, J.3    Naumann, D.4
  • 20
    • 4243355127 scopus 로고
    • Directive 95/46/EC of the European parliament, and of the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data, and on the free movement of such data
    • European Parliament Council of the European Union L
    • European Parliament, Council of the European Union, "Directive 95/46/EC of the European Parliament, and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data, and on the free movement of such data," Official Journal of the European Union, vol. L 281, 1995
    • (1995) Official Journal of the European Union , pp. 281
  • 21
    • 85012957343 scopus 로고    scopus 로고
    • Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data, and on the free movement of such data
    • European Parliament L
    • European Parliament, "Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data, and on the free movement of such data ," Official Journal of the European Union, vol. L 119, 2016
    • (2016) Official Journal of the European Union , vol.119
  • 23
    • 70849129259 scopus 로고    scopus 로고
    • A lattice-based privacy aware access control model
    • CSE 09. International Conference on Aug
    • K. Ghazinour, M. Majedi, and K. Barker, "A lattice-based privacy aware access control model," in Computational Science, and Engineering, 2009. CSE 09. International Conference on, vol. 3, Aug 2009, pp. 154-159
    • (2009) Computational Science, and Engineering 2009 , vol.3 , pp. 154-159
    • Ghazinour, K.1    Majedi, M.2    Barker, K.3
  • 24
    • 0030086382 scopus 로고    scopus 로고
    • Rolebased access control models
    • Feb. Online]. Available
    • R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Rolebased access control models," Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996. [Online]. Available: http://dx.doi.org/10.1109/2.485845
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.S.1    Coyne, E.J.2    Feinstein, H.L.3    Youman, C.E.4
  • 28
    • 84944342746 scopus 로고    scopus 로고
    • Towards a formalised representation for the technical enforcement of privacy level agreements
    • March
    • M. DErrico, and S. Pearson, "Towards a formalised representation for the technical enforcement of privacy level agreements," in Cloud Engineering (IC2E), 2015 IEEE International Conference on, March 2015, pp. 422-427
    • (2015) Cloud Engineering (IC2E), 2015 IEEE International Conference on , pp. 422-427
    • DErrico, M.1    Pearson, S.2
  • 29
    • 79959729769 scopus 로고    scopus 로고
    • A framework to support alignment of secure software engineering with legal regulations
    • Online]. Available
    • S. Islam, H. Mouratidis, and J. Jürjens, "A framework to support alignment of secure software engineering with legal regulations," Software & Systems Modeling, vol. 10, no. 3, pp. 369-394, 2011. [Online]. Available: http://dx.doi.org/10.1007/s10270-010-0154-z
    • (2011) Software & Systems Modeling , vol.10 , Issue.3 , pp. 369-394
    • Islam, S.1    Mouratidis, H.2    Jürjens, J.3
  • 30
    • 79958060292 scopus 로고    scopus 로고
    • A model-based privacy compliance checker
    • Online]. Available
    • S. Pearson, and D. Allison, "A model-based privacy compliance checker," IJEBR, vol. 5, no. 2, pp. 63-83, 2009. [Online]. Available: http://dx.doi.org/10.4018/jebr.2009040104
    • (2009) IJEBR , vol.5 , Issue.2 , pp. 63-83
    • Pearson, S.1    Allison, D.2
  • 31
    • 70349836055 scopus 로고    scopus 로고
    • Taking account of privacy when designing cloud computing services
    • ser. CLOUD 09. IEEE Computer Society Online]. Available
    • S. Pearson, "Taking account of privacy when designing cloud computing services," in Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, ser. CLOUD 09. IEEE Computer Society, 2009, pp. 44-52. [Online]. Available: http://dx.doi.org/10.1109/CLOUD.2009.5071532
    • (2009) Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing , pp. 44-52
    • Pearson, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.