메뉴 건너뛰기




Volumn 502, Issue , 2017, Pages 491-505

Supporting privacy by design using privacy process patterns

Author keywords

Information security modeling; Privacy process patterns; Requirements engineering

Indexed keywords

INFORMATION TECHNOLOGY; REQUIREMENTS ENGINEERING;

EID: 85019701340     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-319-58469-0_33     Document Type: Conference Paper
Times cited : (23)

References (33)
  • 1
    • 84972531331 scopus 로고
    • Enhancing access to microdata while protecting confidentiality: Prospects for the future
    • Institute of Mathematical Statistic
    • Duncan, G.T., Pearson, R.W.: Enhancing access to microdata while protecting confidentiality: Prospects for the future. Stat. Sci. 6(3), 219-232 (1991). Institute of Mathematical Statistic
    • (1991) Stat. Sci , vol.6 , Issue.3 , pp. 219-232
    • Duncan, G.T.1    Pearson, R.W.2
  • 2
    • 85019687869 scopus 로고    scopus 로고
    • Privacy Enhancing Technologies: The path to anonymity
    • Hes, R., Borking, J.: Privacy Enhancing Technologies: the path to anonymity. ISBN. vol. 90(74087), p. 12 (1998)
    • (1998) ISBN , vol.90 , Issue.74087
    • Hes, R.1    Borking, J.2
  • 3
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: The PriS method
    • Springer
    • Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requirements Eng. 13(3), 241-255 (2008). Springer
    • (2008) Requirements Eng , vol.13 , Issue.3 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 6
    • 84878677619 scopus 로고    scopus 로고
    • A pattern language for developing privacy enhancing technologies
    • Wiley Online Library
    • Hafiz, M.: A pattern language for developing privacy enhancing technologies. Softw. Pract. Experience 43(7), 769-787 (2013). Wiley Online Library
    • (2013) Softw. Pract. Experience , vol.43 , Issue.7 , pp. 769-787
    • Hafiz, M.1
  • 8
    • 79952752224 scopus 로고    scopus 로고
    • Security Patterns and Security Standards
    • Schumacher, M.: Security Patterns and Security Standards. In: EuroPLoP, pp. 289-300 (2002)
    • (2002) Europlop , pp. 289-300
    • Schumacher, M.1
  • 10
    • 33646184981 scopus 로고    scopus 로고
    • Security patterns meet agent oriented software engineering: A complementary solution for developing secure information systems
    • Delcambre, L., Kop, C., Mayr, H.C., Mylopoulos, J., Pastor, O. (eds.), LNCS, Springer, Heidelberg
    • Mouratidis, H., Weiss, M., Giorgini, P.: Security patterns meet agent oriented software engineering: a complementary solution for developing secure information systems. In: Delcambre, L., Kop, C., Mayr, H.C., Mylopoulos, J., Pastor, O. (eds.) ER 2005. LNCS, vol. 3716, pp. 225-240. Springer, Heidelberg (2005). doi:10.1007/ 11568322_15
    • (2005) ER 2005 , vol.3716 , pp. 225-240
    • Mouratidis, H.1    Weiss, M.2    Giorgini, P.3
  • 15
    • 84948946447 scopus 로고    scopus 로고
    • How to make personalized web browsing simple, secure, and anonymous
    • Hirschfeld, R. (ed.), LNCS, Springer, Heidelberg
    • Gabber, E., Gibbons, P.B., Matias, Y., Mayer, A.: How to make personalized web browsing simple, secure, and anonymous. In: Hirschfeld, R. (ed.) FC 1997. LNCS, vol. 1318, pp. 17-31. Springer, Heidelberg (1997). doi:10.1007/3-540-63594-7_64
    • (1997) FC 1997 , vol.1318 , pp. 17-31
    • Gabber, E.1    Gibbons, P.B.2    Matias, Y.3    Mayer, A.4
  • 18
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Springer
    • Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptology 1(1), 65-75 (1988). Springer
    • (1988) J. Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 19
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • ACM
    • Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84-90 (1981). ACM
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1
  • 21
    • 35248893039 scopus 로고    scopus 로고
    • GAP-practical anonymous networking
    • Dingledine, R. (ed.), LNCS, Springer, Heidelberg
    • Bennett, K., Grothoff, C.: GAP-practical anonymous networking. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 141-160. Springer, Heidelberg (2003). doi:10.1007/978-3-540-40956-4_10
    • (2003) PET 2003 , vol.2760 , pp. 141-160
    • Bennett, K.1    Grothoff, C.2
  • 25
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.), LNCS, Springer, Heidelberg
    • Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201-212. Springer, Heidelberg (2004). doi:10.1007/978-3-540-39881-3_18
    • (2004) Security in Pervasive Computing , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 26
    • 84958804013 scopus 로고    scopus 로고
    • Personalization on the Net using Web mining: Introduction
    • ACM
    • Mulvenna, M.D., Anand, S.S., Büchner, A.G.: Personalization on the Net using Web mining: introduction. Commun. ACM 43(8), 122-125 (2000). ACM
    • (2000) Commun. ACM , vol.43 , Issue.8 , pp. 122-125
    • Mulvenna, M.D.1    Anand, S.S.2    Büchner, A.G.3
  • 32
    • 84976606583 scopus 로고    scopus 로고
    • Apparatus: Reasoning about security requirements in the internet of things
    • Krogstie, J., Mouratidis, H., Su, J. (eds.), LNBIP, Springer, Cham
    • Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E., Kalloniatis, C.: Apparatus: reasoning about security requirements in the internet of things. In: Krogstie, J., Mouratidis, H., Su, J. (eds.) CAiSE 2016. LNBIP, vol. 249, pp. 219-230. Springer, Cham (2016). doi:10.1007/978-3-319-39564-7_21
    • (2016) Caise 2016 , vol.249 , pp. 219-230
    • Mavropoulos, O.1    Mouratidis, H.2    Fish, A.3    Panaousis, E.4    Kalloniatis, C.5
  • 33
    • 85019721542 scopus 로고    scopus 로고
    • Methodologies and Tools for Building Intelligent Collaboration and Transaction Environments in Public Administration Networks
    • University of the Aegean
    • ICTE-PAN: Methodologies and Tools for Building Intelligent Collaboration and Transaction Environments in Public Administration Networks. In: Project Deliverable D 3.1b. University of the Aegean (2005)
    • (2005) Project Deliverable D 3.1B


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.