-
1
-
-
84897450124
-
Anonymity, privacy, and security online
-
L. Rainie, S. Kiesler, R. Kang, M. Madden, M. Duggan, S. Brown, and L. Dabbish, "Anonymity, privacy, and security online," Pew Research Center, vol. 5, 2013.
-
(2013)
Pew Research Center
, vol.5
-
-
Rainie, L.1
Kiesler, S.2
Kang, R.3
Madden, M.4
Duggan, M.5
Brown, S.6
Dabbish, L.7
-
3
-
-
84972531331
-
Enhancing access to microdata while protecting confidentiality: Prospects for the future
-
G. T. Duncan, R. W. Pearson et al., "Enhancing access to microdata while protecting confidentiality: Prospects for the future," Statistical Science, vol. 6, no. 3, pp. 219-232, 1991.
-
(1991)
Statistical Science
, vol.6
, Issue.3
, pp. 219-232
-
-
Duncan, G.T.1
Pearson, R.W.2
-
4
-
-
85024478410
-
-
PwC Moving forward with cybersecurity and privacy-how organizations are adopting innovative safeguards to manage threats and achieve competitive advantages in a digital era Key findings from The Global State of Information Security Survey 2017, Tech. Rep.
-
PwC, "Moving forward with cybersecurity and privacy-how organizations are adopting innovative safeguards to manage threats and achieve competitive advantages in a digital era," Key findings from The Global State of Information Security Survey 2017, Tech. Rep., 2017.
-
(2017)
-
-
-
5
-
-
84871748906
-
Privacy by design [leading edge]
-
A. Cavoukian, "Privacy by design [leading edge]," IEEE Technology and Society Magazine, vol. 31, no. 4, pp. 18-19, 2012.
-
(2012)
IEEE Technology and Society Magazine
, vol.31
, Issue.4
, pp. 18-19
-
-
Cavoukian, A.1
-
6
-
-
80052782295
-
Engineering privacy by design
-
S. Gürses, C. Troncoso, and C. Diaz, "Engineering privacy by design," Computers, Privacy & Data Protection, vol. 14, no. 3, 2011.
-
(2011)
Computers, Privacy & Data Protection
, vol.14
, Issue.3
-
-
Gürses, S.1
Troncoso, C.2
Diaz, C.3
-
7
-
-
85019687869
-
Privacy enhancing technologies: The path to anonymity
-
74087
-
R. Hes and J. Borking, "Privacy enhancing technologies: The path to anonymity," ISBN, vol. 90, no. 74087, p. 12, 1998.
-
(1998)
ISBN
, vol.90
, pp. 12
-
-
Hes, R.1
Borking, J.2
-
8
-
-
84864680369
-
Pris methodology: Incorporating privacy requirements into the system design process
-
J. Mylopoulos, G. Spafford (Eds.)
-
C. Kalloniatis, E. Kavakli, and S. Gritzalis, "Pris methodology: Incorporating privacy requirements into the system design process," in Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering Conference-Symposium on Requirements Engineering for Information Security, J. Mylopoulos, G. Spafford (Eds.), 2005.
-
(2005)
Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering Conference-Symposium On Requirements Engineering for Information Security
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
10
-
-
42449139876
-
A survey on security patterns
-
N. Yoshioka, H. Washizaki, and K. Maruyama, "A survey on security patterns," Progress in informatics, vol. 5, no. 5, pp. 35-47, 2008.
-
(2008)
Progress in Informatics
, vol.5
, Issue.5
, pp. 35-47
-
-
Yoshioka, N.1
Washizaki, H.2
Maruyama, K.3
-
11
-
-
34548145633
-
Using privacy process patterns for incorporating privacy requirements into the system design process
-
IEEE
-
C. Kalloniatis, E. Kavakli, and S. Gritzalis, "Using privacy process patterns for incorporating privacy requirements into the system design process," in Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on. IEEE, 2007, pp. 1009-1017.
-
(2007)
Availability, Reliability and Security 2007. ARES 2007. the Second International Conference On
, pp. 1009-1017
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
13
-
-
18744366207
-
A pattern approach to interaction design
-
J. O. Borchers, "A pattern approach to interaction design," Ai & Society, vol. 15, no. 4, pp. 359-376, 2001.
-
(2001)
Ai & Society
, vol.15
, Issue.4
, pp. 359-376
-
-
Borchers, J.O.1
-
14
-
-
33750441515
-
Security patterns and requirements for internet-based applications
-
D. G. Rosado, C. Gutiérrez, E. Fernández-Medina, and M. Piattini, "Security patterns and requirements for internet-based applications," Internet research, vol. 16, no. 5, pp. 519-536, 2006.
-
(2006)
Internet Research
, vol.16
, Issue.5
, pp. 519-536
-
-
Rosado, D.G.1
Gutiérrez, C.2
Fernández-Medina, E.3
Piattini, M.4
-
16
-
-
58849148475
-
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
-
L. Compagna, P. El Khoury, A. Krausová, F. Massacci, and N. Zannone, "How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns," Artificial Intelligence and Law, vol. 17, no. 1, pp. 1-30, 2009.
-
(2009)
Artificial Intelligence and Law
, vol.17
, Issue.1
, pp. 1-30
-
-
Compagna, L.1
El Khoury, P.2
Krausová, A.3
Massacci, F.4
Zannone, N.5
-
17
-
-
34548045316
-
How to capture, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach
-
ACM
-
L. Compagna, P. E. Khoury, F. Massacci, R. Thomas, and N. Zannone, "How to capture, model, and verify the knowledge of legal, security, and privacy experts: A pattern-based approach," in Proceedings of the 11th international conference on Artificial intelligence and law. ACM, 2007, pp. 149-153.
-
(2007)
Proceedings of the 11th International Conference On Artificial Intelligence and Law
, pp. 149-153
-
-
Compagna, L.1
Khoury, P.E.2
Massacci, F.3
Thomas, R.4
Zannone, N.5
-
18
-
-
33646184981
-
Security patterns meet agent oriented software engineering: A complementary solution for developing secure information systems
-
Springer
-
H. Mouratidis, M. Weiss, and P. Giorgini, "Security patterns meet agent oriented software engineering: A complementary solution for developing secure information systems," in International Conference on Conceptual Modeling. Springer, 2005, pp. 225-240.
-
(2005)
International Conference On Conceptual Modeling.
, pp. 225-240
-
-
Mouratidis, H.1
Weiss, M.2
Giorgini, P.3
-
20
-
-
84987615841
-
Incorporating privacy patterns into semi-automatic business process derivation
-
IEEE
-
N. Argyropoulos, C. Kalloniatis, H. Mouratidis, and A. Fish, "Incorporating privacy patterns into semi-automatic business process derivation," in Research Challenges in Information Science (RCIS), 2016 IEEE Tenth International Conference on. IEEE, 2016, pp. 1-12.
-
(2016)
Research Challenges in Information Science (RCIS),2016 IEEE Tenth International Conference On
, pp. 1-12
-
-
Argyropoulos, N.1
Kalloniatis, C.2
Mouratidis, H.3
Fish, A.4
-
21
-
-
70450222528
-
Seven process modeling guidelines (7pmg)
-
J. Mendling, H. A. Reijers, and W. M. van der Aalst, "Seven process modeling guidelines (7pmg)," Information and Software Technology, vol. 52, no. 2, pp. 127-136, 2010.
-
(2010)
Information and Software Technology
, vol.52
, Issue.2
, pp. 127-136
-
-
Mendling, J.1
Reijers, H.A.2
Aalst Der Van, W.M.3
-
24
-
-
78649989557
-
-
A. Pfitzmann and M. Hansen, "A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management," 2010.
-
(2010)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
-
-
Pfitzmann, A.1
Hansen, M.2
-
25
-
-
85024477076
-
-
ISO/IEC 29100:2011(e) information technology-security techniques-privacy framework Tech. Rep.
-
ISO/IEC, "29100:2011(e) information technology-security techniques-privacy framework," Tech. Rep., 2011.
-
(2011)
-
-
-
26
-
-
85024491457
-
-
ISO/CEI 27000:2014(e) information technology-security techniques-information security management systems-overview and vocabulary Tech. Rep.
-
ISO/CEI, "27000:2014(e) information technology-security techniques-information security management systems-overview and vocabulary," Tech. Rep., 2014.
-
(2014)
-
-
-
29
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Springer
-
S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," in Security in pervasive computing. Springer, 2004, pp. 201-212.
-
(2004)
Security in Pervasive Computing.
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
30
-
-
0003317098
-
How to make personalized web browsing simple, secure, and anonymous
-
Springer
-
E. Gabber, P. B. Gibbons, Y. Matias, and A. Mayer, "How to make personalized web browsing simple, secure, and anonymous," in International Conference on Financial Cryptography. Springer, 1997, pp. 17-31.
-
(1997)
International Conference On Financial Cryptography.
, pp. 17-31
-
-
Gabber, E.1
Gibbons, P.B.2
Matias, Y.3
Mayer, A.4
-
31
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
M. K. Reiter and A. D. Rubin, "Crowds: Anonymity for web transactions," ACM Transactions on Information and System Security (TISSEC), vol. 1, no. 1, pp. 66-92, 1998.
-
(1998)
ACM Transactions On Information and System Security (TISSEC)
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
32
-
-
0005063385
-
Onion routing
-
D. Goldschlag, M. Reed, and P. Syverson, "Onion routing," Communications of the ACM, vol. 42, no. 2, pp. 39-41, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
33
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum, "The dining cryptographers problem: Unconditional sender and recipient untraceability," Journal of cryptology, vol. 1, no. 1, pp. 65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
34
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-90, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
37
-
-
85084161366
-
-
DTIC Document, Tech. Rep.
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The secondgeneration onion router," DTIC Document, Tech. Rep., 2004.
-
(2004)
Tor: The Secondgeneration Onion Router
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
38
-
-
85019706113
-
-
Oct. 19
-
T. Akers, B. Ware, W. Zheng, M. Kostet, and B. Clark, "Service aggregation gateway," Oct. 19 2006, uS Patent App. 11/551,066.
-
(2006)
Service Aggregation Gateway
-
-
Akers, T.1
Ware, B.2
Zheng, W.3
Kostet, M.4
Clark, B.5
-
39
-
-
84958804013
-
Personalization on the net using web mining: Introduction
-
M. D. Mulvenna, S. S. Anand, and A. G. Büchner, "Personalization on the net using web mining: Introduction," Communications of the ACM, vol. 43, no. 8, pp. 122-125, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.8
, pp. 122-125
-
-
Mulvenna, M.D.1
Anand, S.S.2
Büchner, A.G.3
-
44
-
-
50949085110
-
Addressing privacy requirements in system design: The pris method
-
C. Kalloniatis, E. Kavakli, and S. Gritzalis, "Addressing privacy requirements in system design: The pris method," Requirements Engineering, vol. 13, no. 3, pp. 241-255, 2008.
-
(2008)
Requirements Engineering
, vol.13
, Issue.3
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
45
-
-
34548145633
-
Using privacy process patterns for incorporating privacy requirements into the system design process
-
IEEE
-
-, "Using privacy process patterns for incorporating privacy requirements into the system design process," in Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on. IEEE, 2007, pp. 1009-1017.
-
(2007)
Availability, Reliability and Security 2007. ARES 2007. the Second International Conference On
, pp. 1009-1017
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
46
-
-
85024500345
-
-
ICTE-PAN Methodologies and tools for building intelligent collaboration and transaction environments in public administration networks Project Deliverable D 3.1b. University of the Aegean
-
ICTE-PAN, "Methodologies and tools for building intelligent collaboration and transaction environments in public administration networks," in Project Deliverable D 3.1b. University of the Aegean.
-
-
-
-
47
-
-
9244222724
-
Enhancing web privacy and anonymity in the digital era
-
S. Gritzalis, "Enhancing web privacy and anonymity in the digital era," Information Management & Computer Security, vol. 12, no. 3, pp. 255-287, 2004.
-
(2004)
Information Management & Computer Security
, vol.12
, Issue.3
, pp. 255-287
-
-
Gritzalis, S.1
-
48
-
-
84866234352
-
Privacy enhancing technologies, white paper for decision makers
-
the Netherlands
-
R. Koorn, H. van Gils, J. ter Hart, P. Overbeek, R. Tellegen, and J. Borking, "Privacy enhancing technologies, white paper for decision makers," Ministry of the Interior and Kingdom Relations, the Netherlands, 2004.
-
(2004)
Ministry of the Interior and Kingdom Relations
-
-
Koorn, R.1
Van Gils, H.2
Ter Hart, J.3
Overbeek, P.4
Tellegen, R.5
Borking, J.6
-
49
-
-
84866253432
-
Aligning security and privacy to support the development of secure information systems
-
H. Mouratidis, C. Kalloniatis, S. Islam, M.-P. Huget, and S. Gritzalis, "Aligning security and privacy to support the development of secure information systems." J. UCS, vol. 18, no. 12, pp. 1608-1627, 2012.
-
(2012)
J. UCS
, vol.18
, Issue.12
, pp. 1608-1627
-
-
Mouratidis, H.1
Kalloniatis, C.2
Islam, S.3
Huget, M.-P.4
Gritzalis, S.5
-
50
-
-
67449101466
-
Privacy patterns for online interactions
-
ACM
-
S. Romanosky, A. Acquisti, J. Hong, L. F. Cranor, and B. Friedman, "Privacy patterns for online interactions," in Proceedings of the 2006 conference on Pattern languages of programs. ACM, 2006, p. 12.
-
(2006)
Proceedings of the 2006 Conference On Pattern Languages of Programs
, pp. 12
-
-
Romanosky, S.1
Acquisti, A.2
Hong, J.3
Cranor, L.F.4
Friedman, B.5
-
51
-
-
10044278069
-
Development and evaluation of emerging design patterns for ubiquitous computing
-
ACM
-
E. S. Chung, J. I. Hong, J. Lin, M. K. Prabaker, J. A. Landay, and A. L. Liu, "Development and evaluation of emerging design patterns for ubiquitous computing," in Proceedings of the 5th conference on Designing interactive systems: Processes, practices, methods, and techniques. ACM, 2004, pp. 233-242.
-
(2004)
Proceedings of the 5th Conference On Designing Interactive Systems: Processes, Practices, Methods, and Techniques
, pp. 233-242
-
-
Chung, E.S.1
Hong, J.I.2
Lin, J.3
Prabaker, M.K.4
Landay, J.A.5
Liu, A.L.6
-
52
-
-
84878677619
-
A pattern language for developing privacy enhancing technologies
-
M. Hafiz, "A pattern language for developing privacy enhancing technologies," Software: Practice and Experience, vol. 43, no. 7, pp. 769-787, 2013.
-
(2013)
Software: Practice and Experience
, vol.43
, Issue.7
, pp. 769-787
-
-
Hafiz, M.1
-
54
-
-
79952752224
-
Security patterns and security standards
-
M. Schumacher, "Security patterns and security standards." in Euro-PLoP, 2002, pp. 289-300.
-
(2002)
Euro-PLoP
, pp. 289-300
-
-
Schumacher, M.1
-
55
-
-
85018739100
-
Designing secure business processes with secbpmn
-
M. Salnitri, F. Dalpiaz, and P. Giorgini, "Designing secure business processes with secbpmn," Software & Systems Modeling, pp. 1-21, 2016.
-
(2016)
Software & Systems Modeling
, pp. 1-21
-
-
Salnitri, M.1
Dalpiaz, F.2
Giorgini, P.3
|