메뉴 건너뛰기




Volumn , Issue , 2017, Pages 187-198

Supporting the design of privacy-aware business processes via privacy process patterns

Author keywords

Business Processes; Information Security Modelling; Privacy Process Patterns; Requirements Engineering

Indexed keywords

COMPUTER SOFTWARE; REQUIREMENTS ENGINEERING; SECURITY OF DATA;

EID: 85024488021     PISSN: 21511349     EISSN: 21511357     Source Type: Conference Proceeding    
DOI: 10.1109/RCIS.2017.7956536     Document Type: Conference Paper
Times cited : (29)

References (55)
  • 3
    • 84972531331 scopus 로고
    • Enhancing access to microdata while protecting confidentiality: Prospects for the future
    • G. T. Duncan, R. W. Pearson et al., "Enhancing access to microdata while protecting confidentiality: Prospects for the future," Statistical Science, vol. 6, no. 3, pp. 219-232, 1991.
    • (1991) Statistical Science , vol.6 , Issue.3 , pp. 219-232
    • Duncan, G.T.1    Pearson, R.W.2
  • 4
    • 85024478410 scopus 로고    scopus 로고
    • PwC Moving forward with cybersecurity and privacy-how organizations are adopting innovative safeguards to manage threats and achieve competitive advantages in a digital era Key findings from The Global State of Information Security Survey 2017, Tech. Rep.
    • PwC, "Moving forward with cybersecurity and privacy-how organizations are adopting innovative safeguards to manage threats and achieve competitive advantages in a digital era," Key findings from The Global State of Information Security Survey 2017, Tech. Rep., 2017.
    • (2017)
  • 5
    • 84871748906 scopus 로고    scopus 로고
    • Privacy by design [leading edge]
    • A. Cavoukian, "Privacy by design [leading edge]," IEEE Technology and Society Magazine, vol. 31, no. 4, pp. 18-19, 2012.
    • (2012) IEEE Technology and Society Magazine , vol.31 , Issue.4 , pp. 18-19
    • Cavoukian, A.1
  • 7
    • 85019687869 scopus 로고    scopus 로고
    • Privacy enhancing technologies: The path to anonymity
    • 74087
    • R. Hes and J. Borking, "Privacy enhancing technologies: The path to anonymity," ISBN, vol. 90, no. 74087, p. 12, 1998.
    • (1998) ISBN , vol.90 , pp. 12
    • Hes, R.1    Borking, J.2
  • 13
    • 18744366207 scopus 로고    scopus 로고
    • A pattern approach to interaction design
    • J. O. Borchers, "A pattern approach to interaction design," Ai & Society, vol. 15, no. 4, pp. 359-376, 2001.
    • (2001) Ai & Society , vol.15 , Issue.4 , pp. 359-376
    • Borchers, J.O.1
  • 14
    • 33750441515 scopus 로고    scopus 로고
    • Security patterns and requirements for internet-based applications
    • D. G. Rosado, C. Gutiérrez, E. Fernández-Medina, and M. Piattini, "Security patterns and requirements for internet-based applications," Internet research, vol. 16, no. 5, pp. 519-536, 2006.
    • (2006) Internet Research , vol.16 , Issue.5 , pp. 519-536
    • Rosado, D.G.1    Gutiérrez, C.2    Fernández-Medina, E.3    Piattini, M.4
  • 16
    • 58849148475 scopus 로고    scopus 로고
    • How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
    • L. Compagna, P. El Khoury, A. Krausová, F. Massacci, and N. Zannone, "How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns," Artificial Intelligence and Law, vol. 17, no. 1, pp. 1-30, 2009.
    • (2009) Artificial Intelligence and Law , vol.17 , Issue.1 , pp. 1-30
    • Compagna, L.1    El Khoury, P.2    Krausová, A.3    Massacci, F.4    Zannone, N.5
  • 18
    • 33646184981 scopus 로고    scopus 로고
    • Security patterns meet agent oriented software engineering: A complementary solution for developing secure information systems
    • Springer
    • H. Mouratidis, M. Weiss, and P. Giorgini, "Security patterns meet agent oriented software engineering: A complementary solution for developing secure information systems," in International Conference on Conceptual Modeling. Springer, 2005, pp. 225-240.
    • (2005) International Conference On Conceptual Modeling. , pp. 225-240
    • Mouratidis, H.1    Weiss, M.2    Giorgini, P.3
  • 25
    • 85024477076 scopus 로고    scopus 로고
    • ISO/IEC 29100:2011(e) information technology-security techniques-privacy framework Tech. Rep.
    • ISO/IEC, "29100:2011(e) information technology-security techniques-privacy framework," Tech. Rep., 2011.
    • (2011)
  • 26
    • 85024491457 scopus 로고    scopus 로고
    • ISO/CEI 27000:2014(e) information technology-security techniques-information security management systems-overview and vocabulary Tech. Rep.
    • ISO/CEI, "27000:2014(e) information technology-security techniques-information security management systems-overview and vocabulary," Tech. Rep., 2014.
    • (2014)
  • 29
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Springer
    • S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," in Security in pervasive computing. Springer, 2004, pp. 201-212.
    • (2004) Security in Pervasive Computing. , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 33
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum, "The dining cryptographers problem: Unconditional sender and recipient untraceability," Journal of cryptology, vol. 1, no. 1, pp. 65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 34
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-90, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1
  • 39
    • 84958804013 scopus 로고    scopus 로고
    • Personalization on the net using web mining: Introduction
    • M. D. Mulvenna, S. S. Anand, and A. G. Büchner, "Personalization on the net using web mining: Introduction," Communications of the ACM, vol. 43, no. 8, pp. 122-125, 2000.
    • (2000) Communications of the ACM , vol.43 , Issue.8 , pp. 122-125
    • Mulvenna, M.D.1    Anand, S.S.2    Büchner, A.G.3
  • 44
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: The pris method
    • C. Kalloniatis, E. Kavakli, and S. Gritzalis, "Addressing privacy requirements in system design: The pris method," Requirements Engineering, vol. 13, no. 3, pp. 241-255, 2008.
    • (2008) Requirements Engineering , vol.13 , Issue.3 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 46
    • 85024500345 scopus 로고    scopus 로고
    • ICTE-PAN Methodologies and tools for building intelligent collaboration and transaction environments in public administration networks Project Deliverable D 3.1b. University of the Aegean
    • ICTE-PAN, "Methodologies and tools for building intelligent collaboration and transaction environments in public administration networks," in Project Deliverable D 3.1b. University of the Aegean.
  • 47
    • 9244222724 scopus 로고    scopus 로고
    • Enhancing web privacy and anonymity in the digital era
    • S. Gritzalis, "Enhancing web privacy and anonymity in the digital era," Information Management & Computer Security, vol. 12, no. 3, pp. 255-287, 2004.
    • (2004) Information Management & Computer Security , vol.12 , Issue.3 , pp. 255-287
    • Gritzalis, S.1
  • 49
    • 84866253432 scopus 로고    scopus 로고
    • Aligning security and privacy to support the development of secure information systems
    • H. Mouratidis, C. Kalloniatis, S. Islam, M.-P. Huget, and S. Gritzalis, "Aligning security and privacy to support the development of secure information systems." J. UCS, vol. 18, no. 12, pp. 1608-1627, 2012.
    • (2012) J. UCS , vol.18 , Issue.12 , pp. 1608-1627
    • Mouratidis, H.1    Kalloniatis, C.2    Islam, S.3    Huget, M.-P.4    Gritzalis, S.5
  • 52
    • 84878677619 scopus 로고    scopus 로고
    • A pattern language for developing privacy enhancing technologies
    • M. Hafiz, "A pattern language for developing privacy enhancing technologies," Software: Practice and Experience, vol. 43, no. 7, pp. 769-787, 2013.
    • (2013) Software: Practice and Experience , vol.43 , Issue.7 , pp. 769-787
    • Hafiz, M.1
  • 54
    • 79952752224 scopus 로고    scopus 로고
    • Security patterns and security standards
    • M. Schumacher, "Security patterns and security standards." in Euro-PLoP, 2002, pp. 289-300.
    • (2002) Euro-PLoP , pp. 289-300
    • Schumacher, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.