-
1
-
-
85025120529
-
The importance of trust
-
Tokyo, Japan, September 2010
-
Personal data in the cloud: The importance of trust. Technical report, Fujitso Global Business Group, Tokyo 105-7123, Japan, September 2010
-
Technical report, Fujitso Global Business Group
, pp. 105-7123
-
-
-
2
-
-
85025131256
-
-
CARiSMA (2016). https://rgse.uni-koblenz.de/carisma/
-
(2016)
-
-
-
3
-
-
85013462015
-
Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data
-
April 2016
-
The European Parliament and the Council of the European Union, Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data. Official J. Eur. Union, vol. 199, pp 1-88 (April 2016)
-
Official J. Eur. Union
, vol.199
, pp. 1-88
-
-
-
4
-
-
85025122916
-
-
VisiOn Project (2016). http://www.visioneuproject.eu/
-
(2016)
-
-
-
6
-
-
84958542205
-
-
Preneel, B., Ikonomou, D. (eds.) APF 2014. LNCS, Springer, Cham
-
Antignac, T., Métayer, D.: Privacy by design: from technologies to architectures. In: Preneel, B., Ikonomou, D. (eds.) APF 2014. LNCS, vol. 8450, pp. 1-17. Springer, Cham (2014). doi:10.1007/978-3-319-06749-0 1
-
(2014)
Privacy by design: From technologies to architectures
, vol.8450
, pp. 1-17
-
-
Antignac, T.1
Métayer, D.2
-
7
-
-
70350674935
-
-
Springer, Heidelberg
-
Barker, K., Askari, M., Banerjee, M., Ghazinour, K., Mackas, B., Majedi, M., Pun, S.,Williams, A.: A Data Privacy Taxonomy, pp. 42-54. Springer, Heidelberg (2009)
-
(2009)
A Data Privacy Taxonomy
, pp. 42-54
-
-
Barker, K.1
Askari, M.2
Banerjee, M.3
Ghazinour, K.4
Mackas, B.5
Majedi, M.6
Pun, S.7
Williams, A.8
-
8
-
-
84964282497
-
Towards a UML profile for privacy-aware applications
-
Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, October 2015
-
Basso, T., Montecchi, L., Moraes, R., Jino, M., Bondavalli, A.: Towards a UML profile for privacy-aware applications. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, pp. 371-378, October 2015
-
2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications
, pp. 371-378
-
-
Basso, T.1
Montecchi, L.2
Moraes, R.3
Jino, M.4
Bondavalli, A.5
-
9
-
-
78650448009
-
Key issues of a formally based process model for security engineering
-
Paris
-
Breu, R., Burger, K., Hafner, M., Jürjens, J., Popp, G., Wimmel, G., Lotz, V.: Key issues of a formally based process model for security engineering. In: Sixteenth International Conference “Software & Systems Engineering & Their Applications”, Paris (2003)
-
(2003)
Sixteenth International Conference “Software & Systems Engineering & Their Applications”
-
-
Breu, R.1
Burger, K.2
Hafner, M.3
Jürjens, J.4
Popp, G.5
Wimmel, G.6
Lotz, V.7
-
10
-
-
77951546325
-
-
Proceedings of the 2009 conference of the Centre for Advanced Studies on Collaborative Research, 2-5 November 2009, Toronto, Ontario, Canada
-
Cavoukian, A., Chibba, M.: Advancing privacy and security in computing, networking and systems innovations through privacy by design. In: Proceedings of the 2009 conference of the Centre for Advanced Studies on Collaborative Research, 2-5 November 2009, Toronto, Ontario, Canada, pp. 358-360 (2009)
-
(2009)
Advancing privacy and security in computing, networking and systems innovations through privacy by design
, pp. 358-360
-
-
Cavoukian, A.1
Chibba, M.2
-
12
-
-
84939641193
-
Guiding a generalpurpose C verifier to prove cryptographic protocols
-
Dupressoir, F., Gordon, A.D., Jürjens, J., Naumann, D.A.: Guiding a generalpurpose C verifier to prove cryptographic protocols. J. Comput. Secur. 22(5), 823-866 (2014). http://dx.doi.org/10.3233/JCS-140508
-
(2014)
J. Comput. Secur
, vol.22
, Issue.5
, pp. 823-866
-
-
Dupressoir, F.1
Gordon, A.D.2
Jürjens, J.3
Naumann, D.A.4
-
13
-
-
70849129259
-
A lattice-based privacy aware access control model
-
CSE, August 2009
-
Ghazinour, K., Majedi, M., Barker, K.: A lattice-based privacy aware access control model. In: International Conference on Computational Science and Engineering, CSE 2009, vol. 3, pp. 154-159, August 2009
-
(2009)
International Conference on Computational Science and Engineering
, vol.3
, pp. 154-159
-
-
Ghazinour, K.1
Majedi, M.2
Barker, K.3
-
14
-
-
84886066391
-
-
Computers, Privacy & Data Protection
-
Gürses, S., Gonzalez Troncoso, C., Diaz, C.: Engineering privacy by design. In:Computers, Privacy & Data Protection (2011)
-
(2011)
Engineering privacy by design
-
-
Gürses, S.1
Gonzalez Troncoso, C.2
Diaz, C.3
-
15
-
-
84878677619
-
A pattern language for developing privacy enhancing technologies
-
Hafiz,M.: A pattern language for developing privacy enhancing technologies. Softw. Pract. Exper. 43(7), 769-787 (2013)
-
(2013)
Softw. Pract. Exper
, vol.43
, Issue.7
, pp. 769-787
-
-
Hafiz, M.1
-
17
-
-
84881151887
-
-
International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS)
-
Jin, X., Sandhu, R.S., Krishnan, R.: RABAC: role-centric attribute-based access control. In: International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS), pp. 84-96 (2012)
-
(2012)
RABAC: Role-centric attribute-based access control
, pp. 84-96
-
-
Jin, X.1
Sandhu, R.S.2
Krishnan, R.3
-
18
-
-
84885216103
-
-
Palamidessi, C. (ed.) CONCUR 2000. LNCS, Springer, Heidelberg
-
Jürjens, J.: Secure information flow for concurrent processes. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol. 1877, pp. 395-409. Springer, Heidelberg (2000). doi:10.1007/3-540-44618-4 29
-
(2000)
Secure information flow for concurrent processes
, vol.1877
, pp. 395-409
-
-
Jürjens, J.1
-
19
-
-
1942475562
-
Modelling audit security for smart-card payment schemes with UMLsec
-
Dupuy, M., Paradinas, P. (eds.), Proceedings of the 16th International Conference on Information Security (SEC 2001)
-
Jürjens, J.: Modelling audit security for smart-card payment schemes with UMLsec. In: Dupuy, M., Paradinas, P. (eds.) Trusted Information: The New Decade Challenge, pp. 93-108 (2001). Proceedings of the 16th International Conference on Information Security (SEC 2001). http://www.jurjens.de/jan
-
(2001)
Trusted Information: The New Decade Challenge
, pp. 93-108
-
-
Jürjens, J.1
-
20
-
-
33750060125
-
-
Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2004-2005. LNCS, Springer, Heidelberg
-
Jürjens, J.: Model-based security engineering with UML. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2004-2005. LNCS, vol. 3655, pp. 42-77. Springer, Heidelberg (2005). doi:10.1007/11554578 2
-
(2005)
Model-based security engineering with UML
, vol.3655
, pp. 42-77
-
-
Jürjens, J.1
-
22
-
-
50949085110
-
Addressing privacy requirements in system design: The PriS method
-
Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requirements Eng. 13(3), 241-255 (2008)
-
(2008)
Requirements Eng
, vol.13
, Issue.3
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
26
-
-
79958060292
-
A model-based privacy compliance checker
-
Pearson, S., Allison, D.: A model-based privacy compliance checker. IJEBR 5(2), 63-83 (2009)
-
(2009)
IJEBR
, vol.5
, Issue.2
, pp. 63-83
-
-
Pearson, S.1
Allison, D.2
-
27
-
-
84857362096
-
Enhancing security requirements engineering by organisational learning
-
Schneider, K., Knauss, E., Houmb, S., Islam, S., Jürjens, J.: Enhancing security requirements engineering by organisational learning. Requirements Eng. J. (REJ) 17(1), 35-56 (2012)
-
(2012)
Requirements Eng. J. (REJ)
, vol.17
, Issue.1
, pp. 35-56
-
-
Schneider, K.1
Knauss, E.2
Houmb, S.3
Islam, S.4
Jürjens, J.5
-
28
-
-
84863760903
-
The challenges of privacy by design
-
Spiekermann, S.: The challenges of privacy by design. Commun. ACM 55(7), 38-40 (2012)
-
(2012)
Commun. ACM
, vol.55
, Issue.7
, pp. 38-40
-
-
Spiekermann, S.1
|