메뉴 건너뛰기




Volumn 10376 LNCS, Issue , 2017, Pages 215-231

Model-based privacy analysis in industrial ecosystems

Author keywords

[No Author keywords available]

Indexed keywords

ECOSYSTEMS; SECURITY OF DATA;

EID: 85025133541     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-61482-3_13     Document Type: Conference Paper
Times cited : (20)

References (30)
  • 1
    • 85025120529 scopus 로고    scopus 로고
    • The importance of trust
    • Tokyo, Japan, September 2010
    • Personal data in the cloud: The importance of trust. Technical report, Fujitso Global Business Group, Tokyo 105-7123, Japan, September 2010
    • Technical report, Fujitso Global Business Group , pp. 105-7123
  • 2
    • 85025131256 scopus 로고    scopus 로고
    • CARiSMA (2016). https://rgse.uni-koblenz.de/carisma/
    • (2016)
  • 3
    • 85013462015 scopus 로고    scopus 로고
    • Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data
    • April 2016
    • The European Parliament and the Council of the European Union, Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data. Official J. Eur. Union, vol. 199, pp 1-88 (April 2016)
    • Official J. Eur. Union , vol.199 , pp. 1-88
  • 4
    • 85025122916 scopus 로고    scopus 로고
    • VisiOn Project (2016). http://www.visioneuproject.eu/
    • (2016)
  • 6
    • 84958542205 scopus 로고    scopus 로고
    • Preneel, B., Ikonomou, D. (eds.) APF 2014. LNCS, Springer, Cham
    • Antignac, T., Métayer, D.: Privacy by design: from technologies to architectures. In: Preneel, B., Ikonomou, D. (eds.) APF 2014. LNCS, vol. 8450, pp. 1-17. Springer, Cham (2014). doi:10.1007/978-3-319-06749-0 1
    • (2014) Privacy by design: From technologies to architectures , vol.8450 , pp. 1-17
    • Antignac, T.1    Métayer, D.2
  • 12
    • 84939641193 scopus 로고    scopus 로고
    • Guiding a generalpurpose C verifier to prove cryptographic protocols
    • Dupressoir, F., Gordon, A.D., Jürjens, J., Naumann, D.A.: Guiding a generalpurpose C verifier to prove cryptographic protocols. J. Comput. Secur. 22(5), 823-866 (2014). http://dx.doi.org/10.3233/JCS-140508
    • (2014) J. Comput. Secur , vol.22 , Issue.5 , pp. 823-866
    • Dupressoir, F.1    Gordon, A.D.2    Jürjens, J.3    Naumann, D.A.4
  • 15
    • 84878677619 scopus 로고    scopus 로고
    • A pattern language for developing privacy enhancing technologies
    • Hafiz,M.: A pattern language for developing privacy enhancing technologies. Softw. Pract. Exper. 43(7), 769-787 (2013)
    • (2013) Softw. Pract. Exper , vol.43 , Issue.7 , pp. 769-787
    • Hafiz, M.1
  • 17
    • 84881151887 scopus 로고    scopus 로고
    • International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS)
    • Jin, X., Sandhu, R.S., Krishnan, R.: RABAC: role-centric attribute-based access control. In: International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS), pp. 84-96 (2012)
    • (2012) RABAC: Role-centric attribute-based access control , pp. 84-96
    • Jin, X.1    Sandhu, R.S.2    Krishnan, R.3
  • 18
    • 84885216103 scopus 로고    scopus 로고
    • Palamidessi, C. (ed.) CONCUR 2000. LNCS, Springer, Heidelberg
    • Jürjens, J.: Secure information flow for concurrent processes. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol. 1877, pp. 395-409. Springer, Heidelberg (2000). doi:10.1007/3-540-44618-4 29
    • (2000) Secure information flow for concurrent processes , vol.1877 , pp. 395-409
    • Jürjens, J.1
  • 19
    • 1942475562 scopus 로고    scopus 로고
    • Modelling audit security for smart-card payment schemes with UMLsec
    • Dupuy, M., Paradinas, P. (eds.), Proceedings of the 16th International Conference on Information Security (SEC 2001)
    • Jürjens, J.: Modelling audit security for smart-card payment schemes with UMLsec. In: Dupuy, M., Paradinas, P. (eds.) Trusted Information: The New Decade Challenge, pp. 93-108 (2001). Proceedings of the 16th International Conference on Information Security (SEC 2001). http://www.jurjens.de/jan
    • (2001) Trusted Information: The New Decade Challenge , pp. 93-108
    • Jürjens, J.1
  • 20
    • 33750060125 scopus 로고    scopus 로고
    • Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2004-2005. LNCS, Springer, Heidelberg
    • Jürjens, J.: Model-based security engineering with UML. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2004-2005. LNCS, vol. 3655, pp. 42-77. Springer, Heidelberg (2005). doi:10.1007/11554578 2
    • (2005) Model-based security engineering with UML , vol.3655 , pp. 42-77
    • Jürjens, J.1
  • 22
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: The PriS method
    • Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requirements Eng. 13(3), 241-255 (2008)
    • (2008) Requirements Eng , vol.13 , Issue.3 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 26
    • 79958060292 scopus 로고    scopus 로고
    • A model-based privacy compliance checker
    • Pearson, S., Allison, D.: A model-based privacy compliance checker. IJEBR 5(2), 63-83 (2009)
    • (2009) IJEBR , vol.5 , Issue.2 , pp. 63-83
    • Pearson, S.1    Allison, D.2
  • 28
    • 84863760903 scopus 로고    scopus 로고
    • The challenges of privacy by design
    • Spiekermann, S.: The challenges of privacy by design. Commun. ACM 55(7), 38-40 (2012)
    • (2012) Commun. ACM , vol.55 , Issue.7 , pp. 38-40
    • Spiekermann, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.