-
1
-
-
85025157875
-
Model-based privacy analysis in industrial ecosystems
-
Springer. accepted
-
Ahmadian, A. S., Strüber, D., Riediger, V., and Jürjens, J. Model-based Privacy Analysis in Industrial Ecosystems. In ECMFA (2017), Springer. accepted.
-
(2017)
ECMFA
-
-
Ahmadian, A.S.1
Strüber, D.2
Riediger, V.3
Jürjens, J.4
-
2
-
-
70350674935
-
-
Springer
-
Barker, K., Askari, M., Banerjee, M., Ghazinour, K., Mackas, B., Majedi, M., Pun, S., and Williams, A. A Data Privacy Taxonomy. Springer, 2009, pp. 42-54.
-
(2009)
A Data Privacy Taxonomy
, pp. 42-54
-
-
Barker, K.1
Askari, M.2
Banerjee, M.3
Ghazinour, K.4
Mackas, B.5
Majedi, M.6
Pun, S.7
Williams, A.8
-
3
-
-
77951546325
-
Advancing privacy and security in computing, networking and systems innovations through privacy by design
-
Cavoukian, A., and Chibba, M. Advancing Privacy and Security in Computing, Networking and Systems Innovations through Privacy by Design. In CASCON (2009), pp. 358-360.
-
(2009)
CASCON
, pp. 358-360
-
-
Cavoukian, A.1
Chibba, M.2
-
4
-
-
84873617781
-
Towards a modeling and analysis framework for privacy-aware systems
-
IEEE Computer Society
-
Colombo, P., and Ferrari, E. Towards a Modeling and Analysis Framework for Privacy-Aware Systems. In SOCIALCOM-PASSAT (2012), IEEE Computer Society, pp. 81-90.
-
(2012)
SOCIALCOM-PASSAT
, pp. 81-90
-
-
Colombo, P.1
Ferrari, E.2
-
5
-
-
85030682492
-
Privacy and data protection by design - From policy to engineering
-
abs/1501.03726
-
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J., Métayer, D. L., Tirtea, R., and Schiffner, S. Privacy and data protection by design - from policy to engineering. CoRR abs/1501.03726 (2015).
-
(2015)
CoRR
-
-
Danezis, G.1
Domingo-Ferrer, J.2
Hansen, M.3
Hoepman, J.4
Métayer, D.L.5
Tirtea, R.6
Schiffner, S.7
-
6
-
-
33947368645
-
Modelbased security analysis in seven steps - A guided tour to the coras method
-
den Braber, F., Hogganvik, I., Lund, M. S., Stølen, K., and Vraalsen, F. Modelbased security analysis in seven steps - a guided tour to the coras method. BT Technology Journal 25, 1 (2007), 101-117.
-
(2007)
BT Technology Journal
, vol.25
, Issue.1
, pp. 101-117
-
-
Den Braber, F.1
Hogganvik, I.2
Lund, M.S.3
Stølen, K.4
Vraalsen, F.5
-
7
-
-
60849085437
-
An aspect-oriented methodology for designing secure applications
-
Georg, G., Ray, I., Anastasakis, K., Bordbar, B., Toahchoodee, M., and Houmb, S. H. An Aspect-oriented Methodology for Designing Secure Applications. INFSOF 51, 5 (2009), 846-864.
-
(2009)
INFSOF
, vol.51
, Issue.5
, pp. 846-864
-
-
Georg, G.1
Ray, I.2
Anastasakis, K.3
Bordbar, B.4
Toahchoodee, M.5
Houmb, S.H.6
-
8
-
-
0004256091
-
-
John Wiley & Sons, Inc., New York, NY, USA
-
Gollmann, D. Computer Security. John Wiley & Sons, Inc., New York, NY, USA, 1999.
-
(1999)
Computer Security
-
-
Gollmann, D.1
-
9
-
-
40449092394
-
Applying formal methods to a certifiably secure software system
-
Heitmeyer, C. L., Archer, M., Leonard, E. I., and McLean, J. Applying Formal Methods to a Certifiably Secure Software System. IEEE Trans. Software Eng. 34, 1 (2008), 82-98.
-
(2008)
IEEE Trans. Software Eng
, vol.34
, Issue.1
, pp. 82-98
-
-
Heitmeyer, C.L.1
Archer, M.2
Leonard, E.I.3
McLean, J.4
-
10
-
-
79959729769
-
A framework to support alignment of secure software engineering with legal regulations
-
Islam, S., Mouratidis, H., and Jürjens, J. A framework to support alignment of secure software engineering with legal regulations. Software & Systems Modeling 10, 3 (2011), 369-394.
-
(2011)
Software & Systems Modeling
, vol.10
, Issue.3
, pp. 369-394
-
-
Islam, S.1
Mouratidis, H.2
Jürjens, J.3
-
11
-
-
84884492173
-
Modeling trust relationships for developing trustworthy information systems
-
Islam, S., Pavlidis, M., Mouratidis, H., and Kearney, P. Modeling Trust Relationships for Developing Trustworthy Information Systems. Int. J. Inf. Syst. Model. Des. 5, 1 (2014), 25-48.
-
(2014)
Int. J. Inf. Syst. Model. des
, vol.5
, Issue.1
, pp. 25-48
-
-
Islam, S.1
Pavlidis, M.2
Mouratidis, H.3
Kearney, P.4
-
12
-
-
84881151887
-
-
Springer
-
Jin, X., Sandhu, R., and Krishnan, R. RABAC: Role-Centric Attribute-Based Access Control. Springer, 2012, pp. 84-96.
-
(2012)
RABAC: Role-Centric Attribute-Based Access Control
, pp. 84-96
-
-
Jin, X.1
Sandhu, R.2
Krishnan, R.3
-
15
-
-
84883269042
-
Enhancing model driven security through pattern refinement techniques
-
Katt, B., Gander, M., Breu, R., and Felderer, M. Enhancing Model Driven Security through Pattern Refinement Techniques. In FMCO (2011), pp. 169-183.
-
(2011)
FMCO
, pp. 169-183
-
-
Katt, B.1
Gander, M.2
Breu, R.3
Felderer, M.4
-
16
-
-
84949233048
-
Safety and security analysis of object-oriented models
-
Springer
-
Lano, K., Clark, D., and Androutsopoulos, K. Safety and Security Analysis of Object-Oriented Models. In SAFECOMP (2002), Springer, pp. 82-93.
-
(2002)
SAFECOMP
, pp. 82-93
-
-
Lano, K.1
Clark, D.2
Androutsopoulos, K.3
-
17
-
-
0242655790
-
SecureUML: A UML-based modeling language for model-driven security
-
Lodderstedt, T., Basin, D., and Doser, J. SecureUML: A UML-Based Modeling Language for Model-Driven Security. In UML (2002).
-
(2002)
UML
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
19
-
-
84961642292
-
SoSPa: A system of security design patterns for systematically engineering secure systems
-
Nguyen, P. H., Yskout, K., Heyman, T., Klein, J., Scandariato, R., and Traon, Y. L. SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems. In MoDELS (2015), pp. 246-255.
-
(2015)
MoDELS
, pp. 246-255
-
-
Nguyen, P.H.1
Yskout, K.2
Heyman, T.3
Klein, J.4
Scandariato, R.5
Traon, Y.L.6
-
20
-
-
84924415044
-
-
Object Management Group. Tech. Rep. formal/2014-02-03
-
Object Management Group. Object Constraint Language - Version 2.4. Tech. Rep. formal/2014-02-03, 2014.
-
(2014)
Object Constraint Language - Version 2.4
-
-
-
21
-
-
84942821010
-
Modelling and reasoning about security requirements in socio-technical systems
-
Research on conceptual modeling
-
Paja, E., Dalpiaz, F., and Giorgini, P. Modelling and reasoning about security requirements in socio-technical systems. Data and Knowledge Engineering 98 (2015), 123-143. Research on conceptual modeling.
-
(2015)
Data and Knowledge Engineering
, vol.98
, pp. 123-143
-
-
Paja, E.1
Dalpiaz, F.2
Giorgini, P.3
-
22
-
-
84870686816
-
Sts-tool: Socio-technical security requirements through social commitments
-
Sept
-
Paja, E., Dalpiaz, F., Poggianella, M., Roberti, P., and Giorgini, P. Sts-tool: Socio-technical security requirements through social commitments. In 2012 20th IEEE International Requirements Engineering Conference (RE) (Sept 2012), pp. 331-332.
-
(2012)
2012 20th IEEE International Requirements Engineering Conference (RE)
, pp. 331-332
-
-
Paja, E.1
Dalpiaz, F.2
Poggianella, M.3
Roberti, P.4
Giorgini, P.5
-
23
-
-
84890729922
-
SecTro: A CASE tool for modelling security in requirements engineering using secure tropos
-
Pavlidis, M., and Islam, S. SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos. In CAiSE (2011), pp. 89-96.
-
(2011)
CAiSE
, pp. 89-96
-
-
Pavlidis, M.1
Islam, S.2
-
24
-
-
84989186743
-
Continuous detection of design flaws in evolving object-oriented programs using incremental multipattern matching
-
(New York, NY, USA, 2016), ASE, ACM
-
Peldszus, S., Kulcsár, G., Lochau, M., and Schulze, S. Continuous detection of design flaws in evolving object-oriented programs using incremental multipattern matching. In Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering (New York, NY, USA, 2016), ASE 2016, ACM, pp. 578-589.
-
(2016)
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering
, pp. 578-589
-
-
Peldszus, S.1
Kulcsár, G.2
Lochau, M.3
Schulze, S.4
-
25
-
-
34748846883
-
Performance analysis of security aspects in UML models
-
ACM
-
Petriu, D., Woodside, M., Petriu, D., Xu, J., Israr, T., Georg, G., France, R., Bieman, J., Houmb, S. H., and Jürjens, J. Performance analysis of security aspects in UML models. In Sixth International Workshop on Software and Performance (WOSP 2007) (2007), ACM, pp. 91-102.
-
(2007)
Sixth International Workshop on Software and Performance (WOSP 2007)
, pp. 91-102
-
-
Petriu, D.1
Woodside, M.2
Petriu, D.3
Xu, J.4
Israr, T.5
Georg, G.6
France, R.7
Bieman, J.8
Houmb, S.H.9
Jürjens, J.10
-
26
-
-
84857362096
-
Enhancing security requirements engineering by organisational learning
-
Schneider, K., Knauss, E., Houmb, S., Islam, S., and Jürjens, J. Enhancing Security Requirements Engineering by Organisational Learning. REJ 17, 1 (2012), 35-56.
-
(2012)
REJ
, vol.17
, Issue.1
, pp. 35-56
-
-
Schneider, K.1
Knauss, E.2
Houmb, S.3
Islam, S.4
Jürjens, J.5
-
27
-
-
84930091984
-
The challenges of personal data markets and privacy
-
Spiekermann, S., Acqisti, A., Böhme, R., and Hui, K.-L. The challenges of personal data markets and privacy. Electronic Markets 25, 2 (2015), 161-167.
-
(2015)
Electronic Markets
, vol.25
, Issue.2
, pp. 161-167
-
-
Spiekermann, S.1
Acqisti, A.2
Böhme, R.3
Hui, K.-L.4
-
28
-
-
60449120378
-
Engineering privacy
-
Jan
-
Spiekermann, S., and Cranor, L. F. Engineering Privacy. IEEE Trans. Softw. Eng. 35, 1 (Jan. 2009), 67-82.
-
(2009)
IEEE Trans. Softw. Eng
, vol.35
, Issue.1
, pp. 67-82
-
-
Spiekermann, S.1
Cranor, L.F.2
-
29
-
-
74549142762
-
-
2nd ed. Addison-Wesley Professional
-
Steinberg, D., Budinsky, F., Paternostro, M., and Merks, E. EMF: Eclipse Modeling Framework 2.0, 2nd ed. Addison-Wesley Professional, 2009.
-
(2009)
EMF: Eclipse Modeling Framework 2.0
-
-
Steinberg, D.1
Budinsky, F.2
Paternostro, M.3
Merks, E.4
-
30
-
-
85012957343
-
Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data
-
The European Parliament and the Council of the Europeam Union
-
The European Parliament and the Council of the Europeam Union. Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Union (2016).
-
(2016)
Official Journal of the European Union
-
-
|