메뉴 건너뛰기




Volumn Part F130154, Issue , 2017, Pages 989-993

Model-based privacy and security analysis with CARiSMA

Author keywords

Model based analysis; Privacy; Security; System design analysis

Indexed keywords

DATA HANDLING; SECURITY SYSTEMS; SOFTWARE ENGINEERING; SYSTEMS ANALYSIS;

EID: 85030761760     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/3106237.3122823     Document Type: Conference Paper
Times cited : (25)

References (30)
  • 1
    • 85025157875 scopus 로고    scopus 로고
    • Model-based privacy analysis in industrial ecosystems
    • Springer. accepted
    • Ahmadian, A. S., Strüber, D., Riediger, V., and Jürjens, J. Model-based Privacy Analysis in Industrial Ecosystems. In ECMFA (2017), Springer. accepted.
    • (2017) ECMFA
    • Ahmadian, A.S.1    Strüber, D.2    Riediger, V.3    Jürjens, J.4
  • 3
    • 77951546325 scopus 로고    scopus 로고
    • Advancing privacy and security in computing, networking and systems innovations through privacy by design
    • Cavoukian, A., and Chibba, M. Advancing Privacy and Security in Computing, Networking and Systems Innovations through Privacy by Design. In CASCON (2009), pp. 358-360.
    • (2009) CASCON , pp. 358-360
    • Cavoukian, A.1    Chibba, M.2
  • 4
    • 84873617781 scopus 로고    scopus 로고
    • Towards a modeling and analysis framework for privacy-aware systems
    • IEEE Computer Society
    • Colombo, P., and Ferrari, E. Towards a Modeling and Analysis Framework for Privacy-Aware Systems. In SOCIALCOM-PASSAT (2012), IEEE Computer Society, pp. 81-90.
    • (2012) SOCIALCOM-PASSAT , pp. 81-90
    • Colombo, P.1    Ferrari, E.2
  • 6
    • 33947368645 scopus 로고    scopus 로고
    • Modelbased security analysis in seven steps - A guided tour to the coras method
    • den Braber, F., Hogganvik, I., Lund, M. S., Stølen, K., and Vraalsen, F. Modelbased security analysis in seven steps - a guided tour to the coras method. BT Technology Journal 25, 1 (2007), 101-117.
    • (2007) BT Technology Journal , vol.25 , Issue.1 , pp. 101-117
    • Den Braber, F.1    Hogganvik, I.2    Lund, M.S.3    Stølen, K.4    Vraalsen, F.5
  • 7
    • 60849085437 scopus 로고    scopus 로고
    • An aspect-oriented methodology for designing secure applications
    • Georg, G., Ray, I., Anastasakis, K., Bordbar, B., Toahchoodee, M., and Houmb, S. H. An Aspect-oriented Methodology for Designing Secure Applications. INFSOF 51, 5 (2009), 846-864.
    • (2009) INFSOF , vol.51 , Issue.5 , pp. 846-864
    • Georg, G.1    Ray, I.2    Anastasakis, K.3    Bordbar, B.4    Toahchoodee, M.5    Houmb, S.H.6
  • 8
    • 0004256091 scopus 로고    scopus 로고
    • John Wiley & Sons, Inc., New York, NY, USA
    • Gollmann, D. Computer Security. John Wiley & Sons, Inc., New York, NY, USA, 1999.
    • (1999) Computer Security
    • Gollmann, D.1
  • 9
    • 40449092394 scopus 로고    scopus 로고
    • Applying formal methods to a certifiably secure software system
    • Heitmeyer, C. L., Archer, M., Leonard, E. I., and McLean, J. Applying Formal Methods to a Certifiably Secure Software System. IEEE Trans. Software Eng. 34, 1 (2008), 82-98.
    • (2008) IEEE Trans. Software Eng , vol.34 , Issue.1 , pp. 82-98
    • Heitmeyer, C.L.1    Archer, M.2    Leonard, E.I.3    McLean, J.4
  • 10
    • 79959729769 scopus 로고    scopus 로고
    • A framework to support alignment of secure software engineering with legal regulations
    • Islam, S., Mouratidis, H., and Jürjens, J. A framework to support alignment of secure software engineering with legal regulations. Software & Systems Modeling 10, 3 (2011), 369-394.
    • (2011) Software & Systems Modeling , vol.10 , Issue.3 , pp. 369-394
    • Islam, S.1    Mouratidis, H.2    Jürjens, J.3
  • 11
    • 84884492173 scopus 로고    scopus 로고
    • Modeling trust relationships for developing trustworthy information systems
    • Islam, S., Pavlidis, M., Mouratidis, H., and Kearney, P. Modeling Trust Relationships for Developing Trustworthy Information Systems. Int. J. Inf. Syst. Model. Des. 5, 1 (2014), 25-48.
    • (2014) Int. J. Inf. Syst. Model. des , vol.5 , Issue.1 , pp. 25-48
    • Islam, S.1    Pavlidis, M.2    Mouratidis, H.3    Kearney, P.4
  • 15
    • 84883269042 scopus 로고    scopus 로고
    • Enhancing model driven security through pattern refinement techniques
    • Katt, B., Gander, M., Breu, R., and Felderer, M. Enhancing Model Driven Security through Pattern Refinement Techniques. In FMCO (2011), pp. 169-183.
    • (2011) FMCO , pp. 169-183
    • Katt, B.1    Gander, M.2    Breu, R.3    Felderer, M.4
  • 16
    • 84949233048 scopus 로고    scopus 로고
    • Safety and security analysis of object-oriented models
    • Springer
    • Lano, K., Clark, D., and Androutsopoulos, K. Safety and Security Analysis of Object-Oriented Models. In SAFECOMP (2002), Springer, pp. 82-93.
    • (2002) SAFECOMP , pp. 82-93
    • Lano, K.1    Clark, D.2    Androutsopoulos, K.3
  • 17
    • 0242655790 scopus 로고    scopus 로고
    • SecureUML: A UML-based modeling language for model-driven security
    • Lodderstedt, T., Basin, D., and Doser, J. SecureUML: A UML-Based Modeling Language for Model-Driven Security. In UML (2002).
    • (2002) UML
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 19
    • 84961642292 scopus 로고    scopus 로고
    • SoSPa: A system of security design patterns for systematically engineering secure systems
    • Nguyen, P. H., Yskout, K., Heyman, T., Klein, J., Scandariato, R., and Traon, Y. L. SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems. In MoDELS (2015), pp. 246-255.
    • (2015) MoDELS , pp. 246-255
    • Nguyen, P.H.1    Yskout, K.2    Heyman, T.3    Klein, J.4    Scandariato, R.5    Traon, Y.L.6
  • 20
    • 84924415044 scopus 로고    scopus 로고
    • Object Management Group. Tech. Rep. formal/2014-02-03
    • Object Management Group. Object Constraint Language - Version 2.4. Tech. Rep. formal/2014-02-03, 2014.
    • (2014) Object Constraint Language - Version 2.4
  • 21
    • 84942821010 scopus 로고    scopus 로고
    • Modelling and reasoning about security requirements in socio-technical systems
    • Research on conceptual modeling
    • Paja, E., Dalpiaz, F., and Giorgini, P. Modelling and reasoning about security requirements in socio-technical systems. Data and Knowledge Engineering 98 (2015), 123-143. Research on conceptual modeling.
    • (2015) Data and Knowledge Engineering , vol.98 , pp. 123-143
    • Paja, E.1    Dalpiaz, F.2    Giorgini, P.3
  • 23
    • 84890729922 scopus 로고    scopus 로고
    • SecTro: A CASE tool for modelling security in requirements engineering using secure tropos
    • Pavlidis, M., and Islam, S. SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos. In CAiSE (2011), pp. 89-96.
    • (2011) CAiSE , pp. 89-96
    • Pavlidis, M.1    Islam, S.2
  • 26
    • 84857362096 scopus 로고    scopus 로고
    • Enhancing security requirements engineering by organisational learning
    • Schneider, K., Knauss, E., Houmb, S., Islam, S., and Jürjens, J. Enhancing Security Requirements Engineering by Organisational Learning. REJ 17, 1 (2012), 35-56.
    • (2012) REJ , vol.17 , Issue.1 , pp. 35-56
    • Schneider, K.1    Knauss, E.2    Houmb, S.3    Islam, S.4    Jürjens, J.5
  • 27
    • 84930091984 scopus 로고    scopus 로고
    • The challenges of personal data markets and privacy
    • Spiekermann, S., Acqisti, A., Böhme, R., and Hui, K.-L. The challenges of personal data markets and privacy. Electronic Markets 25, 2 (2015), 161-167.
    • (2015) Electronic Markets , vol.25 , Issue.2 , pp. 161-167
    • Spiekermann, S.1    Acqisti, A.2    Böhme, R.3    Hui, K.-L.4
  • 30
    • 85012957343 scopus 로고    scopus 로고
    • Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data
    • The European Parliament and the Council of the Europeam Union
    • The European Parliament and the Council of the Europeam Union. Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Union (2016).
    • (2016) Official Journal of the European Union


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.