메뉴 건너뛰기




Volumn , Issue , 2018, Pages 1142-1149

Extending model-based privacy analysis for the industrial data space by exploiting privacy level agreements

Author keywords

GDPR; Industrial data space; Model based privacy analysis; Personal data; Privacy by design

Indexed keywords

ECOSYSTEMS; ELECTRONIC DATA INTERCHANGE; NETWORK SECURITY; SALES; SOFTWARE DESIGN;

EID: 85050540996     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/3167132.3167256     Document Type: Conference Paper
Times cited : (21)

References (33)
  • 1
    • 85013025310 scopus 로고    scopus 로고
    • Supporting model-based privacy analysis by exploiting privacy level agreements
    • CloudCom 2016, Luxembourg, December 12-15, 2016
    • Amir Shayan Ahmadian and Jan Jürjens. 2016. Supporting Model-Based Privacy Analysis by Exploiting Privacy Level Agreements. In 2016 IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016, Luxembourg, December 12-15, 2016. 360-365.
    • (2016) 2016 IEEE International Conference on Cloud Computing Technology and Science , pp. 360-365
    • Ahmadian, A.S.1    Jürjens, J.2
  • 3
    • 85025133541 scopus 로고    scopus 로고
    • Model-based privacy analysis in industrial ecosystems
    • Held as Part of STAF 2017, Marburg, Germany, July 19-20, 2017, Proceedings
    • Amir Shayan Ahmadian, Daniel Strüber, Volker Riediger, and Jan Jürjens. 2017. Model-Based Privacy Analysis in Industrial Ecosystems. In Modelling Foundations and Applications-13th European Conference, ECMFA 2017, Held as Part of STAF 2017, Marburg, Germany, July 19-20, 2017, Proceedings. 215-231. https://doi.org/ 10.1007/978-3-319-61482-3-13
    • (2017) Modelling Foundations and Applications-13th European Conference, ECMFA 2017 , pp. 215-231
    • Ahmadian, A.S.1    Strüber, D.2    Riediger, V.3    Jürjens, J.4
  • 14
    • 84878677619 scopus 로고    scopus 로고
    • A pattern language for developing privacy enhancing technologies
    • (2013)
    • Munawar Hafiz. 2013. A pattern language for developing privacy enhancing technologies. Softw., Pract. Exper. 7 (2013), 769-787.
    • (2013) Softw., Pract. Exper , vol.7 , pp. 769-787
    • Hafiz, M.1
  • 23
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: The PriS method
    • (2008)
    • Christos Kalloniatis, Evangelia Kavakli, and Stefanos Gritzalis. 2008. Addressing privacy requirements in system design: the PriS method. Requirements Engineering 13, 3 (2008).
    • (2008) Requirements Engineering , vol.13 , Issue.3
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 28
    • 84871955734 scopus 로고    scopus 로고
    • Supporting security assurance in the context of evolution: Modular modeling and analysis with umlsec
    • Omaha, NE, USA, October 25-27, 2012
    • Thomas Ruhroth and Jan Jürjens. 2012. Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec. In 14th International IEEE Symposium on High-Assurance Systems Engineering, HASE 2012, Omaha, NE, USA, October 25-27, 2012. 177-184.
    • (2012) 14th International IEEE Symposium on High-Assurance Systems Engineering, HASE 2012 , pp. 177-184
    • Ruhroth, T.1    Jürjens, J.2
  • 30
    • 84863760903 scopus 로고    scopus 로고
    • The challenges of privacy by design
    • (July 2012)
    • Sarah Spiekermann. 2012. The Challenges of Privacy by Design. Commun. ACM 55 (July 2012), 38-40.
    • (2012) Commun. ACM , vol.55 , pp. 38-40
    • Spiekermann, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.