-
1
-
-
85013025310
-
Supporting model-based privacy analysis by exploiting privacy level agreements
-
CloudCom 2016, Luxembourg, December 12-15, 2016
-
Amir Shayan Ahmadian and Jan Jürjens. 2016. Supporting Model-Based Privacy Analysis by Exploiting Privacy Level Agreements. In 2016 IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2016, Luxembourg, December 12-15, 2016. 360-365.
-
(2016)
2016 IEEE International Conference on Cloud Computing Technology and Science
, pp. 360-365
-
-
Ahmadian, A.S.1
Jürjens, J.2
-
2
-
-
85030761760
-
Model-based privacy and security analysis with CARiSMA
-
Paderborn, Germany, September 4-8, 2017
-
Amir Shayan Ahmadian, Sven Peldszus, Qusai Ramadan, and Jan Jürjens. 2017. Model-based privacy and security analysis with CARiSMA. In Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2017, Paderborn, Germany, September 4-8, 2017. 989-993. https://doi.org/10.1145/ 3106237.3122823
-
(2017)
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2017
, pp. 989-993
-
-
Ahmadian, A.S.1
Peldszus, S.2
Ramadan, Q.3
Jürjens, J.4
-
3
-
-
85025133541
-
Model-based privacy analysis in industrial ecosystems
-
Held as Part of STAF 2017, Marburg, Germany, July 19-20, 2017, Proceedings
-
Amir Shayan Ahmadian, Daniel Strüber, Volker Riediger, and Jan Jürjens. 2017. Model-Based Privacy Analysis in Industrial Ecosystems. In Modelling Foundations and Applications-13th European Conference, ECMFA 2017, Held as Part of STAF 2017, Marburg, Germany, July 19-20, 2017, Proceedings. 215-231. https://doi.org/ 10.1007/978-3-319-61482-3-13
-
(2017)
Modelling Foundations and Applications-13th European Conference, ECMFA 2017
, pp. 215-231
-
-
Ahmadian, A.S.1
Strüber, D.2
Riediger, V.3
Jürjens, J.4
-
4
-
-
85048861251
-
Supporting privacy impact assessment by model-based privacy analysis
-
New York, NY, USA. accepted
-
Amir Shayan Ahmadian, Daniel Strüber, Volker Riediger, and Jan Jürjens. 2018. Supporting Privacy Impact Assessment by Model-Based Privacy Analysis. In Proceedings of ACM SAC Conference (SAC18). ACM, New York, NY, USA. accepted.
-
(2018)
Proceedings of ACM SAC Conference (SAC18). ACM
-
-
Ahmadian, A.S.1
Strüber, D.2
Riediger, V.3
Jürjens, J.4
-
6
-
-
85050560265
-
Reference architecture model for the industrial data space
-
S. Auer, J. Jürjens, B. Otto, G. Brost, C. Lange, C. Quix, J. Cirullies, S. Lohmann, J. Schon, A. Eitel, C. Mader, D. Schulz, T. Ernst, N. Menz, J. SchÃijtte, C. Haas, R. Nagel, M. Spiekermann, M. Huber, H. Pettenpohl, S. Wenzel, C. Jung, and J. Pullmann. 2017. Reference architecture model for the industrial data space. White Paper. Fraunhofer. www.industrialdataspace.org
-
(2017)
White Paper. Fraunhofer. Www.industrialdataspace.org
-
-
Auer, S.1
Jürjens, J.2
Otto, B.3
Brost, G.4
Lange, C.5
Quix, C.6
Cirullies, J.7
Lohmann, S.8
Schon, J.9
Eitel, A.10
Mader, C.11
Schulz, D.12
Ernst, T.13
Menz, N.14
SchÃijtte, J.15
Haas, C.16
Nagel, R.17
Spiekermann, M.18
Huber, M.19
Pettenpohl, H.20
Wenzel, S.21
Jung, C.22
Pullmann, J.23
more..
-
7
-
-
85050544892
-
-
Springer Berlin Heidelberg
-
Ken Barker, Mina Askari, Mishtu Banerjee, Kambiz Ghazinour, Brenan Mackas, Maryam Majedi, Sampson Pun, and Adepele Williams. 2009. A Data Privacy Taxonomy. Springer Berlin Heidelberg.
-
(2009)
A Data Privacy Taxonomy
-
-
Barker, K.1
Askari, M.2
Banerjee, M.3
Ghazinour, K.4
Mackas, B.5
Majedi, M.6
Pun, S.7
Williams, A.8
-
8
-
-
84964282497
-
Towards a uml profile for privacy-aware applications
-
T. Basso, L. Montecchi, R. Moraes, M. Jino, and A. Bondavalli. 2015. Towards a UML Profile for Privacy-Aware Applications. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
-
(2015)
2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing
-
-
Basso, T.1
Montecchi, L.2
Moraes, R.3
Jino, M.4
Bondavalli, A.5
-
10
-
-
77951546325
-
Advancing privacy and security in computing, networking and systems innovations through privacy by design
-
November 2-5, 2009, Toronto, Ontario, Canada
-
Ann Cavoukian and Michelle Chibba. 2009. Advancing privacy and security in computing, networking and systems innovations through privacy by design. In Proceedings of the 2009 conference of the Centre for Advanced Studies on Collaborative Research, November 2-5, 2009, Toronto, Ontario, Canada.
-
(2009)
Proceedings of the 2009 Conference of the Centre for Advanced Studies on Collaborative Research
-
-
Cavoukian, A.1
Chibba, M.2
-
12
-
-
84873617781
-
Towards a modeling and analysis framework for privacy-aware systems
-
Pietro Colombo and Elena Ferrari. 2012. Towards a modeling and analysis framework for privacy-aware systems. In Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom). IEEE, 81-90.
-
(2012)
Privacy, Security, Risk and Trust (PASSAT),. 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom). IEEE
, pp. 81-90
-
-
Colombo, P.1
Ferrari, E.2
-
14
-
-
84878677619
-
A pattern language for developing privacy enhancing technologies
-
(2013)
-
Munawar Hafiz. 2013. A pattern language for developing privacy enhancing technologies. Softw., Pract. Exper. 7 (2013), 769-787.
-
(2013)
Softw., Pract. Exper
, vol.7
, pp. 769-787
-
-
Hafiz, M.1
-
16
-
-
10044248787
-
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
-
Jason I. Hong, Jennifer D. Ng, Scott Lederer, and James A. Landay. 2004. Privacy Risk Models for Designing Privacy-sensitive Ubiquitous Computing Systems. In Proceedings of the 5th Conference on Designing Interactive Systems: processes, Practices, Methods, and Techniques (DIS '04).
-
(2004)
Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques (DIS '04)
-
-
Hong, J.I.1
Ng, J.D.2
Lederer, S.3
Landay, J.A.4
-
17
-
-
84899177670
-
An integrated security verification and security solution design trade-off analysis approach
-
H. Mouratidis (Ed.). Idea Group
-
S. H. Houmb, G. Georg, J. Jürjens, and R. B. France. 2006. An Integrated Security Verification and Security Solution Design Trade-off Analysis Approach. In Integrating Security and Software Engineering: Advances and Future Vision, H. Mouratidis (Ed.). Idea Group, 190-219.
-
(2006)
Integrating Security and Software Engineering: Advances and Future Vision
, pp. 190-219
-
-
Houmb, S.H.1
Georg, G.2
Jürjens, J.3
France, R.B.4
-
23
-
-
50949085110
-
Addressing privacy requirements in system design: The PriS method
-
(2008)
-
Christos Kalloniatis, Evangelia Kavakli, and Stefanos Gritzalis. 2008. Addressing privacy requirements in system design: the PriS method. Requirements Engineering 13, 3 (2008).
-
(2008)
Requirements Engineering
, vol.13
, Issue.3
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
26
-
-
85007218223
-
-
Technical Report. Fraunhofer
-
B. Otto, J. Jürjens, J. Schon, S. Auer, N. Menz, S. Wenzel, and J. Cirullies. 2016. Industrial Data Space: Digital Sovereignity over Data. Technical Report. Fraunhofer.
-
(2016)
Industrial Data Space: Digital Sovereignity over Data
-
-
Otto, B.1
Jürjens, J.2
Schon, J.3
Auer, S.4
Menz, N.5
Wenzel, S.6
Cirullies, J.7
-
28
-
-
84871955734
-
Supporting security assurance in the context of evolution: Modular modeling and analysis with umlsec
-
Omaha, NE, USA, October 25-27, 2012
-
Thomas Ruhroth and Jan Jürjens. 2012. Supporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec. In 14th International IEEE Symposium on High-Assurance Systems Engineering, HASE 2012, Omaha, NE, USA, October 25-27, 2012. 177-184.
-
(2012)
14th International IEEE Symposium on High-Assurance Systems Engineering, HASE 2012
, pp. 177-184
-
-
Ruhroth, T.1
Jürjens, J.2
-
29
-
-
84857362096
-
Enhancing security requirements engineering by organisational learning
-
(2012)
-
K. Schneider, E. Knauss, S. Houmb, S. Islam, and J. Jürjens. 2012. Enhancing Security Requirements Engineering by Organisational Learning. Requirements Engineering Journal (REJ) 17, 1 (2012), 35-56.
-
(2012)
Requirements Engineering Journal (REJ)
, vol.17
, Issue.1
, pp. 35-56
-
-
Schneider, K.1
Knauss, E.2
Houmb, S.3
Islam, S.4
Jürjens, J.5
-
30
-
-
84863760903
-
The challenges of privacy by design
-
(July 2012)
-
Sarah Spiekermann. 2012. The Challenges of Privacy by Design. Commun. ACM 55 (July 2012), 38-40.
-
(2012)
Commun. ACM
, vol.55
, pp. 38-40
-
-
Spiekermann, S.1
|