Beckers, 2012 - Google Patents
Comparing privacy requirements engineering approachesBeckers, 2012
- Document ID
- 243983403986537970
- Author
- Beckers K
- Publication year
- Publication venue
- 2012 Seventh International Conference on Availability, Reliability and Security
External Links
Snippet
Several privacy requirements engineering approaches exist, which differ in notions and terminology. We extended a conceptual framework originally designed to compare security requirements engineering approaches with concepts and notions used in privacy …
- 238000000034 method 0 description 25
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Beckers | Comparing privacy requirements engineering approaches | |
Souag et al. | A security ontology for security requirements elicitation | |
Ghorbel et al. | Privacy in cloud computing environments: a survey and research challenges | |
Lazouski et al. | Usage control in computer security: A survey | |
Pereira et al. | A STAMP-based ontology approach to support safety and security analyses | |
Beckers et al. | A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering security, privacy, and legal compliance | |
Labda et al. | Modeling of privacy-aware business processes in BPMN to protect personal data | |
Pieters et al. | Security policy alignment: A formal approach | |
Beckers et al. | A structured comparison of security standards | |
Albakri et al. | Sharing cyber threat intelligence under the general data protection regulation | |
Basso et al. | Towards a UML profile for privacy-aware applications | |
Mouratidis et al. | Aligning Security and Privacy to Support the Development of Secure Information Systems. | |
Murphy et al. | From a sea of data to actionable insights: Big data and what it means for lawyers | |
Gharib et al. | An ontology for privacy requirements via a systematic literature review | |
Lalanne et al. | Information security risk management in a world of services | |
Gharib et al. | Ontologies for privacy requirements engineering: A systematic literature review | |
De et al. | A refinement approach for the reuse of privacy risk analysis results | |
Mujinga et al. | A socio-technical approach to information security | |
Yee | Visualization and prioritization of privacy risks in software systems | |
Matulevičius et al. | Security requirements elicitation from airline turnaround processes | |
Roman et al. | Current perspectives on securing critical infrastructures’ supply chains | |
Alabsi et al. | A Systematic Review of Personal Information Sharing in Smart Cities: Risks, Impacts, and Controls | |
Pattakou et al. | Security and Privacy under a unified framework: a review | |
Chivers | Security and systems engineering | |
Jonnaganti | An Integrated Security Model for the Management of SOA Improving the attractiveness of SOA Environments through a strong Architectural Integrity |