[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Beckers, 2012 - Google Patents

Comparing privacy requirements engineering approaches

Beckers, 2012

Document ID
243983403986537970
Author
Beckers K
Publication year
Publication venue
2012 Seventh International Conference on Availability, Reliability and Security

External Links

Snippet

Several privacy requirements engineering approaches exist, which differ in notions and terminology. We extended a conceptual framework originally designed to compare security requirements engineering approaches with concepts and notions used in privacy …
Continue reading at ieeexplore.ieee.org (other versions)

Similar Documents

Publication Publication Date Title
Beckers Comparing privacy requirements engineering approaches
Souag et al. A security ontology for security requirements elicitation
Ghorbel et al. Privacy in cloud computing environments: a survey and research challenges
Lazouski et al. Usage control in computer security: A survey
Pereira et al. A STAMP-based ontology approach to support safety and security analyses
Beckers et al. A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds considering security, privacy, and legal compliance
Labda et al. Modeling of privacy-aware business processes in BPMN to protect personal data
Pieters et al. Security policy alignment: A formal approach
Beckers et al. A structured comparison of security standards
Albakri et al. Sharing cyber threat intelligence under the general data protection regulation
Basso et al. Towards a UML profile for privacy-aware applications
Mouratidis et al. Aligning Security and Privacy to Support the Development of Secure Information Systems.
Murphy et al. From a sea of data to actionable insights: Big data and what it means for lawyers
Gharib et al. An ontology for privacy requirements via a systematic literature review
Lalanne et al. Information security risk management in a world of services
Gharib et al. Ontologies for privacy requirements engineering: A systematic literature review
De et al. A refinement approach for the reuse of privacy risk analysis results
Mujinga et al. A socio-technical approach to information security
Yee Visualization and prioritization of privacy risks in software systems
Matulevičius et al. Security requirements elicitation from airline turnaround processes
Roman et al. Current perspectives on securing critical infrastructures’ supply chains
Alabsi et al. A Systematic Review of Personal Information Sharing in Smart Cities: Risks, Impacts, and Controls
Pattakou et al. Security and Privacy under a unified framework: a review
Chivers Security and systems engineering
Jonnaganti An Integrated Security Model for the Management of SOA Improving the attractiveness of SOA Environments through a strong Architectural Integrity