Engineering privacy by design: lessons from the design and implementation of an identity wallet platform
暂无分享,去创建一个
Kai Rannenberg | Fatbardh Veseli | Tobias Pulls | Jetzabel Serna-Olvera | T. Pulls | Kai Rannenberg | F. Veseli | J. Serna-Olvera
[1] Joachim Posegga,et al. On Structural Signatures for Tree Data Structures , 2012, ACNS.
[2] George Danezis,et al. AnNotify: A Private Notification Service , 2017, IACR Cryptol. ePrint Arch..
[3] Wouter Joosen,et al. LINDDUN privacy threat modeling: a tutorial , 2015 .
[4] Wouter Joosen,et al. Empirical evaluation of a privacy-focused threat modeling methodology , 2014, J. Syst. Softw..
[5] Andrew E O Obwanda. An information security risk management gap analysis tool based on ISO/IEC 27005:2011 compliance for SMEs in Kenya , 2018 .
[6] José M. del Álamo,et al. A Metamodel for Privacy Engineering Methods , 2017, IWPE@SP.
[7] Stephan Krenn,et al. Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider , 2016, Privacy and Identity Management.
[8] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[9] Wouter Joosen,et al. A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.
[10] Christian Paquin,et al. U-Prove Cryptographic Specification V1.1 (Revision 3) , 2013 .
[11] George Danezis,et al. UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs , 2016, WPES@CCS.
[12] Josep Domingo-Ferrer,et al. Privacy and Data Protection by Design - from policy to engineering , 2014, ArXiv.
[13] Thomas S. Heydt-Benjamin,et al. Cryptographic Protocols of the Identity Mixer Library , 2009 .
[14] Naomi B. Lefkovitz,et al. An Introduction to Privacy Engineering and Risk Management in Federal Systems , 2017 .
[15] Kai Rannenberg,et al. D2.2 - Architecture for Attribute-based Credential Technologies - Final Version , 2014 .
[16] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .