Visual Privacy Management

[1]  Jan Jürjens,et al.  Supporting privacy impact assessment by model-based privacy analysis , 2018, SAC.

[2]  Jan Jürjens,et al.  Model-based privacy and security analysis with CARiSMA , 2017, ESEC/SIGSOFT FSE.

[3]  Jan Jürjens,et al.  Model-Based Privacy Analysis in Industrial Ecosystems , 2017, ECMFA.

[4]  Other Contributors Are Indicated Where They Contribute The Free Software Foundation , 2017 .

[5]  Paolo Giorgini,et al.  Maintaining Secure Business Processes in Light of Socio-Technical Systems' Evolution , 2016, 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW).

[6]  Paolo Giorgini,et al.  Security Requirements Engineering: Designing Secure Socio-Technical Systems , 2016 .

[7]  Jacques Klein,et al.  SoSPa: A system of Security design Patterns for systematically engineering secure systems , 2015, 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS).

[8]  Paolo Giorgini,et al.  STS-Tool 3.0: Maintaining Security in Socio-Technical Systems , 2015, CAiSE Forum.

[9]  Jaap-Henk Hoepman,et al.  PDF hosted at the Radboud Repository of the Radboud University Nijmegen , 2022 .

[10]  Haralambos Mouratidis,et al.  Modeling Trust Relationships for Developing Trustworthy Information Systems , 2014, Int. J. Inf. Syst. Model. Des..

[11]  Haralambos Mouratidis,et al.  Dealing with trust and control: A meta-model for trustworthy information systems development , 2012, 2012 Sixth International Conference on Research Challenges in Information Science (RCIS).

[12]  Haralambos Mouratidis,et al.  Modelling Security Using Trust Based Concepts , 2012, Int. J. Secur. Softw. Eng..

[13]  Shareeful Islam,et al.  SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos , 2011, CAiSE Forum.

[14]  Ruth Breu,et al.  Enhancing Model Driven Security through Pattern Refinement Techniques , 2011, FMCO.

[15]  Jan Jürjens,et al.  A framework to support alignment of secure software engineering with legal regulations , 2011, Software & Systems Modeling.

[16]  Manachai Toahchoodee,et al.  An aspect-oriented methodology for designing secure applications , 2009, Inf. Softw. Technol..

[17]  Stefanos Gritzalis,et al.  Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.

[18]  John McLean,et al.  Applying Formal Methods to a Certifiably Secure Software System , 2008, IEEE Transactions on Software Engineering.

[19]  Martin S. Olivier,et al.  Using Purpose Lattices to Facilitate Customisation of Privacy Agreements , 2007, TrustBus.

[20]  Haralambos Mouratidis,et al.  Secure Tropos: a Security-Oriented Extension of the Tropos Methodology , 2007, Int. J. Softw. Eng. Knowl. Eng..

[21]  I. Hogganvik,et al.  Model-based security analysis in seven steps — a guided tour to the CORAS method , 2007 .

[22]  Jan Jürjens,et al.  Secure systems development with UML , 2004 .

[23]  David A. Basin,et al.  SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.

[24]  David Clark,et al.  Safety and Security Analysis of Object-Oriented Models , 2002, SAFECOMP.