Visual Privacy Management
暂无分享,去创建一个
Jan Jürjens | Haralambos Mouratidis | Michalis Pavlidis | Sven Peldszus | Amir Shayan Ahmadian | Mattia Salnitri | J. Jürjens | Sven Peldszus | H. Mouratidis | Mattia Salnitri | Michalis Pavlidis | A. Ahmadian
[1] Jan Jürjens,et al. Supporting privacy impact assessment by model-based privacy analysis , 2018, SAC.
[2] Jan Jürjens,et al. Model-based privacy and security analysis with CARiSMA , 2017, ESEC/SIGSOFT FSE.
[3] Jan Jürjens,et al. Model-Based Privacy Analysis in Industrial Ecosystems , 2017, ECMFA.
[4] Other Contributors Are Indicated Where They Contribute. The Free Software Foundation , 2017 .
[5] Paolo Giorgini,et al. Maintaining Secure Business Processes in Light of Socio-Technical Systems' Evolution , 2016, 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW).
[6] Paolo Giorgini,et al. Security Requirements Engineering: Designing Secure Socio-Technical Systems , 2016 .
[7] Jacques Klein,et al. SoSPa: A system of Security design Patterns for systematically engineering secure systems , 2015, 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS).
[8] Paolo Giorgini,et al. STS-Tool 3.0: Maintaining Security in Socio-Technical Systems , 2015, CAiSE Forum.
[9] Jaap-Henk Hoepman,et al. PDF hosted at the Radboud Repository of the Radboud University Nijmegen , 2022 .
[10] Haralambos Mouratidis,et al. Modeling Trust Relationships for Developing Trustworthy Information Systems , 2014, Int. J. Inf. Syst. Model. Des..
[11] Haralambos Mouratidis,et al. Dealing with trust and control: A meta-model for trustworthy information systems development , 2012, 2012 Sixth International Conference on Research Challenges in Information Science (RCIS).
[12] Haralambos Mouratidis,et al. Modelling Security Using Trust Based Concepts , 2012, Int. J. Secur. Softw. Eng..
[13] Shareeful Islam,et al. SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos , 2011, CAiSE Forum.
[14] Ruth Breu,et al. Enhancing Model Driven Security through Pattern Refinement Techniques , 2011, FMCO.
[15] Jan Jürjens,et al. A framework to support alignment of secure software engineering with legal regulations , 2011, Software & Systems Modeling.
[16] Manachai Toahchoodee,et al. An aspect-oriented methodology for designing secure applications , 2009, Inf. Softw. Technol..
[17] Stefanos Gritzalis,et al. Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.
[18] John McLean,et al. Applying Formal Methods to a Certifiably Secure Software System , 2008, IEEE Transactions on Software Engineering.
[19] Martin S. Olivier,et al. Using Purpose Lattices to Facilitate Customisation of Privacy Agreements , 2007, TrustBus.
[20] Haralambos Mouratidis,et al. Secure Tropos: a Security-Oriented Extension of the Tropos Methodology , 2007, Int. J. Softw. Eng. Knowl. Eng..
[21] I. Hogganvik,et al. Model-based security analysis in seven steps — a guided tour to the CORAS method , 2007 .
[22] Jan Jürjens,et al. Secure systems development with UML , 2004 .
[23] David A. Basin,et al. SecureUML: A UML-Based Modeling Language for Model-Driven Security , 2002, UML.
[24] David Clark,et al. Safety and Security Analysis of Object-Oriented Models , 2002, SAFECOMP.