Literature Survey on Technologies for Developing Privacy-Aware Software
暂无分享,去创建一个
Atsuo Hazeyama | Hironori Washizaki | Nobukazu Yoshioka | Takao Okubo | Haruhiko Kaiya | H. Kaiya | H. Washizaki | A. Hazeyama | T. Okubo | Nobukazu Yoshioka
[1] Jaap-Henk Hoepman,et al. PDF hosted at the Radboud Repository of the Radboud University Nijmegen , 2022 .
[2] Ye Wang,et al. Privacy requirements patterns for mobile operating systems , 2014, 2014 IEEE 4th International Workshop on Requirements Patterns (RePa).
[3] Maritta Heisel,et al. A Taxonomy of Requirements for the Privacy Goal Transparency , 2015, TrustBus.
[4] Manfred Tscheligi,et al. A Pattern Collection for Privacy Enhancing Technology , 2010 .
[5] Antonio Kung. PEARs: Privacy Enhancing ARchitectures , 2014, APF.
[6] Lorrie Faith Cranor,et al. Improving App Privacy: Nudging App Developers to Protect User Privacy , 2014, IEEE Security & Privacy.
[7] W. Ryan,et al. Privacy and freedom: Alan F. Westin Atheneum Publishers, $10 , 1967 .
[8] José Luis Fernández Alemán,et al. Security and privacy in electronic health records: A systematic literature review , 2013, J. Biomed. Informatics.
[9] Muhammad Ilyas,et al. A Literature Survey on Data Privacy/ Protection Issues and Challenges in Cloud Computing , 2012 .
[10] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[11] Wouter Joosen,et al. A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.
[12] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[13] Kuanchin Chen,et al. Protecting Personal Information Online: A Survey of User Privacy Concerns and Control Techniques , 2004, J. Comput. Inf. Syst..
[14] Atsuo Hazeyama,et al. A Metamodel for Security and Privacy Knowledge in Cloud Services , 2016, 2016 IEEE World Congress on Services (SERVICES).
[15] Stefanos Gritzalis,et al. Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.
[16] M. Hafiz. A collection of privacy design patterns , 2006, PLoP '06.
[17] James A. Landay,et al. Development and evaluation of emerging design patterns for ubiquitous computing , 2004, DIS '04.
[18] David Wright,et al. PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology , 2015, 2015 IEEE Security and Privacy Workshops.
[19] Yod Samuel Martín García,et al. Engineering privacy requirements valuable lessons from another realm , 2014 .
[20] Dennis G. Kafura,et al. Preprocess before You Build: Introducing a Framework for Privacy Requirements Engineering , 2013, 2013 International Conference on Social Computing.
[21] Eduardo B. Fernández,et al. Patterns to Support the Development of Privacy Policies , 2009, 2009 International Conference on Availability, Reliability and Security.
[22] Gary McGraw,et al. Knowledge for Software Security , 2005, IEEE Secur. Priv..
[23] Jason Hong,et al. Privacy patterns for online interactions , 2006, PLoP '06.
[24] Kristian Beckers,et al. Comparing Privacy Requirements Engineering Approaches , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.