ITR : Encoding Rights , Permissions and Obligations : Privacy Policy Specification and Compliance
暂无分享,去创建一个
[1] Nuel Belnap,et al. The deliberative stit: A study of action, omission, ability, and obligation , 1995, J. Philos. Log..
[2] Aldo Dagnino,et al. Deriving Goals from a Use-Case Based Requirements Specification , 2001, Requirements Engineering.
[3] Fay Cobb Payton,et al. Dirty laundry: privacy issues for IT professionals , 2000 .
[4] Michael Gurski,et al. P3P and Privacy: An update for the Privacy Community , 2004 .
[5] Shelly Farnham,et al. Decreasing online 'bad' behavior , 2002, CHI Extended Abstracts.
[6] Christen Krogh,et al. Hohfeld in cyberspace and other applications of normative reasoning in agent technology , 1999, Artificial Intelligence and Law.
[7] Qingfeng He,et al. A Privacy-Aware Database Interface , 2002 .
[8] Annie I. Antón,et al. Analyzing Website privacy requirements using a privacy goal taxonomy , 2002, Proceedings IEEE Joint International Conference on Requirements Engineering.
[9] Colin Potts,et al. Invented requirements and imagined customers: requirements engineering for off-the-shelf software , 1995, Proceedings of 1995 IEEE International Symposium on Requirements Engineering (RE'95).
[10] Kenji Takahashi,et al. Inquiry-based requirements analysis , 1994, IEEE Software.
[11] S. J. Goldsack,et al. Requirements engineering for real-time systems , 1991, Softw. Eng. J..
[12] John F. Horty,et al. Deontic logic as founded on nonmonotonic logic , 1993, Annals of Mathematics and Artificial Intelligence.
[13] Annie I. Antón,et al. Goal-based requirements analysis , 1996, Proceedings of the Second International Conference on Requirements Engineering.
[14] Alice M. Obenchain-Leeson,et al. Volume 6 , 1998 .
[15] J. Horty. Agency and Deontic Logic , 2001 .
[16] Carlos Jensen,et al. Privacy in Digital Environments: Empowering Users , 2002 .
[17] John L. Koverman. The Garden City , 1984 .
[18] A. Antón,et al. Strategies for Developing Policies and Requirements for Secure Electronic Commerce Systems , 2000 .
[19] Records, Computers and the Rights of Citizens , 1973 .
[20] Annie I. Antón,et al. A Representational Framework for Scenarios of System Use , 1998, Requirements Engineering.
[21] Annie I. Antón,et al. Goal Decomposition and Scenario Analysis in Business Process Reengineering , 1994, CAiSE.
[22] Annie I. Antón,et al. Functional Paleontology: The Evolution of User-Visible System Services , 2003, IEEE Trans. Software Eng..
[23] Colin Potts. Metaphors of intent , 2001, Proceedings Fifth IEEE International Symposium on Requirements Engineering.
[24] Julia B. Earp,et al. A Multidisciplinary Electronic Commerce Project Studio for Secure Systems , 2000 .
[25] Steven M. Drucker,et al. The effect of communication modality on cooperation in online environments , 2000, CHI.
[26] Victor Lesser,et al. The IPUS blackboard architecture as a framework for computational auditory scene analysis , 1998 .
[27] José Luiz Fiadeiro,et al. Temporal reasoning over deontic specifications , 1991, J. Log. Comput..
[28] Douglas Black,et al. Autonomy and Trust in Bioethics , 2002 .
[29] Fay Cobb Payton,et al. Privacy of medical records: IT implications of HIPAA , 2000, CSOC.
[30] J. Rubenfeld. The Right of Privacy , 1989 .
[31] Colin Potts,et al. Using schematic scenarios to understand user needs , 1995, Symposium on Designing Interactive Systems.
[32] Frédéric Cuppens. An Epistemic and Deontic Logic for Reasoning about Computer Security , 1990, ESORICS.
[33] Colin Potts,et al. Software-engineering research revisited , 1993, IEEE Software.
[34] Julia K. Brande. Computer Network Routing with a Fuzzy Neural Network , 1997 .
[35] M. Wooldridge,et al. Agent-Based Computing , 2019, CIRP Encyclopedia of Production Engineering.
[36] P. Kollock. SOCIAL DILEMMAS: The Anatomy of Cooperation , 1998 .
[37] Shelly Farnham,et al. Finding others online: reputation systems for social online spaces , 2002, CHI.
[38] T. S. E. Maibaum,et al. Towards electronic contract performance , 2001, 12th International Workshop on Database and Expert Systems Applications.
[39] Ana I. Anton,et al. Goal identification and refinement in the specification of software-based information systems , 1997 .
[40] René Wies,et al. Policies in network and systems management—Formal definition and architecture , 1994, Journal of Network and Systems Management.
[41] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[42] José Meseguer,et al. Universal Realization, Persistent Interconnection and Implementation of Abstract Modules , 1982, ICALP.
[43] Annie I. Antón,et al. Functional paleontology: system evolution as the user sees it , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[44] Anthony Finkelstein,et al. Structured common sense: the elicitation and formalisation of system requirements , 1986 .
[45] Colin Potts,et al. Naturalistic inquiry and requirements engineering: reconciling their theoretical foundations , 1997, Proceedings of ISRE '97: 3rd IEEE International Symposium on Requirements Engineering.
[46] Colin Potts,et al. ScenIC: a strategy for inquiry-driven requirements determination , 1999, Proceedings IEEE International Symposium on Requirements Engineering (Cat. No.PR00188).
[47] Anthony Finkelstein,et al. Building formal specifications using structured common sense , 1987 .
[48] Z Hudson,et al. Privacy: report on the privacy policies and practices of health web sites. , 2000, Professional ethics report : newsletter of the American Association for the Advancement of Science, Committee on Scientific Freedom & Responsibility, Professional Society Ethics Group.
[49] Julia Brande Earp,et al. Innovative web use to learn about consumer behavior and online privacy , 2003, CACM.
[50] Annie I. Antón,et al. The use of goals to surface requirements for evolving systems , 1998, Proceedings of the 20th International Conference on Software Engineering.
[51] Colin Potts,et al. Requirements models in context , 1997, Proceedings of ISRE '97: 3rd IEEE International Symposium on Requirements Engineering.