A Survey of Methodologies for Protecting Privacy of User Data Within Enterprise Information Infrastructure

[1]  Peter Schaar,et al.  Privacy by Design , 2010 .

[2]  David Wright Making Privacy Impact Assessment More Effective , 2013, Inf. Soc..

[3]  Koen Decroix,et al.  A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services , 2013, ICISS.

[4]  Alberto Del Bimbo,et al.  A Visual Formalism for Computational Tree Logic , 1999, J. Vis. Lang. Comput..

[5]  Silvio Ranise,et al.  Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems , 2017, SACMAT.

[6]  Sushil Jajodia,et al.  Flexible support for multiple access control policies , 2001, TODS.

[7]  Sadie Creese,et al.  Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements , 2010, PrimeLife.

[8]  Jinwoo Jung,et al.  A Study on Developing Framework for Information Privacy Protection , 2015, ICEC '15.

[9]  Annie I. Antón,et al.  Analyzing Regulatory Rules for Privacy and Security Requirements , 2008, IEEE Transactions on Software Engineering.

[10]  Daniel Elenius,et al.  Protecting Privacy with a Declarative Policy Framework , 2018, 2018 IEEE 12th International Conference on Semantic Computing (ICSC).

[11]  Slim Trabelsi,et al.  Data disclosure risk evaluation , 2009, 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009).

[12]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[13]  Eerke A. Boiten,et al.  Privacy Risk Assessment: From Art to Science, By Metrics , 2018, DPM/CBT@ESORICS.

[14]  Frank Wang,et al.  Declarative privacy policy: finite models and attribute-based encryption , 2012, IHI '12.

[15]  John C. Mitchell,et al.  Privacy and Utility in Business Processes , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).

[16]  T. Grance,et al.  SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) , 2010 .

[17]  Lin Liu,et al.  Towards a personalized privacy management framework , 2010, SESS '10.

[18]  Anne Marsden,et al.  International Organization for Standardization , 2014 .

[19]  Raymond Heatherly,et al.  Process-Driven Data Privacy , 2015, CIKM.

[20]  Yannis Charalabidis,et al.  An assessment of privacy preservation in crowdsourcing approaches: Towards GDPR compliance , 2018, 2018 12th International Conference on Research Challenges in Information Science (RCIS).

[21]  Günter Karjoth,et al.  A privacy policy model for enterprises , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[22]  Sarah Spiekermann,et al.  Privacy-by-Design through Systematic Privacy Impact Assessment - a Design Science Approach , 2012, ECIS.

[23]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[24]  Siani Pearson,et al.  A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises , 2006, TrustBus.

[25]  Andreas Speck,et al.  Integrated privacy modeling and validation for business process models , 2012, EDBT-ICDT '12.

[26]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[27]  Dilsun Kirli Kaynar,et al.  Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms , 2011, ICISS.

[28]  Andrew C. Simpson,et al.  Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment , 2018, TrustBus.

[29]  Andreas Pfitzmann,et al.  Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[30]  Jaap-Henk Hoepman,et al.  A Critical Analysis of Privacy Design Strategies , 2016, 2016 IEEE Security and Privacy Workshops (SPW).

[31]  Jaap-Henk Hoepman,et al.  PDF hosted at the Radboud Repository of the Radboud University Nijmegen , 2022 .

[32]  Seda F. Gürses Can you engineer privacy? , 2014, CACM.

[33]  Bashar Nuseibeh,et al.  Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms , 2016, IOT.

[34]  José F. Ruiz,et al.  A Holistic Approach for Privacy Protection in E-Government , 2017, ARES.

[35]  Jan Jürjens,et al.  Model-Based Privacy Analysis in Industrial Ecosystems , 2017, ECMFA.

[36]  Riccardo Scandariato,et al.  A Privacy-Aware Conceptual Model for Handling Personal Data , 2016, ISoLA.

[37]  Annie I. Antón,et al.  A Method for Identifying Software Requirements Based on Policy Commitments , 2010, 2010 18th IEEE International Requirements Engineering Conference.

[38]  Luigi Logrippo,et al.  Governance Requirements Extraction Model for Legal Compliance Validation , 2009, 2009 Second International Workshop on Requirements Engineering and Law.

[39]  Stefanos Gritzalis,et al.  Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.

[40]  Sourya Joyee De,et al.  PRIAM: A Privacy Risk Analysis Methodology , 2016, DPM/QASA@ESORICS.

[41]  Andrew C. Simpson,et al.  A model-based approach to support privacy compliance , 2018, Inf. Comput. Secur..

[42]  Wouter Joosen,et al.  A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.

[43]  David M. Eyers,et al.  Data provenance to audit compliance with privacy policy in the Internet of Things , 2017, Personal and Ubiquitous Computing.