A Survey of Methodologies for Protecting Privacy of User Data Within Enterprise Information Infrastructure
暂无分享,去创建一个
[1] Peter Schaar,et al. Privacy by Design , 2010 .
[2] David Wright. Making Privacy Impact Assessment More Effective , 2013, Inf. Soc..
[3] Koen Decroix,et al. A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services , 2013, ICISS.
[4] Alberto Del Bimbo,et al. A Visual Formalism for Computational Tree Logic , 1999, J. Vis. Lang. Comput..
[5] Silvio Ranise,et al. Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems , 2017, SACMAT.
[6] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[7] Sadie Creese,et al. Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements , 2010, PrimeLife.
[8] Jinwoo Jung,et al. A Study on Developing Framework for Information Privacy Protection , 2015, ICEC '15.
[9] Annie I. Antón,et al. Analyzing Regulatory Rules for Privacy and Security Requirements , 2008, IEEE Transactions on Software Engineering.
[10] Daniel Elenius,et al. Protecting Privacy with a Declarative Policy Framework , 2018, 2018 IEEE 12th International Conference on Semantic Computing (ICSC).
[11] Slim Trabelsi,et al. Data disclosure risk evaluation , 2009, 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009).
[12] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[13] Eerke A. Boiten,et al. Privacy Risk Assessment: From Art to Science, By Metrics , 2018, DPM/CBT@ESORICS.
[14] Frank Wang,et al. Declarative privacy policy: finite models and attribute-based encryption , 2012, IHI '12.
[15] John C. Mitchell,et al. Privacy and Utility in Business Processes , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[16] T. Grance,et al. SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) , 2010 .
[17] Lin Liu,et al. Towards a personalized privacy management framework , 2010, SESS '10.
[18] Anne Marsden,et al. International Organization for Standardization , 2014 .
[19] Raymond Heatherly,et al. Process-Driven Data Privacy , 2015, CIKM.
[20] Yannis Charalabidis,et al. An assessment of privacy preservation in crowdsourcing approaches: Towards GDPR compliance , 2018, 2018 12th International Conference on Research Challenges in Information Science (RCIS).
[21] Günter Karjoth,et al. A privacy policy model for enterprises , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[22] Sarah Spiekermann,et al. Privacy-by-Design through Systematic Privacy Impact Assessment - a Design Science Approach , 2012, ECIS.
[23] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[24] Siani Pearson,et al. A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises , 2006, TrustBus.
[25] Andreas Speck,et al. Integrated privacy modeling and validation for business process models , 2012, EDBT-ICDT '12.
[26] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[27] Dilsun Kirli Kaynar,et al. Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms , 2011, ICISS.
[28] Andrew C. Simpson,et al. Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment , 2018, TrustBus.
[29] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[30] Jaap-Henk Hoepman,et al. A Critical Analysis of Privacy Design Strategies , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[31] Jaap-Henk Hoepman,et al. PDF hosted at the Radboud Repository of the Radboud University Nijmegen , 2022 .
[32] Seda F. Gürses. Can you engineer privacy? , 2014, CACM.
[33] Bashar Nuseibeh,et al. Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms , 2016, IOT.
[34] José F. Ruiz,et al. A Holistic Approach for Privacy Protection in E-Government , 2017, ARES.
[35] Jan Jürjens,et al. Model-Based Privacy Analysis in Industrial Ecosystems , 2017, ECMFA.
[36] Riccardo Scandariato,et al. A Privacy-Aware Conceptual Model for Handling Personal Data , 2016, ISoLA.
[37] Annie I. Antón,et al. A Method for Identifying Software Requirements Based on Policy Commitments , 2010, 2010 18th IEEE International Requirements Engineering Conference.
[38] Luigi Logrippo,et al. Governance Requirements Extraction Model for Legal Compliance Validation , 2009, 2009 Second International Workshop on Requirements Engineering and Law.
[39] Stefanos Gritzalis,et al. Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.
[40] Sourya Joyee De,et al. PRIAM: A Privacy Risk Analysis Methodology , 2016, DPM/QASA@ESORICS.
[41] Andrew C. Simpson,et al. A model-based approach to support privacy compliance , 2018, Inf. Comput. Secur..
[42] Wouter Joosen,et al. A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.
[43] David M. Eyers,et al. Data provenance to audit compliance with privacy policy in the Internet of Things , 2017, Personal and Ubiquitous Computing.