4.2 Article

RSL-IL4Privacy: a domain-specific language for the rigorous specification of privacy policies

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Proceedings Paper Computer Science, Interdisciplinary Applications

Towards an Ontology for Privacy Requirements via a Systematic Literature Review

Mohamad Gharib et al.

CONCEPTUAL MODELING, ER 2017 (2017)

Article Engineering, Electrical & Electronic

Privacy Policy Analysis of Popular Web Platforms

Sherali Zeadally et al.

IEEE TECHNOLOGY AND SOCIETY MAGAZINE (2016)

Proceedings Paper Computer Science, Information Systems

Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home

Jason R. C. Nurse et al.

HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST (2016)

Proceedings Paper Computer Science, Information Systems

Improving the Specification and Analysis of Privacy Policies The RSLingo4Privacy Approach

Alberto Rodrigues da Silva et al.

PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 1 (ICEIS) (2016)

Article Computer Science, Artificial Intelligence

Modelling and reasoning about security requirements in socio-technical systems

Elda Paja et al.

DATA & KNOWLEDGE ENGINEERING (2015)

Article Computer Science, Information Systems

Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements

Travis D. Breaux et al.

REQUIREMENTS ENGINEERING (2014)

Article Computer Science, Software Engineering

A model-integrated authoring environment for privacy policies

Andras Nadas et al.

SCIENCE OF COMPUTER PROGRAMMING (2014)

Article Computer Science, Hardware & Architecture

A survey on policy languages in network and security management

Weili Han et al.

COMPUTER NETWORKS (2012)

Article Computer Science, Information Systems

Commitment analysis to operationalize software requirements from privacy policies

Jessica D. Young

REQUIREMENTS ENGINEERING (2011)

Article Computer Science, Information Systems

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

Mina Deng et al.

REQUIREMENTS ENGINEERING (2011)

Proceedings Paper Computer Science, Information Systems

Verified Security for Browser Extensions

Arjun Guha et al.

2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011) (2011)

Article Computer Science, Information Systems

Evaluating existing security and privacy requirements for legal compliance

Aaron K. Massey et al.

REQUIREMENTS ENGINEERING (2010)

Article Computer Science, Software Engineering

Analyzing regulatory rules for privacy and security requirements

Travis D. Breaux et al.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2008)

Article Computer Science, Information Systems

Addressing privacy requirements in system design: the PriS method

Christos Kalloniatis et al.

REQUIREMENTS ENGINEERING (2008)

Article Computer Science, Hardware & Architecture

A roadmap for COMPREHENSIVE online privacy policy management

Annie I. Anton et al.

COMMUNICATIONS OF THE ACM (2007)

Article Computer Science, Artificial Intelligence

Secure tropos: A security-oriented extension of the tropos methodology

Haralambos Mouratidis et al.

INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING (2007)

Article Law

A taxonomy of privacy

DJ Solove

UNIVERSITY OF PENNSYLVANIA LAW REVIEW (2006)

Article Computer Science, Software Engineering

Reasoning about inconsistencies in natural language requirements

V Gervasi et al.

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY (2005)