相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Towards an Ontology for Privacy Requirements via a Systematic Literature Review
Mohamad Gharib et al.
CONCEPTUAL MODELING, ER 2017 (2017)
Privacy Policy Analysis of Popular Web Platforms
Sherali Zeadally et al.
IEEE TECHNOLOGY AND SOCIETY MAGAZINE (2016)
Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home
Jason R. C. Nurse et al.
HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST (2016)
Improving the Specification and Analysis of Privacy Policies The RSLingo4Privacy Approach
Alberto Rodrigues da Silva et al.
PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 1 (ICEIS) (2016)
Modelling and reasoning about security requirements in socio-technical systems
Elda Paja et al.
DATA & KNOWLEDGE ENGINEERING (2015)
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements
Travis D. Breaux et al.
REQUIREMENTS ENGINEERING (2014)
A model-integrated authoring environment for privacy policies
Andras Nadas et al.
SCIENCE OF COMPUTER PROGRAMMING (2014)
A survey on policy languages in network and security management
Weili Han et al.
COMPUTER NETWORKS (2012)
Commitment analysis to operationalize software requirements from privacy policies
Jessica D. Young
REQUIREMENTS ENGINEERING (2011)
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
Mina Deng et al.
REQUIREMENTS ENGINEERING (2011)
Verified Security for Browser Extensions
Arjun Guha et al.
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011) (2011)
Evaluating existing security and privacy requirements for legal compliance
Aaron K. Massey et al.
REQUIREMENTS ENGINEERING (2010)
Analyzing regulatory rules for privacy and security requirements
Travis D. Breaux et al.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2008)
Addressing privacy requirements in system design: the PriS method
Christos Kalloniatis et al.
REQUIREMENTS ENGINEERING (2008)
A roadmap for COMPREHENSIVE online privacy policy management
Annie I. Anton et al.
COMMUNICATIONS OF THE ACM (2007)
Secure tropos: A security-oriented extension of the tropos methodology
Haralambos Mouratidis et al.
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING (2007)
Reasoning about inconsistencies in natural language requirements
V Gervasi et al.
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY (2005)