A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements (English)
- New search for: Deng, Mina
- New search for: Wuyts, Kim
- New search for: Scandariato, Riccardo
- New search for: Preneel, Bart
- New search for: Joosen, Wouter
- New search for: Deng, Mina
- New search for: Wuyts, Kim
- New search for: Scandariato, Riccardo
- New search for: Preneel, Bart
- New search for: Joosen, Wouter
In:
Requirements Engineering
;
16
, 1
;
3-32
;
2010
- Article (Journal) / Electronic Resource
-
Title:A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
-
Contributors:Deng, Mina ( author ) / Wuyts, Kim ( author ) / Scandariato, Riccardo ( author ) / Preneel, Bart ( author ) / Joosen, Wouter ( author )
-
Published in:Requirements Engineering ; 16, 1 ; 3-32
-
Publisher:
- New search for: Springer-Verlag
-
Place of publication:London
-
Publication date:2010-11-16
-
Size:30 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 16, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Digital privacy: theory, policies and technologiesAnton, Annie I. / Breaux, Travis D. / Gritzalis, Stefanos / Mylopoulos, John et al. | 2011
- 3
-
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirementsDeng, Mina / Wuyts, Kim / Scandariato, Riccardo / Preneel, Bart / Joosen, Wouter et al. | 2010
- 33
-
Commitment analysis to operationalize software requirements from privacy policiesYoung, Jessica D. et al. | 2010
- 47
-
The “Panopticon” of search engines: the response of the European data protection frameworkKosta, Eleni / Kalloniatis, Christos / Mitrou, Lilian / Kavakli, Evangelia et al. | 2010
- 55
-
A methodology for security assurance-driven system developmentVivas, José Luis / Agudo, Isaac / López, Javier et al. | 2010