Search Results - "Privacy requirements engineering"
-
1
Authors: et al.
Source: IEEE Access, Vol 12, Pp 47518-47542 (2024)
Subject Terms: 102022 Softwareentwicklung, privacy design engineering, Requirements engineering, Reviews, 102016 IT-Sicherheit, 102022 Software development, Bibliographies, TK1-9971, Privacy, Systematics, Task analysis, privacy by design, Electrical engineering. Electronics. Nuclear engineering, Privacy requirements engineering, 102016 IT security, Software, privacy engineering
File Description: application/pdf
Access URL: https://doaj.org/article/249f0ba655e84643ae5ae8880b79cc44
https://ucrisportal.univie.ac.at/de/publications/b8eb0dc0-885f-49aa-a8b3-43ac9f03927a
https://doi.org/10.1109/ACCESS.2024.3380888
https://phaidra.univie.ac.at/o:2085377
https://hdl.handle.net/11353/10.2085377
https://doi.org/10.1109/access.2024.3380888 -
2
Authors:
Source: IEEE Access, Vol 12, Pp 22167-22189 (2024)
Subject Terms: 102022 Softwareentwicklung, User experience, Natural language processing, 05 social sciences, Software development management, Requirements engineering, 02 engineering and technology, 102016 IT-Sicherheit, 102022 Software development, user stories, TK1-9971, Planning, agile software development, Privacy, 0502 economics and business, 0202 electrical engineering, electronic engineering, information engineering, Manuals, Electrical engineering. Electronics. Nuclear engineering, Privacy requirements engineering, natural language processing, Agile software development, 102016 IT security, Data protection
File Description: application/pdf
-
3
Authors:
Source: 2021 IEEE 29th International Requirements Engineering Conference Workshops (REW). :406-411
Subject Terms: agile development, privacy requirements engineering, named entity recognition, 0202 electrical engineering, electronic engineering, information engineering, 102015 Information systems, 02 engineering and technology, 102016 IT-Sicherheit, 102015 Informationssysteme, 102016 IT security, user stories
-
4
Authors: et al.
Contributors: et al.
Source: Data Privacy Management, Cryptocurrencies and Blockchain Technology. DPM 2020, CBT 2020. ; https://cea.hal.science/cea-03264121 ; Data Privacy Management, Cryptocurrencies and Blockchain Technology. DPM 2020, CBT 2020., pp.161-177, 2020, 978-3-030-66172-4. ⟨10.1007/978-3-030-66172-4_10⟩
Subject Terms: GDPR, privacy requirements engineering, data protection, [INFO.INFO-IA]Computer Science [cs]/Computer Aided Engineering, [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE], [INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation
Relation: info:eu-repo/grantAgreement//787034/EU/Methods and tools for GDPR compliance through Privacy and Data Protection Engineering Programme: H2020-EU.3.7.6./PDP4E
-
5
Authors: et al.
Source: Information and Software Technology. 157:107162
Subject Terms: FOS: Computer and information sciences, Privacy compliance, APEC, Software issues, 02 engineering and technology, Privacy taxonomy, Thailand PDPA, Software Engineering (cs.SE), ISO/IEC 29100, Computer Science - Software Engineering, 0202 electrical engineering, electronic engineering, information engineering, GDPR, Privacy requirements engineering, Mining software repositories, Data protection regulations and privacy frameworks
Access URL: http://arxiv.org/abs/2101.01298
-
6
-
7
Authors:
Source: Diamantopoulou, V & Mouratidis, H 2019, 'Practical evaluation of a reference architecture for the management of privacy level agreements', Information and Computer Security, vol. 26, no. 5, pp. 711-730. https://doi.org/10.1108/ICS-04-2019-0052
Subject Terms: Practical evaluation, Privacy level agreement, Privacy requirements engineering, Security requirements engineering
File Description: application/pdf
Relation: info:eu-repo/semantics/altIdentifier/pissn/2056-4961
-
8
Authors:
Source: Diamantopoulou, V & Mouratidis, H 2018, 'Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology', Information and Computer Security, vol. 26, no. 4, pp. 382-400. https://doi.org/10.1108/ICS-12-2017-0087
Subject Terms: Computer privacy, Evaluation, Information security modelling, Physics of notation, Privacy requirements engineering, Security requirements engineering
File Description: application/pdf
Relation: info:eu-repo/semantics/altIdentifier/pissn/2056-4961
-
9
Authors: et al.
Contributors: et al.
Source: Diamantopoulou, V, Pavlidis, M & Mouratidis, H 2017, Evaluation of a security and privacy requirements methodology using the physics of notation. in J Mylopoulos, C Lambrinoudakis, C Kalloniatis, F Cuppens, N Cuppens, A Anton, S K Katsikas & S Gritzalis (eds), Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10683 LNCS, Springer-Verlag, Oslo, Norway, pp. 210-225, 3rd Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2017, 1st International Workshop on Security ....
Subject Terms: Evaluation, Physics of notation, Privacy requirements engineering, Security requirements engineering
File Description: application/pdf
Relation: info:eu-repo/semantics/altIdentifier/isbn/9783319728162; urn:ISBN:9783319728162
-
10
Authors:
Source: MCIS 2018 Proceedings
Subject Terms: Privacy Level Agreement, Security Requirements Engineering, Privacy Requirements Engineering, Practical Evaluation
File Description: application/pdf
Relation: https://aisel.aisnet.org/mcis2018/28; https://aisel.aisnet.org/context/mcis2018/article/1013/viewcontent/MCIS2018_paper_34.pdf
-
11
Authors:
Contributors:
Source: oai:alma.01CALS_USL:11232474630001671
Subject Terms: Privacy requirements engineering, SQUARE methodology, Security requirements engineering
Relation: http://hdl.handle.net/10211.9/1510
Availability: http://hdl.handle.net/10211.9/1510
Full Text Finder
Nájsť tento článok vo Web of Science