A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
- 16 November 2010
- journal article
- research article
- Published by Springer Nature in Requirements Engineering
- Vol. 16 (1), 3-32
- https://doi.org/10.1007/s00766-010-0115-7
Abstract
No abstract availableKeywords
This publication has 53 references indexed in Scilit:
- A Taxonomy of PrivacyUniversity of Pennsylvania Law Review, 2006
- Personal privacy through understanding and action: five pitfalls for designersPersonal and Ubiquitous Computing, 2004
- Just fast keyingACM Transactions on Information and System Security, 2004
- State-of-the-art in privacy preserving data miningACM SIGMOD Record, 2004
- Misuse cases: use cases with hostile intentIEEE Software, 2003
- Secrets and Lies: Digital Security in a Networked Worldinfo, 2003
- Cryptographic techniques for privacy-preserving data miningACM SIGKDD Explorations Newsletter, 2002
- Private information retrievalJournal of the ACM, 1998
- CrowdsACM Transactions on Information and System Security, 1998
- Representing and using nonfunctional requirements: a process-oriented approachIEEE Transactions on Software Engineering, 1992