Sciweavers

415 search results - page 1 / 83
» Using Privacy Process Patterns for Incorporating Privacy Req...
Sort
View
IEEEARES
2007
IEEE
13 years 11 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...
CSE
2009
IEEE
13 years 11 months ago
Privacy Requirements in Vehicular Communication Systems
Abstract—A primary goal of vehicular communication systems is the enhancement of traffic safety by equipping vehicles with wireless communication units to facilitate cooperative...
Florian Schaub, Zhendong Ma, Frank Kargl
WEBI
2005
Springer
13 years 10 months ago
QTIP: Multi-Agent NLP and Privacy Architecture for Information Retrieval in Usable Web Privacy Software
We present a generic natural language processing (NLP) architecture, acronym QTIL, based on a system of cooperating multiple agents (Q/A, T, I, and L agents) which can be used in ...
Vlado Keselj, Dawn N. Jutla
DEXAW
2007
IEEE
111views Database» more  DEXAW 2007»
13 years 11 months ago
A Security Engineering Process based on Patterns
We present a security engineering process based on security problem frames and concretized security problem frames. Both kinds of frames constitute patterns for analyzing security...
Denis Hatebur, Maritta Heisel, Holger Schmidt
WER
2007
Springer
13 years 11 months ago
A Requirements Management Framework for Privacy Compliance
Compliance with privacy legislation is a primary concern for health care institutions that are building information systems support for their business processes. This paper descri...
Sepideh Ghanavati, Daniel Amyot, Liam Peyton