Estimating Potential IT Security Losses: An Alternative Quantitative Approach
IEEE Security and Privacy
Formalizing information security knowledge
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
A Personal Data Audit Method through Requirements Engineering
Computer Standards & Interfaces
Towards a personalized privacy management framework
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
Conditional privacy-aware role based access control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Hi-index | 0.00 |
Deployed technology thus illustrates, by example, that we haven't learned how to build systems that we can reasonably trust to work correctly despite adversarial action. Nevertheless, we rush headlong to move even more important processes into computing systems, and to make commodity computing systems more ubiquitous.