Privacy policies and practices: inside the organizational maze
Communications of the ACM
Role-Based Access Control Models
Computer
Classification of research efforts in requirements engineering
ACM Computing Surveys (CSUR)
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
An access control model supporting periodicity constraints and temporal reasoning
ACM Transactions on Database Systems (TODS)
The use of goals to surface requirements for evolving systems
Proceedings of the 20th international conference on Software engineering
Requirements engineering: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Certification of programs for secure information flow
Communications of the ACM
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Alloy: a lightweight object modelling notation
ACM Transactions on Software Engineering and Methodology (TOSEM)
A scenario-driven role engineering process for functional RBAC roles
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Legislating Privacy: Technology, Social Values, and Public Policy
Legislating Privacy: Technology, Social Values, and Public Policy
Exploring Alternatives During Requirements Analysis
IEEE Software
A Temporal Access Control Mechanism for Database Systems
IEEE Transactions on Knowledge and Data Engineering
An Extended Authorization Model for Relational Databases
IEEE Transactions on Knowledge and Data Engineering
Security Requirements Engineering: When Anti-Requirements Hit the Fan
RE '02 Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering
Privacy Engineering for Digital Rights Management Systems
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
An XPath-based preference language for P3P
WWW '03 Proceedings of the 12th international conference on World Wide Web
A Privacy Policy Model for Enterprises
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Translating Privacy Practices into Privacy Promises—How to Promise What You Can Keep
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Data Protection Law: Approaching Its Rationale, Logic and Limits
Data Protection Law: Approaching Its Rationale, Logic and Limits
Obligation Monitoring in Policy Management
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Revocation Schemes for Delegated Authorities
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
A rule-based framework for role-based delegation and revocation
ACM Transactions on Information and System Security (TISSEC)
Removing permissions in the flexible authorization framework
ACM Transactions on Database Systems (TODS)
Security and Privacy Requirements Analysis within a Social Setting
RE '03 Proceedings of the 11th IEEE International Conference on Requirements Engineering
Tradeoffs in certificate revocation schemes
ACM SIGCOMM Computer Communication Review
Efficient comparison of enterprise privacy policies
Proceedings of the 2004 ACM symposium on Applied computing
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Using uml to visualize role-based access control constraints
Proceedings of the ninth ACM symposium on Access control models and technologies
A requirements taxonomy for reducing Web site privacy vulnerabilities
Requirements Engineering
MAC and UML for secure software design
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Conflict and combination in privacy policy languages
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Enterprise privacy promises and enforcement
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Purpose based access control of complex data for privacy protection
Proceedings of the tenth ACM symposium on Access control models and technologies
Privacy and identity management for everyone
Proceedings of the 2005 workshop on Digital identity management
A delegation framework for federated identity management
Proceedings of the 2005 workshop on Digital identity management
SWS '04 Proceedings of the 2004 workshop on Secure web service
Model driven security: From UML models to access control infrastructures
ACM Transactions on Software Engineering and Methodology (TOSEM)
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy mechanisms supporting the building of trust in e-commerce
ICDEW '05 Proceedings of the 21st International Conference on Data Engineering Workshops
Protecting privacy and anonymity in pervasive computing: trends and perspectives
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling
RE '06 Proceedings of the 14th IEEE International Requirements Engineering Conference
A comparison of two privacy policy languages: EPAL and XACML
Proceedings of the 3rd ACM workshop on Secure web services
Data Protection and Compliance in Context
Data Protection and Compliance in Context
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Provisions and obligations in policy management and security applications
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
XACML Policy Integration Algorithms
ACM Transactions on Information and System Security (TISSEC)
Platform for enterprise privacy practices: privacy-enabled management of customer data
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Privacy is linking permission to purpose
SP'04 Proceedings of the 12th international conference on Security Protocols
Privacy-Preserving database systems
Foundations of Security Analysis and Design III
Security and trust requirements engineering
Foundations of Security Analysis and Design III
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
A design process based on a model combining scenarios with goals and functions
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Why Eliciting and Managing Legal Requirements Is Hard
RELAW '08 Proceedings of the 2008 Requirements Engineering and Law
Controlling and disclosing your personal information
WSEAS Transactions on Information Science and Applications
Personal information privacy protection in e-commerce
WSEAS Transactions on Information Science and Applications
Controlling your personal information disclosure
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
Personal information and privacy in E-commerce application
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
Relationship Based Privacy Management for Ubiquitous Society
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part I
A threat-based privacy preservation system in untrusted environment
Proceedings of the 2009 International Conference on Hybrid Information Technology
A purpose-based privacy-aware system using privacy data graph
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Identity in the Information Society
Minimal privacy authorization in web services collaboration
Computer Standards & Interfaces
Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms
Expert Systems with Applications: An International Journal
Purpose control: did you process the data for the intended purpose?
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
More than modelling and hiding: towards a comprehensive view of Web mining and privacy
Data Mining and Knowledge Discovery
Personalised Information Retrieval: survey and classification
User Modeling and User-Adapted Interaction
Hi-index | 0.00 |
Privacy and data protection are pivotal issues in nowadays society. They concern the right to prevent the dissemination of sensitive or confidential information of individuals. Many studies have been proposed on this topic from various perspectives, namely sociological, economic, legal, and technological. We have recognized the legal perspective as being the basis of all other perspectives. Actually, data protection regulations set the legal principles and requirements that must be met by organizations when processing personal data. The objective of this work is to provide a reference base for the development of methodologies tailored to design privacy-aware systems to be compliant with data protection regulations.