• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,197
Next 10 →

A Framework for Modeling Privacy Requirements in Role Engineering

by Qingfeng He, Annie I. Anton, For Healthcare [hip, Gramm Leach, Bliley Act
"... Privacy protection is important in many industries, such as healthcare and finance. Capturing and modeling privacy requirements in the early stages of system development is essential to provide high assurance of privacy protection to both stakeholders and consumers. This paper presents a framework f ..."
Abstract - Cited by 29 (3 self) - Add to MetaCart
Privacy protection is important in many industries, such as healthcare and finance. Capturing and modeling privacy requirements in the early stages of system development is essential to provide high assurance of privacy protection to both stakeholders and consumers. This paper presents a framework

Does privacy require true randomness

by Carl Bosley, Yevgeniy Dodis - In Theory of cryptography , 2007
"... Abstract. Most cryptographic primitives require randomness (for example, to generate their secret keys). Usually, one assumes that perfect randomness is available, but, conceivably, such primitives might be built under weaker, more realistic assumptions. This is known to be true for many authenticat ..."
Abstract - Cited by 10 (2 self) - Add to MetaCart
authentication applications, when entropy alone is typically sufficient. In contrast, all known techniques for achieving privacy seem to fundamentally require (nearly) perfect randomness. We ask the question whether this is just a coincidence, or, perhaps, privacy inherently requires true randomness? We

Security and Privacy Requirements Analysis within a Social Setting

by Lin Liu, Eric Yu, John Mylopoulos - In Proc. of RE’03 , 2003
"... Security issues for software systems ultimately concern relationships among social actors-stakeholders, system users, potential attackers- and the software acting on their behalf. This paper proposes a methodological framework for dealing with security and privacy requirements based on i*, an agent- ..."
Abstract - Cited by 139 (19 self) - Add to MetaCart
Security issues for software systems ultimately concern relationships among social actors-stakeholders, system users, potential attackers- and the software acting on their behalf. This paper proposes a methodological framework for dealing with security and privacy requirements based on i*, an agent

Distilling Privacy Requirements for Mobile Applications

by How To Cite, Keerthi Thomas, Arosha K. B
"... and other research outputs ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
and other research outputs

Privacy requirements in vehicular communication systems

by Florian Schaub, Zhendong Ma, Florian Schaub, Zhendong Ma, Frank Kargl - in Proc. the 2009 International Conference on Computational Science and Engineering 2009
"... All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.

A Framework for Modeling Privacy Requirements in Role Engineering

by For Healthcare [hip, Gramm Leach, Bliley Act
"... Privacy protection is important in many industries, such as healthcare and finance. Capturing and modeling privacy requirements in the early stages of system development is essential to provide high assurance of privacy protection to both stakeholders and consumers. This paper presents a framework f ..."
Abstract - Add to MetaCart
Privacy protection is important in many industries, such as healthcare and finance. Capturing and modeling privacy requirements in the early stages of system development is essential to provide high assurance of privacy protection to both stakeholders and consumers. This paper presents a framework

A Taxonomy for Web Site Privacy Requirements

by Annie I. Antón, Julia B. Earp , 2001
"... Abstract-- Privacy has recently become a prominent issue in the context of electronic commerce Web sites. Increasingly, privacy policies posted on such Web sites are receiving considerable attention from the government and consumers. In this paper we present a taxonomy for Web site privacy requireme ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
requirements. We have used goal-mining, the extraction of pre-requirements goals from post-requirements text artifacts, as a technique for analyzing privacy policies. The identified goals are useful for analyzing implicit internal conflicts within privacy policies and conflicts with the corresponding web sites

Private Information Retrieval

by Benny Chor, et al.
"... We describe schemes that enable a user to access k replicated copies of a database ( k * 2) and privately retrieve informationstored in the database. This means that each individual database gets no information on the identity of the item retrieved by the user. For a single database, achieving thi ..."
Abstract - Cited by 558 (14 self) - Add to MetaCart
this type of privacy requires communicating the whole database, or n bits (where n is the number of bits in the database). Our schemes use the replication to gain substantial saving. In particular, we have ffl A two database scheme with communication complexity of O(n1=3).ffl

The Impact of Neglecting Domain-Specific Security and Privacy Requirements ∗

by John Wilander, Omegapoint Ab, Jens Gustavsson
"... In a previous field study of eleven software projects including e-business, health care and military applications we documented current practice in security requirements. The overall conclusion of the study was that security requirements are poorly and inconsistently specified. However, two importan ..."
Abstract - Add to MetaCart
of software (in this case IBM, Cap Gemini, and WM-Data) compensate for poor requirements in areas within their expertise, namely software engineering. But in the case of security and privacy requirements specific to the customer domain, such compensation is not found. In all three cases this has led

Satisfying Privacy Requirements Before Data Anonymization

by Xiaoxun Sun, Hua Wang, Jiuyong Li, Yanchun Zhang , 2010
"... In this paper, we study a problem of protecting privacy of individuals in large public survey rating data. We propose a novel (k, , l)-anonymity model to protect privacy in large survey rating data, in which each survey record is required to be similar to at least k − 1 other records based on the no ..."
Abstract - Add to MetaCart
In this paper, we study a problem of protecting privacy of individuals in large public survey rating data. We propose a novel (k, , l)-anonymity model to protect privacy in large survey rating data, in which each survey record is required to be similar to at least k − 1 other records based
Next 10 →
Results 1 - 10 of 5,197
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University