A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Privacy and Security in Requirements Engineering: Results from a Systematic Literature Mapping
2019
Workshop em Engenharia de Requisitos
This paper presents the results of a Systematic Literature Mapping, covers the period from 2000 to 2016, whose goal is to understand the current state of approaches concerning privacy and security in RE ...
In this scenario, the literature reports that it is necessary to address privacy and security from the Requirements Engineering (RE) phase. ...
Conclusions This paper, in particular, presented the results of a Systematic Literature Mapping whose goal is to understand the state-of-the-art of Privacy and Security in RE. ...
dblp:conf/wer/NettoPS19
fatcat:mzvt45cnyjcjrhgqb3eeg5ah7q
Designing Security and Privacy Requirements in Internet of Things: A Survey
[article]
2019
arXiv
pre-print
Due to above complexities, more often non-functional requirements (such as security and privacy) tend to get ignored in IoT application development process. ...
In this paper, we have reviewed techniques, methods and tools that are being developed to support incorporating security and privacy requirements into traditional application designs. ...
The following section presents a systematic literature review that investigates the available nonfunctional requirements (security and privacy) notations and produces a comprehensive analysis for each ...
arXiv:1910.09911v1
fatcat:77tyqetnbfhynnhkrxjezwxq6a
Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign
[article]
2020
arXiv
pre-print
Academic privacy engineering literature typically abstracts away such conditions of software production in order to achieve generalizable results. ...
Yet, through a systematic study of the literature, we show that proposed solutions inevitably make assumptions about software architectures, development methods and scope of designer control that are misaligned ...
We consider the following aspects: • Systematization: The paper reviews a (part of) the literature and provides an organization/comparison/systematization (e.g., a taxonomy, a hierarchy, a mapping to the ...
arXiv:2007.08613v1
fatcat:2tqaxp3uhfhmrngqkmoysmrkm4
Guidelines for Systematic Mapping Studies in Security Engineering
[article]
2018
arXiv
pre-print
This chapter provides methodological support for systematic mapping studies in security engineering based on examples from published security engineering papers. ...
A systematic mapping study "maps" a research area by classifying papers to identify which topics are well-studied and which need additional study. ...
Summary This chapter provides guidelines for SMSs in security engineering based upon specific examples drawn from published security engineering SMSs. ...
arXiv:1801.06810v1
fatcat:indjuhux7rhtjipnrj7dpagmra
Automation Potentials in Privacy Engineering
2020
Open Identity Summit
Based on a privacy engineering reference process, this paper systematically investigates automation potential in privacy engineering. ...
In particular, it discusses potentials and implications of automation in privacy engineering and illustrates directions for future research. ...
In order to discuss privacy engineering in a systematic manner, I first present and discuss a privacy engineering reference process in Section 2. ...
doi:10.18420/ois2020_10
dblp:conf/openidentity/Zimmermann20
fatcat:jc3h2lbzpve3njvyvcjezt7cc4
Engineering Privacy Revisited
2012
Journal of Computer Science
Problem statement: Information Privacy Engineering (IPE) is the field that studies the protection of privacy in information and communication systems. ...
The theoretical, technological and applications aspects of IPE require a framework that provides a general view and a systematic structure for the discipline's topics. ...
Notice as a map: As a "methodology for systematically engineering privacy friendliness," Spiekermann and Cranor (2009) introduce the "notice and choice" approach based on the principles of Fair Information ...
doi:10.3844/jcssp.2012.107.120
fatcat:rqszo6c555g5fn7horljsxbehu
Reusable knowledge in security requirements engineering: a systematic mapping study
2015
Requirements Engineering
The aim of this paper is to fill this gap by looking into drawing a picture of the literature on knowledge and reuse in security requirements engineering. ...
, and tools related to security knowledge reuse in security requirements engineering. ...
Mapping studies must be distinguished from systematic literature reviews in several ways. ...
doi:10.1007/s00766-015-0220-8
fatcat:5udeoele2vgtlgt32klw3jvo6q
A Systematic Mapping Study on Privacy by Design in Software Engineering
2019
CLEI Electronic Journal
A systematic mapping study was conducted in order to identify relevant literature that collects PbD principles and goals in software development as well as methods and/or practices that support privacy ...
Protecting personal data in current software systems is a complex issue that requires legal regulations and constraints to manage personal data as well as a methodological support to develop software systems ...
In this paper, the term systematic review refers to both a systematic literature review [26] and a systematic mapping study [27] . ...
doi:10.19153/cleiej.22.1.4
fatcat:yimqeklypfegbnkqt4ujjmkywy
Ontologies for Privacy Requirements Engineering: A Systematic Literature Review
[article]
2016
arXiv
pre-print
In this paper, we address this problem with a systematic literature review whose main purpose is to identify the main concepts/relations for capturing privacy requirements. ...
In addition, the identified concepts/relations are further analyzed to propose a novel privacy ontology to be used by software engineers when dealing with privacy requirements. ...
While Mellado et al. [172] carried out a systematic review of the existing literature concerning security requirements engineering in order to summarize the current contributions and to provide a road ...
arXiv:1611.10097v1
fatcat:s2ibbxujorcrffbrtqdq6ibgze
Privacy Engineering and Quality Assurance
[chapter]
2014
The Privacy Engineer's Manifesto
Reliability and security issues can result in a failure of the • software to protect Pi, which in turn becomes a privacy issue. ...
prIVaCY eNGINeerING reQUIreS BOth QUaLItY aND SeCUre CODe (part 1) By James Ransome, Phd, CissP, CisM, senior director, Product security at McAfee
Quality and Secure Code Privacy engineering requires ...
doi:10.1007/978-1-4302-6356-2_10
fatcat:tw4zvoihpjgqdn3pprsz756y4e
Mobile App Privacy in Software Engineering Research: A Systematic Mapping Study
[article]
2019
arXiv
pre-print
In this survey paper, we conduct a systematic mapping study of 54 Software Engineering (SE) primary studies on mobile app privacy. ...
Our results show that existing literature can be divided into four main categories: privacy policy, requirements, user perspective, and leak detection. ...
CONCLUSIONS We conducted a systematic mapping study of Software Engineering literature on mobile apps privacy. ...
arXiv:1910.03622v1
fatcat:tbs4ogqqcjhyhdgylmdymttozu
Social Engineering Attacks Prevention: A Systematic Literature Review
2022
IEEE Access
We conducted a systematic literature review based on Bryman & Bell's literature review method. ...
We present this systematic literature review to recommend ways to prevent social engineering attacks. ...
This result was done by appraising sixteen factors to determine social networks' security and privacy [13] . ...
doi:10.1109/access.2022.3162594
fatcat:y2t4jlbfprfyzfjdfro5r2wyt4
Towards a Principled Approach for Engineering Privacy by Design
[chapter]
2017
Lecture Notes in Computer Science
In this report, we analyse three privacy requirements engineering methods from which we derived a set of criteria that meet these challenges. ...
Challenges involved in engineering Privacy by Design include a lack of holistic, systematic and integrative methodologies that address the complexity and variability of privacy, and support the translation ...
In privacy literature, Hansen et al. ...
doi:10.1007/978-3-319-67280-9_9
fatcat:udbt5doysrgnzb7obxrd2rmm3m
ReqPriSec: Security and Privacy aware Web-based Versatile Requirement Engineering Tool
2019
International Journal of Computer Applications
The security and privacy requirements have not given much attention in RE. ...
There is a strong need of versatile and security-privacy aware RE tool to elicit, manage and specify requirement efficiently and in standardized format. ...
Specification in systematic manner. ...
doi:10.5120/ijca2019919071
fatcat:pes2xv6m3zfabobm3a5eqpizfm
Engineering privacy requirements valuable lessons from another realm
2014
2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)
a solid reference detailing which specific, technical requirements they must abide by, and a systematic methodology to follow. ...
The Privacy by Design approach to systems engineering introduces privacy requirements in the early stages of development, instead of patching up a built system afterwards. ...
privacy requirements engineering. ...
doi:10.1109/espre.2014.6890523
dblp:conf/re/MartinAY14
fatcat:u74qxcbckzh3vg7lhavrwf7adq
« Previous
Showing results 1 — 15 out of 22,355 results