ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY

被引:0
|
作者
KINGSLAKE, R
机构
来源
INFORMATION PRIVACY | 1979年 / 1卷 / 07期
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:312 / 314
页数:3
相关论文
共 50 条
  • [41] Privacy and Security: Key Requirements for Sustainable IoT Growth
    Assaderaghi, Fari
    Chindalore, Gowri
    Ibrahim, Brima
    de Jong, Hans
    Joye, Marc
    Nassar, Sami
    Steinbauer, Wolfgang
    Wagner, Mathias
    Wille, Thomas
    2017 SYMPOSIUM ON VLSI TECHNOLOGY, 2017, : T8 - T13
  • [42] Requirements Engineering for Security, Privacy and Services in Cloud Environments
    Stefanos Gritzalis
    Lin Liu
    Requirements Engineering, 2013, 18 : 297 - 298
  • [43] Engineering secure software by modelling privacy and security requirements
    Kreeger, MN
    Duncan, I
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 37 - 40
  • [44] REASONABLENESS MEETS REQUIREMENTS: REGULATING SECURITY AND PRIVACY IN SOFTWARE
    Otto, Paul N.
    DUKE LAW JOURNAL, 2009, 59 (02) : 309 - 342
  • [45] Security and privacy requirements analysis within a social setting
    Liu, L
    Yu, EI
    Mylopoulos, J
    11TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, PROCEEDINGS, 2003, : 151 - 161
  • [46] Review of Security and Privacy-Based IoT Smart Home Access Control Devices
    Uppuluri, Sirisha
    Lakshmeeswari, G.
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 137 (03) : 1601 - 1640
  • [47] Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts
    Qashlan, Amjad
    Nanda, Priyadarsi
    He, Xiangian
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 952 - 959
  • [48] Analysis of Access Control Model for Data Security and Privacy on Multi-Tenant SaaS
    Duraisamy, Gunavathi
    Abd Ghani, Abdul Azim
    Zulzalil, Hazura
    Abdullah, Azizol
    ADVANCED SCIENCE LETTERS, 2018, 24 (03) : 1619 - 1622
  • [49] A Framework Managing Conflicts between Security and Privacy Requirements
    Alkubaisy, Duaa
    2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2017, : 427 - 432
  • [50] Evaluating existing security and privacy requirements for legal compliance
    Aaron K. Massey
    Paul N. Otto
    Lauren J. Hayward
    Annie I. Antón
    Requirements Engineering, 2010, 15 : 119 - 137