Access the full text.
Sign up today, get DeepDyve free for 14 days.
Charles Haley, J. Moffett, R. Laney, B. Nuseibeh (2006)
A framework for security requirements engineering
Lin Liu, E. Yu, J. Mylopoulos (2002)
Analyzing security requirements as relationships among strategic actors
A. Antón, J. Earp (2000)
Strategies for Developing Policies and Requirements for Secure Electronic Commerce Systems
A. Pfitzmann, M. Waidner (1987)
Networks without user observabilityComput. Secur., 6
S. Warren, Louis Brandeis (1890)
The Right to PrivacyHarvard Law Review, 4
Lin Liu, E. Yu, J. Mylopoulos (2003)
Security and privacy requirements analysis within a social settingProceedings. 11th IEEE International Requirements Engineering Conference, 2003.
A. Lamsweerde, Emmanuel Letier (2000)
Handling Obstacles in Goal-Oriented Requirements EngineeringIEEE Trans. Software Eng., 26
J. Cannon (2004)
Privacy: What Developers and IT Professionals Should Know
D. Chaum (1985)
Security without identification: transaction systems to make big brother obsoleteCommun. ACM, 28
S. Gritzalis (2004)
Enhancing Web privacy and anonymity in the digital eraInf. Manag. Comput. Secur., 12
H. Mouratidis, P. Giorgini, G. Manson (2003)
Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems
Carlos Jensen, J. Tullio, C. Potts, Elizabeth Mynatt (2005)
STRAP: A Structured Analysis Framework for Privacy
L. Chung (1993)
Dealing with Security Requirements During the Development of Information Systems
D. Goldschlag, M. Reed, P. Syverson (1999)
Onion Routing for Anonymous and Private Internet Connections
A. Antón (1996)
Goal-based requirements analysisProceedings of the Second International Conference on Requirements Engineering
D. Chaum (1988)
The dining cryptographers problem: Unconditional sender and recipient untraceabilityJournal of Cryptology, 1
E. Kavakli (2004)
Modeling organizational goals: analysis of current methods
S. Fischer-Hübner (2001)
IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms
M. Reiter, A. Rubin (1998)
Crowds: anonymity for Web transactionsACM Trans. Inf. Syst. Secur., 1
V. Bellotti, A. Sellen (1993)
Design for Privacy in Ubiquitous Computing Environments
G. Michelis, C. Simone, K. Schmidt (1993)
ECSCW '93 : proceedings of the third European Conference on Computer-Supported Cooperative Work, 13-17 September 1993, Milan, Italy
J. Mylopoulos, L. Chung, B. Nixon (1992)
Representing and Using Nonfunctional Requirements: A Process-Oriented ApproachIEEE Trans. Software Eng., 18
C. Kalloniatis, E. Kavakli, S. Gritzalis (2004)
Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks
M. Reed, P. Syverson, D. Goldschlag (1997)
Anonymous connections and onion routingProceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
P. Loucopoulos, V. Kavakli (1997)
Enterprise Knowledge Management and Conceptual Modelling
M. Reiter, A. Rubin (1999)
Anonymous Web transactions with CrowdsCommun. ACM, 42
D. Chaum (1981)
Untraceable electronic mail, return addresses, and digital pseudonyms
C. Shields, B. Levine (2000)
A protocol for anonymous communication over the Internet
D. Goldschlag, M. Reed, P. Syverson (1999)
Onion routingCommun. ACM, 42
P. Loucopoulos, S. Brinkkemper, Eva Lindencrona, A. Sølvberg (2000)
From Information Modelling to Enterprise Modelling
Joseph Jackson, A. Westin (1968)
Privacy and FreedomTechnology and Culture, 9
Jason Hong, Jennifer Ng, Scott Lederer, J. Landay (2004)
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Krista Bennett, Christian Grothoff (2003)
gap - Practical Anonymous Networking
Purpose – To present a new methodology for incorporating privacy requirements into the system design process called PriS, and describe its applicability in the e‐VOTE system for presenting methodology's way‐of‐working. Design/methodology/approach – PriS is a requirement engineering methodology focused on privacy issues. It provides a set of concepts for modelling privacy requirements (anonymity, pseudonymity, unlinkability and unobservability) in the organisation domain and a systematic way‐of‐working for translating these requirements into system models. The conceptual model used in PriS is based on the Enterprise Knowledge Development (EKD) framework. PriS models privacy requirements as a special type of goal. Findings – Based on the analysis of a number of well‐known privacy‐enhancing technologies as well as of existing security requirement engineering methodologies, this paper pinpoints the gap between system design methodologies and technological solutions. To this end, PriS is suggested, with a view to providing a methodological framework for matching privacy‐related requirements with the proper implementation techniques. Originality/value – This paper proposes a new methodology for addressing privacy requirements during the design process. It guides developers to choose the most appropriate implementation techniques for realising the identified privacy issues. PriS methodology has a high degree of applicability on Internet systems that wish to provide services that ensure users privacy, such as anonymous browsing, untraceable transactions, etc.
Internet Research – Emerald Publishing
Published: Mar 1, 2006
Keywords: Privacy; Systems software
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.