Security and privacy requirements for the internet of things: A survey

N Alhirabi, O Rana, C Perera - ACM Transactions on Internet of Things, 2021 - dl.acm.org
The design and development process for internet of things (IoT) applications is more
complicated than that for desktop, mobile, or web applications. First, IoT applications require …

Privacy laws and privacy by design schemes for the internet of things: A developer's perspective

A Aljeraisy, M Barati, O Rana, C Perera - ACM Computing Surveys (Csur …, 2021 - dl.acm.org
Internet of Things applications have the potential to derive sensitive information about
individuals. Therefore, developers must exercise due diligence to make sure that data are …

Linddun go: A lightweight approach to privacy threat modeling

K Wuyts, L Sion, W Joosen - 2020 IEEE European Symposium …, 2020 - ieeexplore.ieee.org
Realizing privacy-preserving software requires the application of principles such as Privacy
by Design (PbD) which require the consideration of privacy early on in the software …

Systematic analysis of automated threat modelling techniques: Comparison of open-source tools

D Granata, M Rak - Software quality journal, 2024 - Springer
Companies face increasing pressure to protect themselves and their customers from security
threats. Security by design is a proactive approach that builds security into all aspects of a …

On the evaluation of privacy impact assessment and privacy risk assessment methodologies: A systematic literature review

S Wairimu, LH Iwaya, L Fritsch, S Lindskog - IEEE Access, 2024 - ieeexplore.ieee.org
Assessing privacy risks and incorporating privacy measures from the onset requires a
comprehensive understanding of potential impacts on data subjects. Privacy Impact …

[HTML][HTML] A privacy threat model for identity verification based on facial recognition

M Beltrán, M Calvo - Computers & Security, 2023 - Elsevier
The proliferation of different types of photographic and video cameras makes it relatively
simple and non-intrusive to acquire facial fingerprints with sufficient quality to perform …

A survey on threat-modeling techniques: protected objects and classification of threats

A Konev, A Shelupanov, M Kataev, V Ageeva… - Symmetry, 2022 - mdpi.com
Information security is one of the most important attributes of distributed systems that often
operate on unreliable networks. Enabling security features during the development of a …

Threat modeling: from infancy to maturity

K Yskout, T Heyman, D Van Landuyt, L Sion… - Proceedings of the …, 2020 - dl.acm.org
Threat modeling involves the systematic identification and analysis of security threats in the
context of a specific system. This paper starts from an assessment of its current state of …

From utility to capability: A new paradigm to conceptualize and develop inclusive pets

P Das Chowdhury, A Domínguez Hernández… - Proceedings of the …, 2022 - dl.acm.org
The wider adoption of Privacy Enhancing Technologies (PETs) has relied on usability
studies–which focus mainly on an assessment of how a specified group of users interface, in …

Integrating privacy into the electric vehicle charging architecture

D Kern, T Lauser, C Krauß - Proceedings on Privacy Enhancing …, 2022 - petsymposium.org
The Electric Vehicle (EV) charging architecture consists of several actors which
communicate with different protocols. A serious issue is the lack of adequate privacy …