Security and privacy in cloud computing: technical review
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …
to the popularity and success of cloud computing. Cloud computing offers advantages and …
Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners
During the software development process and throughout the software lifecycle,
organizations must guarantee users' privacy by protecting personal data. There are several …
organizations must guarantee users' privacy by protecting personal data. There are several …
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
Ready or not, the digitalization of information has come, and privacy is standing out there,
possibly at stake. Although digital privacy is an identified priority in our society, few …
possibly at stake. Although digital privacy is an identified priority in our society, few …
A quantitative analysis of current security concerns and solutions for cloud computing
Abstract The development of cloud computing services is speeding up the rate in which the
organizations outsource their computational services or sell their idle computational …
organizations outsource their computational services or sell their idle computational …
Secure tropos: a security-oriented extension of the tropos methodology
Although security plays an important role in the development of multiagent systems, a
careful analysis of software development processes shows that the definition of security …
careful analysis of software development processes shows that the definition of security …
[HTML][HTML] Design principles for the General Data Protection Regulation (GDPR): A formal concept analysis and its evaluation
DA Tamburri - Information Systems, 2020 - Elsevier
Data and software are nowadays one and the same: for this very reason, the European
Union (EU) and other governments introduce frameworks for data protection—a key …
Union (EU) and other governments introduce frameworks for data protection—a key …
Security and privacy requirements analysis within a social setting
Security issues for software systems ultimately concern relationships among social actors
stakeholders, system users, potential attackers-and the software acting on their behalf. We …
stakeholders, system users, potential attackers-and the software acting on their behalf. We …
Integrating security and systems engineering: Towards the modelling of secure information systems
Security is a crucial issue for information systems. Traditionally, security is considered after
the definition of the system. However, this approach often leads to problems, which translate …
the definition of the system. However, this approach often leads to problems, which translate …
Empirical evaluation of a privacy-focused threat modeling methodology
Privacy is a key issue in today's society. Software systems handle more and more sensitive
information concerning citizens. It is important that such systems are privacy-friendly by …
information concerning citizens. It is important that such systems are privacy-friendly by …
A review of attacks and security approaches in open multi-agent systems
S Bijani, D Robertson - Artificial Intelligence Review, 2014 - Springer
Open multi-agent systems (MASs) have growing popularity in the Multi-agent Systems
community and are predicted to have many applications in future, as large scale distributed …
community and are predicted to have many applications in future, as large scale distributed …