Security and privacy in cloud computing: technical review

YS Abdulsalam, M Hedabou - Future Internet, 2021 - mdpi.com
Advances in the usage of information and communication technologies (ICT) has given rise
to the popularity and success of cloud computing. Cloud computing offers advantages and …

Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners

ED Canedo, IN Bandeira, ATS Calazans… - Requirements …, 2023 - Springer
During the software development process and throughout the software lifecycle,
organizations must guarantee users' privacy by protecting personal data. There are several …

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

M Deng, K Wuyts, R Scandariato, B Preneel… - Requirements …, 2011 - Springer
Ready or not, the digitalization of information has come, and privacy is standing out there,
possibly at stake. Although digital privacy is an identified priority in our society, few …

A quantitative analysis of current security concerns and solutions for cloud computing

N Gonzalez, C Miers, F Redigolo, M Simplicio… - Journal of Cloud …, 2012 - Springer
Abstract The development of cloud computing services is speeding up the rate in which the
organizations outsource their computational services or sell their idle computational …

Secure tropos: a security-oriented extension of the tropos methodology

H Mouratidis, P Giorgini - International Journal of Software …, 2007 - World Scientific
Although security plays an important role in the development of multiagent systems, a
careful analysis of software development processes shows that the definition of security …

[HTML][HTML] Design principles for the General Data Protection Regulation (GDPR): A formal concept analysis and its evaluation

DA Tamburri - Information Systems, 2020 - Elsevier
Data and software are nowadays one and the same: for this very reason, the European
Union (EU) and other governments introduce frameworks for data protection—a key …

Security and privacy requirements analysis within a social setting

L Liu, E Yu, J Mylopoulos - Proceedings. 11th IEEE …, 2003 - ieeexplore.ieee.org
Security issues for software systems ultimately concern relationships among social actors
stakeholders, system users, potential attackers-and the software acting on their behalf. We …

Integrating security and systems engineering: Towards the modelling of secure information systems

H Mouratidis, P Giorgini, G Manson - … /Velden, Austria, June 16–20, 2003 …, 2003 - Springer
Security is a crucial issue for information systems. Traditionally, security is considered after
the definition of the system. However, this approach often leads to problems, which translate …

Empirical evaluation of a privacy-focused threat modeling methodology

K Wuyts, R Scandariato, W Joosen - Journal of Systems and Software, 2014 - Elsevier
Privacy is a key issue in today's society. Software systems handle more and more sensitive
information concerning citizens. It is important that such systems are privacy-friendly by …

A review of attacks and security approaches in open multi-agent systems

S Bijani, D Robertson - Artificial Intelligence Review, 2014 - Springer
Open multi-agent systems (MASs) have growing popularity in the Multi-agent Systems
community and are predicted to have many applications in future, as large scale distributed …