Requirements elicitation, analysis, and, above all, early detection of conflicts and resolution, are among the most important, strategic, complex and crucial activities for preventing software system failures, and reducing costs related to reengineering/fixing actions. This is especially important when critical Requirements Classes are involved, such as Privacy and Security Requirements. Recently, organisations have been heavily fined for lack of compliance with data protection regulations, such as the EU General Data Protection Regulation (GDPR). GDPR requires organisations to enforce privacy-by-design activities from the early stages and for the entire software engineering cycle. Accordingly, requirements engineers need methods and tools ...
ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, R...
This study analyses two state-of-the-art methodologies for eliciting privacy threats in software con...
Personal data have become a central asset for multiple enterprise applications and online services o...
Privacy and security requirements, and their potential conflicts, are increasingly having more and m...
requirement engineering live in a world were contradiction is the norm. Hence, development of softwa...
Privacy is a software quality that is closely related to security. The main difference is that secur...
IEEE 26th International Requirements Engineering Conference (RE), Banff, Canada, 20-24 August 2018Th...
We propose and apply a requirements engineering approach that focuses on security and privacy proper...
Privacy is recognized as a fundamental human right in the European Union, giving the right to a priv...
[Context and motivation] The increasing demand of software systems to process and manage sensitive i...
As observed by the European Union, rapid technological development and globalization have brought pr...
We identify 74 generic, reusable technical requirements based on the GDPR that can be applied to sof...
The General Data Protection Regulation requires, inter alia, the establishment of technical and orga...
Purpose– General data protection regulation (GDPR) entered into force in May 2018 for enhancing pers...
In this position paper we posit that, for Privacy by Design to be viable, engineers must be effectiv...
ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, R...
This study analyses two state-of-the-art methodologies for eliciting privacy threats in software con...
Personal data have become a central asset for multiple enterprise applications and online services o...
Privacy and security requirements, and their potential conflicts, are increasingly having more and m...
requirement engineering live in a world were contradiction is the norm. Hence, development of softwa...
Privacy is a software quality that is closely related to security. The main difference is that secur...
IEEE 26th International Requirements Engineering Conference (RE), Banff, Canada, 20-24 August 2018Th...
We propose and apply a requirements engineering approach that focuses on security and privacy proper...
Privacy is recognized as a fundamental human right in the European Union, giving the right to a priv...
[Context and motivation] The increasing demand of software systems to process and manage sensitive i...
As observed by the European Union, rapid technological development and globalization have brought pr...
We identify 74 generic, reusable technical requirements based on the GDPR that can be applied to sof...
The General Data Protection Regulation requires, inter alia, the establishment of technical and orga...
Purpose– General data protection regulation (GDPR) entered into force in May 2018 for enhancing pers...
In this position paper we posit that, for Privacy by Design to be viable, engineers must be effectiv...
ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, R...
This study analyses two state-of-the-art methodologies for eliciting privacy threats in software con...
Personal data have become a central asset for multiple enterprise applications and online services o...