共 50 条
- [41] Privacy requirements implemented with a Java']JavaCard 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 479 - 488
- [42] TECHNICAL IMPLICATIONS OF PRIVACY PROTECTION REQUIREMENTS INFORMATION PRIVACY, 1980, 2 (01): : 2 - 6
- [43] Rethinking Privacy Beyond Borders Developing Transnational Rights on Data Privacy TILBURG LAW REVIEW-JOURNAL OF INTERNATIONAL AND COMPARATIVE LAW, 2015, 20 (01): : 78 - 102
- [44] Comparing Privacy Requirements Engineering Approaches 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 574 - 581
- [45] Distilling Privacy Requirements for Mobile Applications 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, : 871 - 882
- [46] Visualising privacy and security for requirements engineering SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
- [47] Privacy requirements in identity management solutions HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INTERACTING IN INFORMATION ENVIRONMENTS, PT 2, PROCEEDINGS, 2007, 4558 : 694 - +
- [49] A Taxonomy of Requirements for the Privacy Goal Transparency TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 195 - 209