共 50 条
- [2] Towards a Common Security and Privacy Requirements Elicitation Methodology [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 151 - 159
- [4] Mapping 'Security Safeguard' Requirements in a Data Privacy legislation to an International Privacy Framework: A Compliance Methodology [J]. 2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
- [5] Security and privacy requirements in interactive TV [J]. Multimedia Systems, 2011, 17 : 393 - 408
- [6] Visualising privacy and security for requirements engineering [J]. SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
- [7] ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY [J]. INFORMATION PRIVACY, 1979, 1 (07): : 312 - 314
- [8] Security and privacy requirements in interactive TV [J]. MULTIMEDIA SYSTEMS, 2011, 17 (05) : 393 - 408
- [9] A Security, Privacy and Trust Methodology for IIoT [J]. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2021, 28 (03): : 898 - 906
- [10] An Intelligent approach for UAV and Drone Privacy Security Using Blockchain Methodology [J]. 2019 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2019), 2019, : 162 - 167