A Problem-Based Approach for Computer-Aided Privacy Threat Identification

@inproceedings{Beckers2012APA,
  title={A Problem-Based Approach for Computer-Aided Privacy Threat Identification},
  author={Kristian Beckers and Stephan Fa{\ss}bender and Maritta Heisel and Rene Meis},
  booktitle={APF},
  year={2012}
}
Recently, there has been an increase of reported privacy threats hitting large software systems. These threats can originate from stakeholders that are part of the system. Thus, it is crucial for software engineers to identify these privacy threats, refine these into privacy requirements, and design solutions that mitigate the threats. In this paper, we introduce our methodology named Problem-Based Privacy Analysis ProPAn. The ProPAn method is an approach for identifying privacy threats… CONTINUE READING
BETA

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 22 CITATIONS

Systematic identification of information flows from requirements to support privacy impact assessments

  • 2015 10th International Joint Conference on Software Technologies (ICSOFT)
  • 2015
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Methods and Tools for GDPR Compliance Through Privacy and Data Protection Engineering

  • 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
  • 2018
VIEW 3 EXCERPTS
CITES METHODS

Pattern and Security Requirements

  • Springer International Publishing
  • 2015

References

Publications referenced by this paper.
SHOWING 1-10 OF 13 REFERENCES

UML4PF — A tool for problem-oriented requirements analysis

  • 2011 IEEE 19th International Requirements Engineering Conference
  • 2011
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Problem Frames

M. Jackson
  • Analyzing and structuring software development problems. Addison-Wesley
  • 2001
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

A Method to Derive Software Architectures from Quality Requirements

  • 2011 18th Asia-Pacific Software Engineering Conference
  • 2011
VIEW 1 EXCERPT

Computer Aided Threat Identification

  • 2011 IEEE 13th Conference on Commerce and Enterprise Computing
  • 2011
VIEW 1 EXCERPT