2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf 2022
DOI: 10.1109/dasc/picom/cbdcom/cy55231.2022.9927958
|View full text |Cite
|
Sign up to set email alerts
|

Towards privacy-aware software design in small and medium enterprises

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…In step (4), if a panel validation statement has been issued, the individual qualitative evaluations about the model are used to discuss minor non-structural corrections on influences or probabilities and converge to the final values; otherwise, the process goes consequently back to step (1) or to step (2), depending on the nature of the disagreement (fundamental or local).…”
Section: Modeling and Analysis Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…In step (4), if a panel validation statement has been issued, the individual qualitative evaluations about the model are used to discuss minor non-structural corrections on influences or probabilities and converge to the final values; otherwise, the process goes consequently back to step (1) or to step (2), depending on the nature of the disagreement (fundamental or local).…”
Section: Modeling and Analysis Approachmentioning
confidence: 99%
“…In our previous work, we approached this problem in search for possible explanations in [1], and we proposed a preliminary analysis method and mitigation approach in [2]; we also considered the impact of privacy-by-design and privacy-by-default mandatory approaches requested by GDPR and a possible integration in software development cycles in [3]. In this paper, we propose an approach for defining, detailing and analyzing policies aiming at limiting the probability that users behave in a risky way.…”
Section: Introductionmentioning
confidence: 99%
“…In addition to access control and authorization methods, software product line testing should also encompass additional important security and privacy-related testing concerns, including but not limited to data privacy, encryption, and secure communication. By effectively addressing these concerns [48,49], software developers may guarantee security and ensure the privacy of their products.…”
Section: Introductionmentioning
confidence: 99%