Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Wuyts, Kim"'
Autor:
Wuyts, Kim, Douglen, Avi
Analyzing privacy threats in software products is an essential part of software development to ensure systems are privacy-respecting; yet it is still a far from trivial activity. While there have been many advancements in the past decade, they tend t
Externí odkaz:
http://arxiv.org/abs/2408.03578
Autor:
Pallas, Frank, Koerner, Katharina, Barberá, Isabel, Hoepman, Jaap-Henk, Jensen, Meiko, Narla, Nandita Rao, Samarin, Nikita, Ulbricht, Max-R., Wagner, Isabel, Wuyts, Kim, Zimmermann, Christian
Publikováno v:
IEEE Security & Privacy, volume 22, issue 2, March-April 2024
Privacy engineering is gaining momentum in industry and academia alike. So far, manifold low-level primitives and higher-level methods and strategies have successfully been established. Still, fostering adoption in real-world information systems call
Externí odkaz:
http://arxiv.org/abs/2404.03442
Publikováno v:
In Computer Law & Security Review: The International Journal of Technology Law and Practice April 2024 52
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Sion, Laurens, Dewitte, Pierre, Van Landuyt, Dimitri, Wuyts, Kim, Valcke, Peggy, Joosen, Wouter
Building software-intensive systems that respect the fundamental rights to privacy and data protection requires explicitly addressing data protection issues at the early development stages. Data Protection by Design (DPbD)—as coined by Article 25(1
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::309c7f5b7af8f540668fcb59cf6bf79e
Publikováno v:
Requirements Engineering. Jun2015, Vol. 20 Issue 2, p163-180. 18p.
Autor:
Deng, Mina1 mina.deng@esat.kuleuven.be, Wuyts, Kim2 kim.wuyts@cs.kuleuven.be, Scandariato, Riccardo2 riccardo.scandariato@cs.kuleuven.be, Preneel, Bart1 bart.preneel@esat.kuleuven.be, Joosen, Wouter2 wouter.joosen@cs.kuleuven.be
Publikováno v:
Requirements Engineering. Mar2011, Vol. 16 Issue 1, p3-32. 30p. 20 Diagrams, 8 Charts.
Autor:
Wuyts, Kim, Joosen, Wouter
Privacy is gaining importance in software systems and software design. We therefore proposed the LINDDUN threat modeling methodology which helps software engineers with limited privacy expertise to introduce privacy early on in the software developme
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1131::2ba05d0fead768a9ae3f13226cf5f2e6
https://lirias.kuleuven.be/handle/123456789/505941
https://lirias.kuleuven.be/handle/123456789/505941
Autor:
Wuyts, Kim
With privacy becoming a key concern in modern society, it is important that privacy measures are strongly incorporated whenever digital data are involved. Unfortunately, privacy is often neglected when engineering software systems and only introduced
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1131::bf7af1b76eaf9f3d7741a82cfac4e006
https://lirias.kuleuven.be/handle/123456789/472921
https://lirias.kuleuven.be/handle/123456789/472921
This document contains the updated version of the LIND(D)UN threat tree catalog, which is part of the LIND(D)UN privacy threat modeling methodology. The improvements are the result of a set of extensive empirical studies. A summary is provided for ea
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1131::02af19cf7569e9f53576d6efdedc93c4
https://lirias.kuleuven.be/handle/123456789/463130
https://lirias.kuleuven.be/handle/123456789/463130