Privacy Enhancing Technology Selection based on Inagaki‟s Unified Rule of Combination
Abstract
Keywords
Full Text:
PDFReferences
Anton A.I Goal Based Requirement Analysis, IEEE Conference Publications. Proceedings of the 2nd IEEE international conference on requirements engineering (ICRE‟96).
Christos Kalloniatis, Petros Belsis , Stefanos Gritzalis, A soft computing approach for privacy requirements engineering: The PriS framework. Applied Soft Computing. Volume 11, Issue 7, October 2011, Pages 4341–4348.
Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis, Addressing privacy requirements in system design: the PriS Method. pp. 133–153.
Christos Kalloniatis , Evangelia Kavakli, Stefanos Gritzalis, Methods for Designing Privacy Aware Information Systems: A Review, IEEE CPS Conference Publishing Services, Proceedings of the PCI 2009 13th Pan-Hellenic Conference on Informatics, Page(s): 185 - 194 .
C. Kalloniatis, E. Kavakli, E. Kontellis, PriS Tool: A Case Tool for Privacy Oriented Requirement Engineering, Journal of Information System Security, Vol. 6, No. 1, pp. 3-19, AIS SIGSEC
C. Kalloniatis, E. Kavakli, S. Gritzalis, "PriS Methodology: Incorporating Privacy Requirements into the System Design Process", Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering Conference – Symposium on Requirements Engineering for Information Security, J. Mylopoulos, G. Spafford (Eds.), August 2005, Paris, France, IEEE CPS
Charles B. Haley, Robin Laney, Jonathan D. Moffett, Bashar Nuseibeh, Security rquirements Engineering: A Framework for Representation and Analysis, IEEE Transactions on Software Engineering (2008)
Evangelia Kavakli Goal Oriented Requirements Engineering: A Unifying Framework, Springer, Requirements Engineering January 2002, Volume 6, Issue 4, pp 237-251
Inma P. Cabrera, Pablo Cordero, and Manuel Ojeda-Aciego, Fuzzy Logic, Soft Computing, and Applications, Springer(2009), Volume: 5517.
Klir G., Yuan B, “Fuzzy sets and fuzzy logic”, Prentice Hall, 1995 Deliverable D 7.6, IST Programme 2000#29518, 21/11/2003, Samos.
L.A. Zadeh, Review of books: a mathematical theory of evidence, The AI Magazine 5 (3) (1984) 81–83.
Loucopoulos, P., Kavakli, V., Enterprise Knowledge Management and Conceptual Modelling. LNCS Vol. 1565. Springer (1999) 123-143.
Piero Baraldi, Enrico Zio, A comparison between probabilistic and Dempster-Shafer Theory approaches to Model Uncertainty Analysis in the Performance Assessment of Radioactive Waste Repositories. Wiley Online Library , , Risk Analysis 2010, Volume 30.
Rajwinder Kaur , Manisha Bhardwaj ,Neha Malhotra, Analyzing Imprecise Requirements Using Fuzzy Logic, International Journal of Engineering Research & Technology (2012),Volume1.
Sentz, K. and S. Ferson. Combination of Evidence in Dempster-Shafer Theory, Sandia National Laboratories, Technical Report SAND 2002-0835, Albuquerque, New Mexico, 2002.
University of the Aegean, E-Vote: An Internet-based electronic voting system. University of the Aegean, Project
Tazid Ali, Palash Dutta, and Hrishikesh Boruah A New Combination Rule for Conflict Problem of Dempster-Shafer, Evidence Theory, International Journal of Energy, Information and Communications Vol. 3, Issue 1, February, 2012.
DOI: http://dx.doi.org/10.36039/AA042013009
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.