Author:
Toots Aivo,Tuuling Reedik,Yerokhin Maksym,Dumas Marlon,García-Bañuelos Luciano,Laud Peeter,Matulevičius Raimundas,Pankova Alisa,Pettai Martin,Pullonen Pille,Tom Jake
Publisher
Springer International Publishing
Reference9 articles.
1. Lecture Notes in Computer Science;R Accorsi,2012
2. Colesky, M., Hoepman, J., Hillen, C.: A critical analysis of privacy design strategies. In: IEEE Security and Privacy Workshops (SP), pp. 33–40. IEEE (2016)
3. Dumas, M., García-Bañuelos, L., Laud, P.: Disclosure analysis of SQL workows. In: 5th International Workshop on Graphical Models for Security. Springer, Heidelberg (2018)
4. Laud, P., Pankova, A., Pettai, M.: Achieving differential privacy using methods from calculus (2018).
http://arxiv.org/abs/1811.06343
5. Laud, P., Pettai, M., Randmets, J.: Sensitivity analysis of SQL queries. In: Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, PLAS 2018, pp. 2–12. ACM, New York (2018)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Forensic-Ready Analysis Suite: A Tool Support for Forensic-Ready Software Systems Design;Lecture Notes in Business Information Processing;2024
2. Tool-supported method for privacy analysis of a business process model;Journal of Information Security and Applications;2023-08
3. Confidentiality Enhanced Life-Cycle Assessment;Business Process Management Workshops;2022
4. PrivaLog: a Privacy-aware Logic Programming Language;23rd International Symposium on Principles and Practice of Declarative Programming;2021-09-06
5. Multi-level privacy analysis of business processes: the Pleak toolset;International Journal on Software Tools for Technology Transfer;2021-07-21