Author:
Michael Judith,Koschmider Agnes,Mannhardt Felix,Baracaldo Nathalie,Rumpe Bernhard
Publisher
Springer International Publishing
Reference22 articles.
1. Adam, K., et al.: Model-based generation of enterprise information systems. In: EMISA, CEUR Workshop Proceedings, vol. 2097, pp. 75–79 (2018)
2. Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: PODS 2001. ACM Press (2001)
3. Allison, D.S., El Yamany, H.F., Capretz, M.: Metamodel for privacy policies within SOA. In: ICSE WS on SE for Secure Systems (2009), pp. 40–46. IEEE (2009)
4. Basso, T., Montecchi, L., Moraes, R., Jino, M., Bondavalli, A.: Towards a UML profile for privacy-aware applications. In: IEEE International Conference on Computer and Information Technology, pp. 371–378 (2015)
5. Bergeron, E.: The difference between security and privacy (2000).
https://www.w3.org/P3P/mobile-privacy-ws/papers/zks.html
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献