Author:
Herwanto Guntur Budi,Quirchmayr Gerald,Tjoa A. Min
Publisher
Springer International Publishing
Reference14 articles.
1. Alshareef, H., Stucki, S., Schneider, G.: Transforming Data Flow Diagrams for Privacy Compliance (Long Version). arXiv preprint arXiv:2011.12028 (2020)
2. Ambler, S.W.: The Object Primer: Agile Model-Driven Development with UML 2.0. Cambridge University Press, New York (2004)
3. Antignac, T., Scandariato, R., Schneider, G.: Privacy compliance via model transformations. In: 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 120–126. IEEE (2018)
4. Bernsmed, K., Cruzes, D.S., Jaatun, M.G., Iovan, M.: Adopting threat modelling in agile software development projects. J. Syst. Softw. 183, 111090 (2022). https://doi.org/10.1016/j.jss.2021.111090, https://www.sciencedirect.com/science/article/pii/S0164121221001874
5. Canedo, E.D., C.A.e.a.: A named entity recognition based approach for privacy requirements engineering. Unpublished Manuscript, presented. In: The 29th IEEE International Requirement Engineering Conference (2021)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献