Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
The requirements to system and software development tools brought up by the automotive industry differ from the requirements that other customers have. The important catchwords he...
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of ...
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, ...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...