TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publication References
  4. A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
 
Options

A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements

Publikationstyp
Journal Article
Date Issued
2010-11-16
Sprache
English
Author(s)
Deng, Mina  
Wuyts, Kim  
Scandariato, Riccardo  
Preneel, Bart  
Joosen, Wouter  
TORE-URI
http://hdl.handle.net/11420/14974
Journal
Requirements engineering  
Volume
16
Issue
1
Start Page
3
End Page
32
Citation
Requirements Engineering 16 (1): 3-32 (2011-03-01)
Publisher DOI
10.1007/s00766-010-0115-7
Scopus ID
2-s2.0-79952002261
Publisher
Springer
Ready or not, the digitalization of information has come, and privacy is standing out there, possibly at stake. Although digital privacy is an identified priority in our society, few systematic, effective methodologies exist that deal with privacy threats thoroughly. This paper presents a comprehensive framework to model privacy threats in software-based systems. First, this work provides a systematic methodology to model privacy-specific threats. Analogous to STRIDE, an information flow-oriented model of the system is leveraged to guide the analysis and to provide broad coverage. The methodology instructs the analyst on what issues should be investigated, and where in the model those issues could emerge. This is achieved by (i) defining a list of privacy threat types and (ii) providing the mappings between threat types and the elements in the system model. Second, this work provides an extensive catalog of privacy-specific threat tree patterns that can be used to detail the threat analysis outlined above. Finally, this work provides the means to map the existing privacy-enhancing technologies (PETs) to the identified privacy threats. Therefore, the selection of sound privacy countermeasures is simplified.
Subjects
Privacy
Requirements
Secure software engineering
Threat modeling
DDC Class
004: Informatik
TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback