Effective and efficient privacy threat modeling through domain refinements
dc.contributor.author | Wuyts, Kim | |
dc.contributor.author | Van landuyt, Dimitri | |
dc.contributor.author | Hovsepyan, Aram | |
dc.contributor.author | Joosen, Wouter | |
dc.date.accessioned | 2021-10-26T09:47:09Z | |
dc.date.available | 2021-10-26T09:47:09Z | |
dc.date.issued | 2018 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/32297 | |
dc.source | IIOimport | |
dc.title | Effective and efficient privacy threat modeling through domain refinements | |
dc.type | Proceedings paper | |
dc.contributor.imecauthor | Joosen, Wouter | |
dc.source.peerreview | yes | |
dc.source.beginpage | 1175 | |
dc.source.endpage | 1178 | |
dc.source.conference | SAC '18 Proceedings of the 33rd Annual ACM Symposium on Applied Computing | |
dc.source.conferencedate | 9/04/2018 | |
dc.source.conferencelocation | Pau France | |
dc.identifier.url | https://dl.acm.org/citation.cfm?id=3167414 | |
imec.availability | Published - imec |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |