2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS) 2012
DOI: 10.1109/crisis.2012.6378941
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-by-design based on quantitative threat modeling

Abstract: Abstract-While the general concept of "Privacy-by-Design (PbD)" is increasingly a popular one, there is considerable paucity of either rigorous or quantitative underpinnings supporting PbD. Drawing upon privacy-aware modeling techniques, this paper proposes a quantitative threat modeling methodology (QTMM) that can be used to draw objective conclusions about different privacy-related attacks that might compromise a service. The proposed QTMM has been empirically validated in the context of the EU project ABC4T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(29 citation statements)
references
References 12 publications
0
28
0
1
Order By: Relevance
“…Once the initial attack trees have been built an iterative process of choosing mitigation techniques begins until each risk is either avoided, optimized or completely accepted. This is an advantage since it builds the base for automating the process [16].…”
Section: Quantitative Threat Modelingmentioning
confidence: 99%
“…Once the initial attack trees have been built an iterative process of choosing mitigation techniques begins until each risk is either avoided, optimized or completely accepted. This is an advantage since it builds the base for automating the process [16].…”
Section: Quantitative Threat Modelingmentioning
confidence: 99%
“…Though several solutions have extended STRIDE to accommodate more complex systems [62], and cover other security requirements, e.g., privacy [45,56], its model does not fit cryptocurrencies. Another study [71], in which the authors extended STRIDE's threat categories to handle Bitcoin-like community currencies, bears out this premise.…”
Section: Related Workmentioning
confidence: 99%
“…In the area of information systems development, these methods of support have begun to appear for implementing the concept of privacy by design, as seen in Compagna, Khoury, Krausová, Massacci and Zannone (2009); Tschantz and Wing (2009); Deng, Wuyts, Scandariato, Preneel and Joosen (2011); Gürses Troncoso and Diaz (2011); Rubenstein and Good (2013); Hoepman (2014), Luna, Suri and Krontiris (2012);and Le Métayer (2013). Different European projects have been undertaken or are underway with the aim of helping to apply concepts related to PbD, including EuroPriSe (2007), PICOS (2009), PRISMS (2012), SurPRISE (2012), PACT (2012), CAPPRIS (2013) andPRIPARE (2014).…”
Section: Data Protection By Designmentioning
confidence: 99%