Pauline Anthonysamy
Cited by
Cited by
Scientific Research
The good, the bad and the ugly: a study of security decisions in a cyber-physical systems game
S Frey, A Rashid, P Anthonysamy, M Pinto-Albuquerque, SA Naqvi
IEEE Transactions on Software Engineering 45 (5), 521-536, 2017
Privacy requirements: Present & future
P Anthonysamy, A Rashid, R Chitchyan
2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017
Social networking privacy: Understanding the disconnect from policy to controls
P Anthonysamy, P Greenwood, A Rashid
Computer 46 (6), 60-67, 2013
Schrödinger's security: opening the box on app developers' security rationale
D van der Linden, P Anthonysamy, B Nuseibeh, TT Tun, M Petre, ...
2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE …, 2020
Reducing Permission Requests in Mobile Apps
ST Peddinti, I Bilogrevic, N Taft, M Pelikan, Ú Erlingsson, P Anthonysamy, ...
Proceedings of the Internet Measurement Conference, 259-266, 2019
Analyzing user perspectives on mobile app privacy at scale
P Nema, P Anthonysamy, N Taft, ST Peddinti
Proceedings of the 44th International Conference on Software Engineering …, 2022
Hidden in plain sight: Obfuscated strings threatening your privacy
L Glanz, P Müller, L Baumgärtner, M Reif, S Amann, P Anthonysamy, ...
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
Do the privacy policies reflect the privacy controls on social networks?
P Anthonysamy, A Rashid, P Greenwood
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
Collaborative privacy management for third-party applications in online social networks
P Anthonysamy, A Rashid, J Walkerdine, P Greenwood, G Larkou
Proceedings of the 1st Workshop on Privacy and Security in Online Social …, 2012
“So if Mr Blue Head here clicks the link...” Risk Thinking in Cyber Security Decision Making
B Shreeve, J Hallett, M Edwards, P Anthonysamy, S Frey, A Rashid
ACM Transactions on Privacy and Security (TOPS) 24 (1), 1-29, 2020
A method for analysing traceability between privacy policies and privacy controls of online social networks
P Anthonysamy, P Greenwood, A Rashid
Annual Privacy Forum, 187-202, 2012
An approach for aspect-oriented use case modeling
SS Somé, P Anthonysamy
Proceedings of the 13th international workshop on Early Aspects, 27-34, 2008
Aspect-oriented use case modeling for software product lines
P Anthonysamy, SS Somé
Proceedings of the 2008 AOSD workshop on Early aspects, 1-8, 2008
Inferring semantic mapping between policies and code: the clue is in the language
P Anthonysamy, M Edwards, C Weichel, A Rashid
International Symposium on Engineering Secure Software and Systems, 233-250, 2016
Software engineering for privacy in-the-large
P Anthonysamy, A Rashid
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015
Can privacy policies be traced to privacy controls on social networking sites?: A qualitative study
P Anthonysamy, P Greenwood, A Rashid
Computer, 1, 2012
Taming unbounded variability in service engineering
P Anthonysamy, A Rashid, A Rummler
International Conference on Business Process Management, 615-619, 2010
Collaborative Privacy Management for Third-Party Applications
P Anthonysamy, A Rashid, J Walkerdine, P Greenwood, G Larkou
Arizona State University, 2011
Modeling crosscutting concerns in use cases using aspect-oriented techniques.
P Anthonysamy
Library and Archives Canada= Bibliothèque et Archives Canada, Ottawa, 2009
The system can't perform the operation now. Try again later.
Articles 1–20