This chapter discusses a systems engineering methodology that can be adapted to privacy engineering. The methodology presented should be followed throughout development of a project for a privacy solution. It involves interactive models that provide pictorial documentation as well as business language use cases that together present requirements, analysis, design, and test cases in a readable form. The models work together to provide an understandable information and application architecture that satisfies business requirements, including, of course, privacy and security.
CITATION STYLE
Dennedy, M. F., Fox, J., & Finneran, T. R. (2014). A Privacy Engineering Lifecycle Methodology. In The Privacy Engineer’s Manifesto (pp. 121–160). Apress. https://doi.org/10.1007/978-1-4302-6356-2_6
Mendeley helps you to discover research relevant for your work.