**Chapter 8**

*Security and Privacy From a Legal, Ethical, and Technical Perspective*

engineering for cloud computing: The secure tropos approach. In:

Concepts, Methods and Tools. Switzerland: Springer International Publishing; 2016. pp. 357-380

[58] Nguyen HH, Kim J, Kim Y.

2013;**7**(3):177-186

Domain-Specific Conceptual Modeling:

Differential privacy in practice. Journal of Computing Science and Engineering.

**124**
