Towards a framework to elicit and manage security and privacy requirements from laws and regulations

Shareeful Islam, Haralambos Mouratidis, Stefan Wagner

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

34 Scopus citations

Abstract

[Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant laws and regulations, which enforce the privacy and other aspects of the stored information. [Question/problem] However, the task is challenging because concepts and terminology used for requirements engineering are mostly different to those used in the legal domain and there is a lack of appropriate modelling languages and techniques to support such activities. [Principal ideas/results] The legislation need to be analysed and align with the system requirements. [Contribution] This paper motivates the need to introduce a framework to assist the elicitation and management of security and privacy requirements from relevant legislation and it briefly presents the foundations of such a framework along with an example.

Original languageEnglish
Title of host publicationRequirements Engineering
Subtitle of host publicationFoundation for Software Quality - 16th International Working Conference, REFSQ 2010, Proceedings
Pages255-261
Number of pages7
DOIs
StatePublished - 2010
Event16th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2010 - Essen, Germany
Duration: 30 Jun 20102 Jul 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6182 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference16th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2010
Country/TerritoryGermany
CityEssen
Period30/06/102/07/10

Keywords

  • evolving legislation
  • modelling
  • privacy requirements
  • Secure Tropos
  • Security requirements

Fingerprint

Dive into the research topics of 'Towards a framework to elicit and manage security and privacy requirements from laws and regulations'. Together they form a unique fingerprint.

Cite this