TY - GEN
T1 - Towards a framework to elicit and manage security and privacy requirements from laws and regulations
AU - Islam, Shareeful
AU - Mouratidis, Haralambos
AU - Wagner, Stefan
PY - 2010
Y1 - 2010
N2 - [Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant laws and regulations, which enforce the privacy and other aspects of the stored information. [Question/problem] However, the task is challenging because concepts and terminology used for requirements engineering are mostly different to those used in the legal domain and there is a lack of appropriate modelling languages and techniques to support such activities. [Principal ideas/results] The legislation need to be analysed and align with the system requirements. [Contribution] This paper motivates the need to introduce a framework to assist the elicitation and management of security and privacy requirements from relevant legislation and it briefly presents the foundations of such a framework along with an example.
AB - [Context and motivation] The increasing demand of software systems to process and manage sensitive information has led to the need that software systems should comply with relevant laws and regulations, which enforce the privacy and other aspects of the stored information. [Question/problem] However, the task is challenging because concepts and terminology used for requirements engineering are mostly different to those used in the legal domain and there is a lack of appropriate modelling languages and techniques to support such activities. [Principal ideas/results] The legislation need to be analysed and align with the system requirements. [Contribution] This paper motivates the need to introduce a framework to assist the elicitation and management of security and privacy requirements from relevant legislation and it briefly presents the foundations of such a framework along with an example.
KW - evolving legislation
KW - modelling
KW - privacy requirements
KW - Secure Tropos
KW - Security requirements
UR - http://www.scopus.com/inward/record.url?scp=77955462130&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-14192-8_23
DO - 10.1007/978-3-642-14192-8_23
M3 - Conference contribution
AN - SCOPUS:77955462130
SN - 3642141919
SN - 9783642141911
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 255
EP - 261
BT - Requirements Engineering
T2 - 16th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2010
Y2 - 30 June 2010 through 2 July 2010
ER -