Addressing legal requirements in requirements engineering

PN Otto, AI Antón - 15th IEEE international requirements …, 2007 - ieeexplore.ieee.org
Legal texts, such as regulations and legislation, are playing an increasingly important role in
requirements engineering and system development. Monitoring systems for requirements …

Basis for an integrated security ontology according to a systematic review of existing proposals

C Blanco, J Lasheras, E Fernández-Medina… - Computer Standards & …, 2011 - Elsevier
The use of ontologies to represent knowledge provides us with organization, communication
and reusability. The concepts and relations managed by any scientific community need to be …

Modeling security requirements through ownership, permission and delegation

P Giorgini, F Massacci, J Mylopoulos… - … Engineering (RE'05), 2005 - ieeexplore.ieee.org
Security requirements engineering is emerging as a branch of software engineering,
spurred by the realization that security must be dealt with early on during the requirements …

Legislative compliance assessment: framework, model and GDPR instantiation

S Agarwal, S Steyskal, F Antunovic… - Privacy Technologies and …, 2018 - Springer
Legislative compliance assessment tools are commonly used by companies to help them to
understand their legal obligations. One of the primary limitations of existing tools is that they …

[PDF][PDF] A reuse-based approach to determining security requirements

G Sindre, DG Firesmith, AL Opdahl - Proc. 9th International Workshop on …, 2003 - Citeseer
The paper proposes a reuse-based approach to determining security requirements.
Development for reuse involves identifying security threats and associated security …

Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation

F Massacci, M Prest, N Zannone - Computer Standards & Interfaces, 2005 - Elsevier
Extending Requirements Engineering modelling and formal analysis methodologies to cope
with Security Requirements has been a major effort in the past decade. Yet, only few works …

A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds …

K Beckers, I Côté, S Faßbender, M Heisel… - Requirements …, 2013 - Springer
Assembling an information security management system (ISMS) according to the ISO 27001
standard is difficult, because the standard provides only very sparse support for system …

[PDF][PDF] A model driven approach to data privacy verification in e-health systems

F Moscato, F Amato - Transactions on Data Privacy, 2015 - researchgate.net
Last years experienced the growth of new technologies able to remotely monitor health state
of persons. This includes both (even complex) Medical devices and all kind of wearable …

Requirements engineering for trust management: model, methodology, and reasoning

P Giorgini, F Massacci, J Mylopoulos… - International Journal of …, 2006 - Springer
A number of recent proposals aim to incorporate security engineering into mainstream
software engineering. Yet, capturing trust and security requirements at an organizational …

Security and trust requirements engineering

P Giorgini, F Massacci, N Zannone - International School on Foundations …, 2004 - Springer
Integrating security concerns throughout the whole software development process is one of
today's challenges in software and requirements engineering research. A challenge that so …