Addressing legal requirements in requirements engineering
PN Otto, AI Antón - 15th IEEE international requirements …, 2007 - ieeexplore.ieee.org
Legal texts, such as regulations and legislation, are playing an increasingly important role in
requirements engineering and system development. Monitoring systems for requirements …
requirements engineering and system development. Monitoring systems for requirements …
Basis for an integrated security ontology according to a systematic review of existing proposals
The use of ontologies to represent knowledge provides us with organization, communication
and reusability. The concepts and relations managed by any scientific community need to be …
and reusability. The concepts and relations managed by any scientific community need to be …
Modeling security requirements through ownership, permission and delegation
Security requirements engineering is emerging as a branch of software engineering,
spurred by the realization that security must be dealt with early on during the requirements …
spurred by the realization that security must be dealt with early on during the requirements …
Legislative compliance assessment: framework, model and GDPR instantiation
S Agarwal, S Steyskal, F Antunovic… - Privacy Technologies and …, 2018 - Springer
Legislative compliance assessment tools are commonly used by companies to help them to
understand their legal obligations. One of the primary limitations of existing tools is that they …
understand their legal obligations. One of the primary limitations of existing tools is that they …
[PDF][PDF] A reuse-based approach to determining security requirements
The paper proposes a reuse-based approach to determining security requirements.
Development for reuse involves identifying security threats and associated security …
Development for reuse involves identifying security threats and associated security …
Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation
Extending Requirements Engineering modelling and formal analysis methodologies to cope
with Security Requirements has been a major effort in the past decade. Yet, only few works …
with Security Requirements has been a major effort in the past decade. Yet, only few works …
A pattern-based method for establishing a cloud-specific information security management system: Establishing information security management systems for clouds …
Assembling an information security management system (ISMS) according to the ISO 27001
standard is difficult, because the standard provides only very sparse support for system …
standard is difficult, because the standard provides only very sparse support for system …
[PDF][PDF] A model driven approach to data privacy verification in e-health systems
Last years experienced the growth of new technologies able to remotely monitor health state
of persons. This includes both (even complex) Medical devices and all kind of wearable …
of persons. This includes both (even complex) Medical devices and all kind of wearable …
Requirements engineering for trust management: model, methodology, and reasoning
A number of recent proposals aim to incorporate security engineering into mainstream
software engineering. Yet, capturing trust and security requirements at an organizational …
software engineering. Yet, capturing trust and security requirements at an organizational …
Security and trust requirements engineering
Integrating security concerns throughout the whole software development process is one of
today's challenges in software and requirements engineering research. A challenge that so …
today's challenges in software and requirements engineering research. A challenge that so …