Addressing legal requirements in requirements engineering

PN Otto, AI Antón - 15th IEEE international requirements …, 2007‏ - ieeexplore.ieee.org
Legal texts, such as regulations and legislation, are playing an increasingly important role in
requirements engineering and system development. Monitoring systems for requirements …

[HTML][HTML] Assessing frameworks for eliciting privacy & security requirements from laws and regulations

O Olukoya - Computers & Security, 2022‏ - Elsevier
The processing of personal data has become a prominent concern for stakeholders when
selecting software or service providers to serve their needs. Different laws and legislation …

Privacy requirements: present & future

P Anthonysamy, A Rashid… - 2017 IEEE/ACM 39th …, 2017‏ - ieeexplore.ieee.org
Software systems are increasingly open, handle large amounts of personal or other
sensitive data and are intricately linked with the daily lives of individuals and communities …

Modeling and managing heterogeneous applications

I Sedukhin, D Eshner, ST Swartz - US Patent 8,181,151, 2012‏ - Google Patents
(56) References Cited puter program products for modeling and managing hetero US
PATENT DOCUMENTS geneous applications. Application intent can be described in a …

Automated text mining for requirements analysis of policy documents

AK Massey, J Eisenstein, AI Antón… - 2013 21st IEEE …, 2013‏ - ieeexplore.ieee.org
Businesses and organizations in jurisdictions around the world are required by law to
provide their customers and users with information about their business practices in the form …

Pattern-based design and validation of business process compliance

K Namiri, N Stojanovic - On the Move to Meaningful Internet Systems 2007 …, 2007‏ - Springer
In this paper we present a novel approach for the modeling and implementation of Internal
Controls in Business Processes. The approach is based on the formal modeling of Internal …

Evaluating existing security and privacy requirements for legal compliance

AK Massey, PN Otto, LJ Hayward, AI Antón - Requirements engineering, 2010‏ - Springer
Governments enact laws and regulations to safeguard the security and privacy of their
citizens. In response, requirements engineers must specify compliant system requirements …

Runtime monitoring and resolution of probabilistic obstacles to system goals

A Cailliau, AV Lamsweerde - ACM Transactions on Autonomous and …, 2019‏ - dl.acm.org
Software systems are deployed in environments that keep changing over time. They should
therefore adapt to changing conditions to meet their requirements. The satisfaction rate of …

Dynamic selection of deployment configurations of software applications

G De Capoa, R De Gaetano, F Ribechini… - US Patent …, 2019‏ - Google Patents
2017-11-09 Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION
reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF …

Business intelligence as a competitive differentiator

RM Bogza, D Zaharie - 2008 IEEE International Conference on …, 2008‏ - ieeexplore.ieee.org
The successes of organizations vary greatly from industry to industry. For every business in
every industry, revenue growth remains the most fundamental indicator, and by far the most …