—For software systems that process and manage sensitive information, compliance with laws has become not an option but a necessity. Analysing relevant laws and aligning them with the system requirements is necessary for attaining compliance issues. But analyzing laws within the context of software system requirements is a difficult task, mainly because the concepts used in legal texts are different compared to the concepts used in requirements engineering. This paper contributes to that direction. In particular it presents a process to model and analyse laws and regulations and to support the elicitation of security requirements based on the relevant legal and system context. Finally a case study is used to demonstrate the appli...
Laws set requirements that force organizations to assess the security and privacy of their IT system...
Laws set requirements that force organizations to assess the security and privacy of their IT system...
Laws set requirements that force organizations to assess the security and privacy of their IT system...
During the requirements elicitation phase, analysts have often to take into consideration laws and r...
During the requirements elicitation phase, analysts have often to take into consideration laws and ...
Legal texts, such as regulations and legislation, are increasingly playing an important role in requ...
. Accretion procedure of crimes and security breaches against the privacy of individual’s informati...
In modern societies, both business and private life are deeply pervaded by software and information ...
The increasing complexity of IT systems and the growing demand for regulation compliance are main is...
The increasing complexity of IT systems and the grow-ing demand for regulation compliance are main i...
[Context and motivation] The increasing demand of software systems to process and manage sensitive i...
Regulation compliance is getting more and more important for software systems that process and manag...
Laws and regulations are increasingly impacting the design and development of software systems, as l...
A software system complies with a regulation if its operation is consistent with the regulation unde...
In this work we introduce the principle of comprehensible security, which demands that the security ...
Laws set requirements that force organizations to assess the security and privacy of their IT system...
Laws set requirements that force organizations to assess the security and privacy of their IT system...
Laws set requirements that force organizations to assess the security and privacy of their IT system...
During the requirements elicitation phase, analysts have often to take into consideration laws and r...
During the requirements elicitation phase, analysts have often to take into consideration laws and ...
Legal texts, such as regulations and legislation, are increasingly playing an important role in requ...
. Accretion procedure of crimes and security breaches against the privacy of individual’s informati...
In modern societies, both business and private life are deeply pervaded by software and information ...
The increasing complexity of IT systems and the growing demand for regulation compliance are main is...
The increasing complexity of IT systems and the grow-ing demand for regulation compliance are main i...
[Context and motivation] The increasing demand of software systems to process and manage sensitive i...
Regulation compliance is getting more and more important for software systems that process and manag...
Laws and regulations are increasingly impacting the design and development of software systems, as l...
A software system complies with a regulation if its operation is consistent with the regulation unde...
In this work we introduce the principle of comprehensible security, which demands that the security ...
Laws set requirements that force organizations to assess the security and privacy of their IT system...
Laws set requirements that force organizations to assess the security and privacy of their IT system...
Laws set requirements that force organizations to assess the security and privacy of their IT system...