Evaluating existing security and privacy requirements for legal compliance

Requirements Engineering(2009)

引用 81|浏览0
暂无评分
摘要
Governments enact laws and regulations to safeguard the security and privacy of their citizens. In response, requirements engineers must specify compliant system requirements to satisfy applicable legal security and privacy obligations. Specifying legally compliant requirements is challenging because legal texts are complex and ambiguous by nature. In this paper, we discuss our evaluation of the requirements for iTrust, an open-source Electronic Health Records system, for compliance with legal requirements governing security and privacy in the healthcare domain. We begin with an overview of the method we developed, using existing requirements engineering techniques, and then summarize our experiences in applying our method to the iTrust system. We illustrate some of the challenges that practitioners face when specifying requirements for a system that must comply with law and close with a discussion of needed future research focusing on security and privacy requirements.
更多
查看译文
关键词
itrust system,security requirements privacy requirements legal compliance refactoring requirements,legal text,existing security,existing requirements engineering technique,requirements engineer,privacy obligation,legal requirement,privacy requirement,compliant requirement,applicable legal security,compliant system requirement,legal compliance,satisfiability,requirement engineering
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要