ABSTRACT
We propose and evaluate an information extraction and analysis framework that combines human intelligent (crowdsourcing) with automated methods to produce improved security and privacy requirements incorporating knowledge from post-deployment artifacts such as breach reports.
- HHS. 2003. Summary of the HIPAA privacy rule. (2003). HHS. http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/.Google Scholar
- HHS Breach Portal. 2016. Notice to the Secretary of HHS Breach of Unsecured Protected Health Information Affecting 500 or More Individuals. (2016). HHS. https://ocrportal.hhs.gov/ocr/breach/.Google Scholar
Index Terms
- Toward extraction of security requirements from text: poster
Recommendations
Çorba: crowdsourcing to obtain requirements from regulations and breaches
AbstractContextModern software systems are deployed in sociotechnical settings, combining social entities (humans and organizations) with technical entities (software and devices). In such settings, on top of technical controls that implement security ...
Supporting requirements engineers in recognising security issues
REFSQ'11: Proceedings of the 17th international working conference on Requirements engineering: foundation for software qualityContext & motivation: More and more software projects today are security-related in one way or the other. Many environments are initially not considered security-related and no security experts are assigned. Requirements engineers often fail to ...
Elicitation of Security requirements for E-Health system by applying Model Oriented Security Requirements Engineering (MOSRE) Framework
CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information TechnologyE-health is a health care system which is supported by electronic process and communication. The information that is kept in the system must be accurate. In case of false information, it may cause harm to human life. So this system needs more security ...
Comments