Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1276318.1276346acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicailConference Proceedingsconference-collections
Article

How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach

Published: 04 June 2007 Publication History

Abstract

Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary security measures. Several frameworks have been proposed to deal with thii issue. For instance, purpose-based access control is normally considered a good solution for meeting the requirements of privacy legislation. Yet, understanding why, how, and when such solutions to security and privacy problems have to be deployed is often unanswered.
In this paper, we look at the problem from a broader perspective, accounting for legal and organizational issues. Security engineers and legal experts should be able to start from the organizational model and derive from there the points where security and privacy problems may arise and determine which solutions best fit the (legal) problems that they face. In particular, we investigate the methodology needed to capture security and privacy requirements for a Health Care Centre using a smart items infrastructure.

References

[1]
T. J. M. Bench-Capon, G. O. Robinson, T. W. Routen, and M. J. Sergot. Logic programming for large scale applications in law: A formalisation of supplementary benefit legislation. In Proc. of ICAIL'87, pages 190--198. ACM Press, 1987.
[2]
T. J. M. Bench-Capon and G. Sartor. A model of legal reasoning with cases incorporating theories and values. Artif. Intell., 150(1--2):97--143, 2003.
[3]
K. D. M. and E. M. C. Final technical report: Security patterns for web application development. Technical report, 2002. Available at http://www.scrypt.net/
[4]
E. Fernandez and R. Pan. A Pattern Language for Security Models. In In Proc. of PLoP'01, 2001.
[5]
E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1994.
[6]
P. Giorgini, F. Massacci, and N. Zannone. Security and Trust Requirements Engineering. In FOSAD 2004/2005, LNCS 3655, pages 237--272. Springer-Verlag, 2005.
[7]
ISO. Quality Management Systems: Requirements. ISO 9001:2000, 2000.
[8]
S. Kanger. Law and logic. Theoria, 38(3):105--132, 1972.
[9]
S. Konrad, B. H. C. Cheng, L. A. Campbell, and R. Wassermann. Using security patterns to model and analyze security requirements. In Proc. of RHAS'03. IEEE Press, 2003.
[10]
R. A. Kowalski and M. J. Sergot. Computer Representation of the Law. In Proc. of IJCAI'05, pages 1269--1270. Morgan Kaufmann, 1985.
[11]
L. Lamport. How to write a long formula. Formal Aspects of Comp., 6(5):580--584, 1994.
[12]
F. Massacci, J. Mylopoulos, and N. Zannone. An Ontology for Secure Socio-Technical Systems. In Handbook of Ontologies for Business Interaction. The IDEA Group, 2007.
[13]
H. Mouratidis, M. Weiss, and P. Giorgini. Security patterns meet agent oriented software engineering: a complementary solution for developing security information systems. In In Proc. of ER'05, 2005.
[14]
M. Schumacher. Security Engineering with Patterns: Origins, Theoretical Models, and New Applications. Springer-Verlag, 2003.
[15]
J. Yoder and J. Barcalow. Architectural Patterns for Enabling Application Security. In In Proc. of PLoP'97, 1997.

Cited By

View all
  • (2023)Understanding the Role of Human-Related Factors in Security Requirements ElicitationRequirements Engineering: Foundation for Software Quality10.1007/978-3-031-29786-1_5(65-74)Online publication date: 4-Apr-2023
  • (2022)Towards the Integration of Human Factors in Collaborative Decision Making for Secure Architecture DesignProceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering10.1145/3551349.3561149(1-8)Online publication date: 10-Oct-2022
  • (2022)It Takes Two to Tango: Design Thinking and Design Patterns for Better System DevelopmentDesign Thinking for Software Engineering10.1007/978-3-030-90594-1_14(201-211)Online publication date: 13-Feb-2022
  • Show More Cited By

Index Terms

  1. How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICAIL '07: Proceedings of the 11th international conference on Artificial intelligence and law
      June 2007
      302 pages
      ISBN:9781595936806
      DOI:10.1145/1276318
      • Conference Chair:
      • Anne Gardner,
      • Program Chair:
      • Radboud Winkels
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      • International Association for Artificial Intelligence and Law

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 June 2007

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. health care
      2. legal requirements
      3. organization
      4. pattern validation
      5. security & privacy patterns

      Qualifiers

      • Article

      Conference

      ICAIL07
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 69 of 169 submissions, 41%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)13
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 18 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Understanding the Role of Human-Related Factors in Security Requirements ElicitationRequirements Engineering: Foundation for Software Quality10.1007/978-3-031-29786-1_5(65-74)Online publication date: 4-Apr-2023
      • (2022)Towards the Integration of Human Factors in Collaborative Decision Making for Secure Architecture DesignProceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering10.1145/3551349.3561149(1-8)Online publication date: 10-Oct-2022
      • (2022)It Takes Two to Tango: Design Thinking and Design Patterns for Better System DevelopmentDesign Thinking for Software Engineering10.1007/978-3-030-90594-1_14(201-211)Online publication date: 13-Feb-2022
      • (2021)Vision for an Artefact-based Approach to Regulatory Requirements EngineeringProceedings of the 15th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)10.1145/3475716.3484191(1-6)Online publication date: 11-Oct-2021
      • (2021)The Hidden Value of Patterns – Using Design Patterns to Whitebox Technology Development in Legal AssessmentsInnovation Through Information Systems10.1007/978-3-030-86797-3_27(405-421)Online publication date: 16-Oct-2021
      • (2020)SoKProceedings of the 15th International Conference on Availability, Reliability and Security10.1145/3407023.3407061(1-10)Online publication date: 25-Aug-2020
      • (2018)A system of privacy patterns for user controlProceedings of the 33rd Annual ACM Symposium on Applied Computing10.1145/3167132.3167257(1150-1156)Online publication date: 9-Apr-2018
      • (2018)Toward Applying Online Privacy Patterns Based on the Design Problem: A Systematic ReviewDesign, User Experience, and Usability: Theory and Practice10.1007/978-3-319-91797-9_43(608-627)Online publication date: 2-Jun-2018
      • (2017)Compliance patternsProceedings of the 16th edition of the International Conference on Articial Intelligence and Law10.1145/3086512.3086526(139-148)Online publication date: 12-Jun-2017
      • (2017)A Literature Study on Privacy Patterns Research2017 43rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA)10.1109/SEAA.2017.28(194-201)Online publication date: Aug-2017
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media