Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1529282.1529360acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Identifying vulnerabilities and critical requirements using criminal court proceedings

Published: 08 March 2009 Publication History

Abstract

Information systems governed by laws and regulations are subject to civil and criminal violations. In the United States, these violations are documented in court records, such as complaints, indictments, plea agreements, and verdicts, which thus constitute a source of real-world software vulnerabilities. This paper reports on an exploratory case study to identify legal vulnerabilities and provides guidance to practitioners in the analysis of court documents. As legal violations occur after system deployment, court records reveal vulnerabilities that were likely overlooked during software development. We evaluate established requirements engineering techniques, including sequence and misuse case diagrams and goal models, as applied to criminal court records to identify mitigating requirements that improve privacy protections. These techniques, when properly applied, can help organizations focus their risk-management efforts on emerging legal vulnerabilities. We illustrate our analysis using criminal indictments involving the U.S. Health Insurance Portability and Accountability Act (HIPAA).

References

[1]
I. Alexander, "Initial industrial experience of misuse cases in trade-off analysis," IEEE Joint Int'l Conf. Req'ts Engr., pp. 61--68, 2002.
[2]
A. I. Antón. Goal-based Requirements Analysis Method, PhD Thesis, Georgia Tech, 1996.
[3]
T. D. Breaux, M. W. Vail, A. I. Antón. "Towards compliance: extracting rights and obligations to align requirements with regulations," IEEE Int'l Conf. Req'ts Engr., pp. 49--58, 2006.
[4]
T. D. Breaux, A. I. Antón. "Analyzing regulatory rules for privacy and security requirements," IEEE Trans. Soft. Engr., Special Issue on Soft. Engr. for Secure Sys., 34(1): 5--20, 2008.
[5]
F. Dardenne, A. van Lamsweerde, S. Fickas. "Goal-directed requirements acquisition", Science of Computer Programming. 20: 3--50, 1993.
[6]
United States v. Ferrer, et al. Case No. 0:06-CR-60261-JIC, S. D. FI., Dec. 7, 2006.
[7]
B. A. Garner, Ed., Black's Law Dictionary, 8th ed., Thompson West, 2004.
[8]
Y. Kamisar et al. Modern Criminal Procedure: Cases, Comments, and Questions, 11th ed., St. Paul, Minn.: Thomson/West, 2005, pp. 2--20.
[9]
A. van Lamsweerde, "Elaborating security requirements by construction of intentional anti-models," IEEE 26th Int'l Conf. Soft. Engr., pp. 148--157, 2004.
[10]
J. McDermott, C. Fox, "Using abuse case models for security requirements analysis", 15th Computer Security Applications Conf., pp. 55--64, 1999.
[11]
P. N. Otto, A. I. Antón, "Addressing legal requirements in requirements engineering," 15th IEEE Int'l Req'ts Engr. Conf., pp. 5--14, 2007.
[12]
B. Regnell, M. Andersson, J. Bersrand. "A hierarchical use case model with graphical representation", IEEE Int'l Symp. and Workshop on Engr. of Computer-based Sys., pp. 270--277, 1996.
[13]
G. Sindre, A. L. Opdahl. "Eliciting security requirements with misuse cases", Req'ts Engr. 10: 34--44, 2005.
[14]
D. Verdon, G. McGraw, "Risk analysis in software design," IEEE Security & Privacy, 2(4): 79--84, 2004.
[15]
P. Winn, "Confronting the threats of medical identity theft," Health Information Privacy/Security Alert, July 24, 2007.
[16]
S. Yanovitch, K. Kimberland, "2007 E-crime watch survey shows security incidents, electronic crimes and their impact steady versus last year," CSO Magazine, Sep. 2007.
[17]
R. K. Y in. Case Study Research, 3rd ed. Applied Social Research Methods Series, v. 5, Sage Pubs., 2003.

Cited By

View all

Index Terms

  1. Identifying vulnerabilities and critical requirements using criminal court proceedings

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SAC '09: Proceedings of the 2009 ACM symposium on Applied Computing
    March 2009
    2347 pages
    ISBN:9781605581668
    DOI:10.1145/1529282
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 March 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    SAC09
    Sponsor:
    SAC09: The 2009 ACM Symposium on Applied Computing
    March 8, 2009 - March 12, 2008
    Hawaii, Honolulu

    Acceptance Rates

    Overall Acceptance Rate 1,286 of 5,316 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 24 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media