Software systems are becoming increasingly complex. Their ubiquitous presence makes users more dependent on their correctness in many aspects of daily life. As a result, there is …
M Leucker, C Schallhart - The journal of logic and algebraic programming, 2009 - Elsevier
In this paper, a brief account of the field of runtime verification is given. Starting with a definition of runtime verification, a comparison to well-known verification techniques like …
In the last years, the legal domain has been revolutionized by the use of Information and Communication Technologies, producing large amount of digital information. Legal …
M El Kharbili - Proceedings of the Eighth Asia …, 2012 - crpit.scem.westernsydney.edu.au
Regulatory compliance management (RCM) is a problem gaining wide interest in the business process management (BPM) community. However, research has not yet provided …
C Haley, R Laney, J Moffett… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security …
F Hassan, T Le - Journal of Legal Affairs and Dispute Resolution in …, 2020 - ascelibrary.org
Contract documents are a critical legal component of a construction project that specify all wishes and expectations of the owner toward the design, construction, and handover of a …
RY Wong, DK Mulligan - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
In calls for privacy by design (PBD), regulators and privacy scholars have investigated the richness of the concept of" privacy." In contrast," design" in HCI is comprised of rich and …
T Breaux, A Antón - IEEE transactions on software engineering, 2008 - ieeexplore.ieee.org
Information practices that use personal, financial and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To …
JA Kroll - Proceedings of the 2021 ACM Conference on Fairness …, 2021 - dl.acm.org
Accountability is widely understood as a goal for well governed computer systems, and is a sought-after value in many governance contexts. But how can it be achieved? Recent work …