Analyzing regulatory rules for privacy and security requirements

T Breaux, A Antón - IEEE transactions on software engineering, 2008 - ieeexplore.ieee.org
Information practices that use personal, financial and health-related information are
governed by US laws and regulations to prevent unauthorized use and disclosure. To …

Towards regulatory compliance: Extracting rights and obligations to align requirements with regulations

TD Breaux, MW Vail, AI Anton - 14th IEEE International …, 2006 - ieeexplore.ieee.org
In the United States, federal and state regulations prescribe stakeholder rights and
obligations that must be satisfied by the requirements for software systems. These …

Privee: An architecture for automatically analyzing web privacy policies

S Zimmeck, SM Bellovin - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
Privacy policies on websites are based on the notice-and-choice principle. They notify Web
users of their privacy choices. However, many users do not read privacy policies or have …

GaiusT: supporting the extraction of rights and obligations for regulatory compliance

N Zeni, N Kiyavitskaya, L Mich, JR Cordy… - Requirements …, 2015 - Springer
Ensuring compliance of software systems with government regulations, policies, and laws is
a complex problem. Generally speaking, solutions to the problem first identify rights and …

Privacy APIs: Access control techniques to analyze and verify legal privacy policies

MJ May, CA Gunter, I Lee - 19th IEEE Computer Security …, 2006 - ieeexplore.ieee.org
There is a growing interest in establishing rules to regulate the privacy of citizens in the
treatment of sensitive personal data such as medical and financial records. Such rules must …

Evaluating existing security and privacy requirements for legal compliance

AK Massey, PN Otto, LJ Hayward, AI Antón - Requirements engineering, 2010 - Springer
Governments enact laws and regulations to safeguard the security and privacy of their
citizens. In response, requirements engineers must specify compliant system requirements …

Distilling privacy requirements for mobile applications

K Thomas, AK Bandara, BA Price… - Proceedings of the 36th …, 2014 - dl.acm.org
As mobile computing applications have become commonplace, it is increasingly important
for them to address end-users' privacy requirements. Privacy requirements depend on a …

Developing production rule models to aid in acquiring requirements from legal texts

JC Maxwell, AI Antón - 2009 17th IEEE International …, 2009 - ieeexplore.ieee.org
Regulatory compliance is an important consideration for requirements engineering because
recent regulations impose costly penalties for noncompliance. This paper details how …

Semantic parameterization: A process for modeling domain descriptions

TD Breaux, AI Antón, J Doyle - ACM Transactions on Software …, 2008 - dl.acm.org
Software engineers must systematically account for the broad scope of environmental
behavior, including nonfunctional requirements, intended to coordinate the actions of …

Cognitive computing

H Demirkan, S Earley, RR Harmon - IT professional, 2017 - ieeexplore.ieee.org
Cognitive computing refers to smart systems that learn at scale, reason with purpose, and
interact with humans and other smart systems naturally. This special issue seeks to provide …