Research directions in requirements engineering

BHC Cheng, JM Atlee - Future of software engineering (FOSE' …, 2007 - ieeexplore.ieee.org
In this paper, we review current requirements engineering (RE) research and identify future
research directions suggested by emerging software needs. First, we overview the state of …

Current and future research directions in requirements engineering

BHC Cheng, JM Atlee - Design Requirements Engineering: A Ten-Year …, 2009 - Springer
In this paper, we review current requirements engineering (RE) research and identify future
research directions suggested by emerging software needs. First, we overview the state of …

Analyzing regulatory rules for privacy and security requirements

T Breaux, A Antón - IEEE transactions on software engineering, 2008 - ieeexplore.ieee.org
Information practices that use personal, financial and health-related information are
governed by US laws and regulations to prevent unauthorized use and disclosure. To …

A comparison of security requirements engineering methods

B Fabian, S Gürses, M Heisel, T Santen… - Requirements …, 2010 - Springer
This paper presents a conceptual framework for security engineering, with a strong focus on
security requirements elicitation and analysis. This conceptual framework establishes a …

Towards regulatory compliance: Extracting rights and obligations to align requirements with regulations

TD Breaux, MW Vail, AI Anton - 14th IEEE International …, 2006 - ieeexplore.ieee.org
In the United States, federal and state regulations prescribe stakeholder rights and
obligations that must be satisfied by the requirements for software systems. These …

GaiusT: supporting the extraction of rights and obligations for regulatory compliance

N Zeni, N Kiyavitskaya, L Mich, JR Cordy… - Requirements …, 2015 - Springer
Ensuring compliance of software systems with government regulations, policies, and laws is
a complex problem. Generally speaking, solutions to the problem first identify rights and …

Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements

TD Breaux, H Hibshi, A Rao - Requirements Engineering, 2014 - Springer
Increasingly, companies use multi-source data to operate new information systems, such as
social networking, e-commerce, and location-based services. These systems leverage …

[PDF][PDF] The usable privacy policy project

N Sadeh, A Acquisti, TD Breaux… - … , CMU-ISR-13 …, 2013 - reports-archive.adm.cs.cmu.edu
Natural language privacy policies have become a de facto standard to address expectations
of “notice and choice” on the Web [FTC10]. Yet, there is ample evidence that users generally …

Automating the extraction of rights and obligations for regulatory compliance

N Kiyavitskaya, N Zeni, TD Breaux, AI Antón… - … Modeling-ER 2008 …, 2008 - Springer
Government regulations are increasingly affecting the security, privacy and governance of
information systems in the United States, Europe and elsewhere. Consequently, companies …

Ml-based compliance verification of data processing agreements against gdpr

O Amaral, S Abualhaija, L Briand - 2023 IEEE 31st international …, 2023 - ieeexplore.ieee.org
Most current software systems involve processing personal data, an activity that is regulated
in Europe by the general data protection regulation (GDPR) through data processing …