Governance-Focused Classification of Security and Privacy Requirements from Obligations in Software Engineering Contracts

被引:0
作者
Anish, Preethu Rose [1 ]
Verma, Aparna [2 ]
Venkatesan, Sivanthy [2 ]
Logamurugan, V [2 ]
Ghaisas, Smita [1 ]
机构
[1] TCS Res, Pune, Maharashtra, India
[2] TATA Consultancy Serv, Mumbai, Maharashtra, India
来源
REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2024 | 2024年 / 14588卷
关键词
security; privacy; requirements; contracts; classification;
D O I
10.1007/978-3-031-57327-9_6
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
[Context and Motivation] Security and Privacy (SP) compliance is an important aspect of running businesses successfully. Compliance with SP requirements by Software Engineering (SE) vendors, both in terms of the systems they implement and the practices they follow while implementing, gives customers an assurance that their data is accessed, stored, and processed securely. Failure to comply on the other hand, can entail heavy fines, lawsuits, and may even lead to loss of business through prohibition of those software in corresponding jurisdictions. SE contracts are known to be a useful source for deriving software requirements. [Question/problem] Mining any kind of information from contracts is a dauting task given that contracts are large and complex documents employing Legalese. [Principal ideas/results] We employ an exploratory study to come up with a model for a governance-focused classification of the SP requirements present in SE contracts for governance. Next, we report experiments conducted with Recurrent Neural Networks and Transformer-based models to automate this classification. Experiments conducted on 960 SE contracts received from a large vendor organization indicate that T5 performs best for both SP identification and classification tasks. With T5, we obtained an average F1 score of 0.90 each for identification of SP requirements. For the governance-focused classification, we obtained an average F1 score of 0.81 for the Security class and 0.80 for the Privacy class. [Contribution] Through an exploratory study, we present a model for a governance-focused classification of the SP requirements present in SE contracts. We further automate the extraction and the governance-focused classification of SP requirements by conducting experiments using 960 real-life SE contracts received from a large vendor organization.
引用
收藏
页码:92 / 108
页数:17
相关论文
共 21 条
  • [11] Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering
    Mellado, Daniel
    Rodriguez, Jesus
    Fernandez-Medina, Eduardo
    Piattini, Mario
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 224 - +
  • [12] 2-SQUARE: A Web-Based Enhancement of SQUARE Privacy and Security Requirements Engineering
    Lai, Alan
    Zhang, Cui
    Busovaca, Senad
    INTERNATIONAL JOURNAL OF SOFTWARE INNOVATION, 2013, 1 (01) : 41 - 53
  • [13] Commitment analysis to operationalize software requirements from privacy policies
    Young, Jessica D.
    REQUIREMENTS ENGINEERING, 2011, 16 (01) : 33 - 46
  • [14] Uncovering Innovation Practices and Requirements in Privacy and Cyber Security Organisations: Insights from IPACSO
    Dooly, Zeta
    Doyle, Kenny
    Power, Jamie
    CYBER SECURITY AND PRIVACY, CSP INNOVATION FORUM 2015, 2015, 530 : 140 - 150
  • [15] Privacy and data security in E-health: Requirements from the user's perspective
    Wilkowska, Wiktoria
    Ziefle, Martina
    HEALTH INFORMATICS JOURNAL, 2012, 18 (03) : 191 - 201
  • [16] Enhancing Software Sustainability: Leveraging Large Language Models to Evaluate Security Requirements Fulfillment in Requirements Engineering
    Subahi, Ahmad F.
    SYSTEMS, 2025, 13 (02):
  • [17] Toward a Holistic Privacy Requirements Engineering Process: Insights From a Systematic Literature Review
    Herwanto, Guntur Budi
    Ekaputra, Fajar J.
    Quirchmayr, Gerald
    Tjoa, A. Min
    IEEE ACCESS, 2024, 12 : 47518 - 47542
  • [18] MBIPV: a model-based approach for identifying privacy violations from software requirements
    Ye, Tong
    Zhuang, Yi
    Qiao, Gongzhe
    SOFTWARE AND SYSTEMS MODELING, 2023, 22 (04) : 1251 - 1280
  • [19] Classification of Events from the BPMN Model in Software Engineering Artifacts
    Norena Cardona, Paola Andrea
    Vargas Agudelo, Fabio Alberto
    Soto Duran, Dario Enrique
    CUADERNO ACTIVA, 2014, (06): : 49 - 61
  • [20] Security in Telehealth Systems From a Software Engineering Viewpoint: A Systematic Mapping Study
    Marquez, Gaston
    Astudillo, Hernan
    Taramasco, Carla
    IEEE ACCESS, 2020, 8 : 10933 - 10950