Automated Identification of Security and Privacy Requirements from Software Engineering Contracts

被引:2
|
作者
Jain, Chirag [1 ]
Anish, Preethu Rose [1 ]
Ghaisas, Smita [1 ]
机构
[1] TCS Res, Chennai, Tamil Nadu, India
关键词
Software Engineering Contracts; Security and Privacy Requirements; Natural Language Generation model; Text-to-Text Transfer Transformer (T5);
D O I
10.1109/REW57809.2023.00047
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The increasing prevalence of information disclosure, data breach and privacy risk has obliged the incorporation of security and privacy measures while designing software systems. With rise in concerns related to security and privacy, different laws and regulations have been enacted to protect vulnerable information. Complying with these laws and regulations is essential for software systems to manage vulnerable information. To comply with these laws, it is important to identify obligatory security and privacy requirements from Software Engineering (SE) contracts while designing software systems. However, manually identifying these requirements from contracts is error-prone and a difficult task given that contracts are written in Legalese and is not comprehensible to software developers who have to implement these security and privacy measures into the software. To mitigate this, we propose an approach to automatically identify obligatory security and privacy requirements from SE contracts. Our approach leverages the power of state-of-the-art Natural Language Generation transformer model T5 (Text-to-Text Transfer Transformer). We achieved a Fl-score of 91% with T5 for identification of security and privacy requirements.
引用
收藏
页码:234 / 238
页数:5
相关论文
共 50 条
  • [41] Automated Extraction of Compliance Elements in Software Engineering Contracts Using Natural Language Generation
    Rejithkumar, Gokul
    Anish, Preethu Rose
    Sonar, Pratik
    Ghaisas, Smita
    PROCEEDINGS 2024 ACM/IEEE INTERNATIONAL WORKSHOP ON NL-BASED SOFTWARE ENGINEERING, NLBSE 2024, 2024, : 69 - 72
  • [42] Commitment analysis to operationalize software requirements from privacy policies
    Young, Jessica D.
    REQUIREMENTS ENGINEERING, 2011, 16 (01) : 33 - 46
  • [43] Commitment analysis to operationalize software requirements from privacy policies
    Jessica D. Young
    Requirements Engineering, 2011, 16 : 33 - 46
  • [44] (UN)ETHICAL SOFTWARE ENGINEERING A critical review about Software Engineering in face of Security Requirements in the IoT/IoE Society
    Sauches Flores, Fabiana Figueira
    de Lemos Meira, Silvio Romero
    2021 15TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2021), 2021,
  • [45] Security and privacy requirements in interactive TV
    Dhiah el Diehn I. Abou-Tair
    Ingo Köster
    Kathrin Höfke
    Multimedia Systems, 2011, 17 : 393 - 408
  • [46] Automated Classification of Security Requirements
    Jindal, Rajni
    Malhotra, Ruchika
    Jain, Abha
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 2027 - 2033
  • [47] ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY
    KINGSLAKE, R
    INFORMATION PRIVACY, 1979, 1 (07): : 312 - 314
  • [48] Security and privacy requirements in interactive TV
    Abou-Tair, Dhiah el Diehn I.
    Koester, Ingo
    Hoefke, Kathrin
    MULTIMEDIA SYSTEMS, 2011, 17 (05) : 393 - 408
  • [49] Requirements by contracts allow automated system testing
    Nebut, C
    Fleurey, F
    Le Traon, Y
    Jézéquel, JM
    ISSRE 2003: 14TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2003, : 85 - 96
  • [50] Security requirements for software development
    Kim, TH
    Shin, MC
    Kim, SH
    Cha, JS
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2004, 3215 : 116 - 122