Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation

被引:44
作者
Massacci, F [1 ]
Prest, M
Zannone, N
机构
[1] Univ Trent, Dip Informat & Telecomun, Trento, Italy
[2] Univ Trent, Direz Amministrat IT, Trento, Italy
基金
欧盟地平线“2020”;
关键词
security requirements engineering; information security management system; standard for privacy protection;
D O I
10.1016/j.csi.2005.01.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Extending Requirements Engineering modelling and formal analysis methodologies to cope with Security Requirements has been a major effort in the past decade. Yet, only few works describe complex case studies that show the ability of the informal and formal approaches to cope with the level complexity required by compliance with ISO-17799 security management requirements. In this paper we present a comprehensive case study of the application of the Secure Tropos RE methodology for compliance to the Italian legislation on Privacy and Data Protection by the University of Trento, leading to the definition and analysis of a ISO-17799-like security management scheme. (c) 2005 Elsevier B.V All rights reserved.
引用
收藏
页码:445 / 455
页数:11
相关论文
共 14 条
[1]  
Andersen W.P., 2001, Information Security Technical Report, V6, P60, DOI [10.1016/S1363-4127, DOI 10.1016/S1363-4127]
[2]   A requirements taxonomy for reducing Web site privacy vulnerabilities [J].
Antón, AI ;
Earp, JB .
REQUIREMENTS ENGINEERING, 2004, 9 (03) :169-185
[3]  
Backes M, 2003, LECT NOTES COMPUT SC, V2808, P162
[4]   Cassandra: Flexible trust management, applied to electronic health records [J].
Becker, MY ;
Sewell, P .
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, :139-154
[5]  
BRESCIANI P, 2004, J AUTONOMOUS AGENTS, V8, P203, DOI DOI 10.1023/B:AGNT.0000018806.20944.EF
[6]  
Fung ARW, 2003, COMPUT STAND INTER, V25, P447, DOI [10.1016/S0920-54, 10.1016/S0920-5489(03)00014-X]
[7]  
Giorgini P, 2004, LECT NOTES COMPUT SC, V2995, P176
[8]  
Giorgini P, 2004, LECT NOTES COMPUT SC, V3093, P98
[9]  
*ISO IEC, 2000, 17799 ISO IEC
[10]  
JURJENS J, 2004, SECURE SYSTEMS DEV U