Computer-Aided Privacy Requirements Elicitation Technique

被引:16
作者
Miyazaki, Seiya [1 ]
Mead, Nancy [2 ]
Zhan, Justin [2 ]
机构
[1] Panasonic Corp, Kadoma, Osaka, Japan
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
来源
2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS | 2008年
关键词
D O I
10.1109/APSCC.2008.263
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The legislative penalties and economic penalties for privacy violations are more serious for a service provider these days. In spite of demonstrating that it is willing and able to protect the privacy of information, a service provider developing a privacy-compliant system faces two challenges; technical complexities and legal complexities. In this paper, we propose a computer-aided Privacy Requirements Elicitation Technique (PRET) that helps software developers elicit privacy requirements more efficiently in the early stages of software development. The goal of the PRET tool is to accelerate the elicitation process and prevent privacy requirements leaks by using a general privacy requirements database derived from privacy laws and empirical privacy requirements. We also show the results of integrating the PRET tool with the Security Quality Requirements Engineering (SQUARE) methodology and provide evidence of the efficacy of the resultant tool.
引用
收藏
页码:367 / +
页数:2
相关论文
共 14 条
[1]  
Allen J., 2008, SOFTWARE SECURITY EN
[2]  
[Anonymous], ACT PROTECTION PERSO
[3]  
[Anonymous], CHILDRENS ONLINE PRI
[4]  
Brodie C., 2005, ACM, V49, P1
[5]  
HEITMEYER C, 2002, ENCY SOTWARE ENG
[6]  
McConnell S, 2001, IEEE SOFTWARE, V18, P5, DOI 10.1109/MS.2001.903148
[7]  
Mead N. R., 2005, ACM SIGSOFT Software Engineering Notes, V30
[8]  
MEAD NR, 2006, P C SOFTW ENG ED TRA
[9]  
MOFFETT JD, 2004, 200423 OP U DEP COMP
[10]  
Murakami Y, 2004, IEEE SYS MAN CYBERN, P5645