Towards a Common Security and Privacy Requirements Elicitation Methodology

被引:2
|
作者
Makri, Eleni-Laskarina [1 ]
Lambrinoudakis, Costas [1 ]
机构
[1] Univ Piraeus, Piraeus, Greece
关键词
Security requirements; Privacy requirements; Privacy principles; Risk analysis;
D O I
10.1007/978-3-319-23276-8_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are many methodologies that have been proposed in the literature for identifying the security and privacy requirements that must be satisfied by an information system in order to protect its users. At the same time, there are several "privacy principles" that have been considered as equally important for the avoidance of privacy violation incidents. However, to the best of our knowledge, there is no methodology that can cover both the identification of the security and privacy requirements and at the same time to take into account the main privacy principles. The consequence is that the designers of an information system usually follow an ad hoc approach for the identification of security/privacy requirements, thus failing to protect users in an effective way. This paper introduces the main idea behind a methodology that integrates the basic steps of well-established risk analysis methodologies with those of methodologies used for the identification of privacy requirements, considering, at the same time, the most well-known privacy principles. The proposed methodology aims to assist information system designers to come up with a complete and accurate list of all security and privacy requirements that must be satisfied by the system.
引用
收藏
页码:151 / 159
页数:9
相关论文
共 50 条
  • [1] Privacy Principles: Towards a Common Privacy Audit Methodology
    Makri, Eleni-Laskarina
    Lambrinoudakis, Costas
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 219 - 234
  • [2] A risk-based methodology for privacy requirements elicitation and control selection
    Manna, Asmita
    Sengupta, Anirban
    Mazumdar, Chandan
    SECURITY AND PRIVACY, 2022, 5 (01)
  • [3] Security Requirements Elicitation Using Method Weaving and Common Criteria
    Saeki, Motoshi
    Kaiya, Haruhiko
    MODELS IN SOFTWARE ENGINEERING, 2009, 5421 : 185 - +
  • [4] A Security Ontology for Security Requirements Elicitation
    Souag, Amina
    Salinesi, Camille
    Mazo, Raul
    Comyn-Wattiau, Isabelle
    ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 157 - 175
  • [5] Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements
    Alkubaisy, Duaa
    Cox, Karl
    Mouratidis, Haralambos
    2019 13TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2019, : 39 - 44
  • [6] Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation
    Diamantopoulou, Vasiliki
    Pavlidis, Michalis
    Mouratidis, Haralambos
    COMPUTER SECURITY, 2017, 2018, 10683 : 210 - 225
  • [7] A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based Systems
    Wilhjelm, Carl
    Younis, Awad A.
    COMPANION OF THE 2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS-C 2020), 2020, : 426 - 433
  • [8] Security and Privacy Requirements for Cloud Computing in Healthcare: Elicitation and Prioritization from a Patient Perspective
    Ermakova, Tatiana
    Fabian, Benjamin
    Kornacka, Marta
    Thiebes, Scott
    Sunyaev, Ali
    ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2020, 11 (02)
  • [9] How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
    Compagna, Luca
    El Khoury, Paul
    Krausova, Alzbeta
    Massacci, Fabio
    Zannone, Nicola
    ARTIFICIAL INTELLIGENCE AND LAW, 2009, 17 (01) : 1 - 30
  • [10] Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology
    Diamantopoulou, Vasiliki
    Mouratidis, Haralambos
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 382 - 400