Towards a Common Security and Privacy Requirements Elicitation Methodology

被引:2
|
作者
Makri, Eleni-Laskarina [1 ]
Lambrinoudakis, Costas [1 ]
机构
[1] Univ Piraeus, Piraeus, Greece
关键词
Security requirements; Privacy requirements; Privacy principles; Risk analysis;
D O I
10.1007/978-3-319-23276-8_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are many methodologies that have been proposed in the literature for identifying the security and privacy requirements that must be satisfied by an information system in order to protect its users. At the same time, there are several "privacy principles" that have been considered as equally important for the avoidance of privacy violation incidents. However, to the best of our knowledge, there is no methodology that can cover both the identification of the security and privacy requirements and at the same time to take into account the main privacy principles. The consequence is that the designers of an information system usually follow an ad hoc approach for the identification of security/privacy requirements, thus failing to protect users in an effective way. This paper introduces the main idea behind a methodology that integrates the basic steps of well-established risk analysis methodologies with those of methodologies used for the identification of privacy requirements, considering, at the same time, the most well-known privacy principles. The proposed methodology aims to assist information system designers to come up with a complete and accurate list of all security and privacy requirements that must be satisfied by the system.
引用
收藏
页码:151 / 159
页数:9
相关论文
共 50 条
  • [21] Security requirements elicitation: a smart health case
    Rabii, Anass
    Assoul, Saliha
    Roudies, Ounsa
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 776 - 781
  • [22] Security Requirements Elicitation from Business Processes
    Matulevicius, Raimundas
    BUSINESS PROCESS MANAGEMENT WORKSHOPS( BPM 2014), 2015, 202
  • [23] Existing Vulnerability Information in Security Requirements Elicitation
    Amin, Rayhan
    Bhowmik, Tanmay
    2022 IEEE 30TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW), 2022, : 220 - 225
  • [24] Towards a Methodology for Case Model Elicitation
    Hewelt, Marcin
    Wolff, Felix
    Mandal, Sankalita
    Pufahl, Luise
    Weske, Mathias
    ENTERPRISE, BUSINESS-PROCESS AND INFORMATION SYSTEMS MODELING, BPMDS 2018 AND EMMSAD 2018, 2018, 318 : 181 - 195
  • [25] Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations
    Islam, Shareeful
    Mouratidis, Haralambos
    Wagner, Stefan
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, 2010, 6182 : 255 - +
  • [26] Towards a Formal Framework for Normative Requirements Elicitation
    Feng, Nick
    Marsso, Lina
    Yaman, Sinem Getir
    Townsend, Beverley
    Cavalcanti, Ana
    Calinescu, Radu
    Chechik, Marsha
    2023 38TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE, 2023, : 1776 - 1780
  • [27] Towards an Evolutionary Framework for Agile Requirements Elicitation
    Kelly, Sandra
    EICS 2010: PROCEEDINGS OF THE 2010 ACM SIGCHI SYMPOSIUM ON ENGINEERING INTERACTIVE COMPUTING SYSTEMS, 2010, : 349 - 352
  • [28] Towards a typology of questions for requirements elicitation interviews
    Zaremba, Olesya
    Liaskos, Sotirios
    29TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2021), 2021, : 384 - 389
  • [29] Knowledge elicitation as an inquiring system: towards a 'subjective' knowledge elicitation methodology
    West, D.
    INFORMATION SYSTEMS JOURNAL, 1992, 2 (01) : 31 - 44
  • [30] Security and privacy requirements in interactive TV
    Dhiah el Diehn I. Abou-Tair
    Ingo Köster
    Kathrin Höfke
    Multimedia Systems, 2011, 17 : 393 - 408