메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 95-103

Legal requirements reuse: A critical success factor for requirements quality and personal data protection

Author keywords

Data engineering; Data privacy; Data security; Information management; Information security; Information technology; Law; Legal factors; Protection; Technology management

Indexed keywords

COMPUTER SOFTWARE REUSABILITY; INFORMATION MANAGEMENT; INFORMATION TECHNOLOGY; LAWS AND LEGISLATION; LIFE CYCLE; REQUIREMENTS ENGINEERING; SECURITY OF DATA;

EID: 27644567989     PISSN: 1090705X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICRE.2002.1048511     Document Type: Conference Paper
Times cited : (45)

References (34)
  • 1
    • 84949042867 scopus 로고    scopus 로고
    • Spanish Royal Decree 994/1999 June 11th, by means of which the Security Measures Regulations of Automated Files which contain personal data is approved 25/06/1999 (In Spanish)
    • Spanish Royal Decree 994/1999, June 11th, by means of which the Security Measures Regulations of Automated Files which contain personal data is approved. BOE no. 151, 25/06/1999, page 24241 (In Spanish)
    • BOE , Issue.151 , pp. 24241
  • 2
    • 84949042868 scopus 로고    scopus 로고
    • Spanish Constitutional Law 15/ December 13th, on Personal Data Protection 14/12/1999 (In Spanish)
    • Spanish Constitutional Law 15/1999, December 13th, on Personal Data Protection. BOE no. 298, 14/12/1999 (In Spanish)
    • (1999) BOE , Issue.298
  • 3
    • 84949042869 scopus 로고
    • Directive 95/46/CE of the European Parliament and Council, dated October 24th: About People protection regarding the personal data management and the free circulation of these data
    • Directive 95/46/CE of the European Parliament and Council, dated October 24th: about People protection regarding the personal data management and the free circulation of these data. DOCE no. L281, 23/11/1995, P.0031-0050
    • (1995) DOCE No L281, 23/11/ , pp. 0031-0050
  • 4
    • 84948976768 scopus 로고    scopus 로고
    • Software Engineering Standards Committee of the IEEE Computer Society: IEEE Guide for Developing System Requirements Specifications
    • Software Engineering Standards Committee of the IEEE Computer Society: IEEE Guide for Developing System Requirements Specifications. IEEE Std. 1233-1998
    • IEEE Std. 1233-1998
  • 5
    • 84948992476 scopus 로고    scopus 로고
    • Software Engineering Standards Committee of the IEEE Computer Society: IEEE Recommended Practice for Software Requirements Specifications
    • Software Engineering Standards Committee of the IEEE Computer Society: IEEE Recommended Practice for Software Requirements Specifications. IEEE Std 830-1998
    • IEEE Std 830-1998
  • 6
    • 2642514289 scopus 로고    scopus 로고
    • Software Engineering Standards Committee of the IEEE Computer Society: IEEE Standard Glossary of Software Engineering Terminology
    • Software Engineering Standards Committee of the IEEE Computer Society: IEEE Standard Glossary of Software Engineering Terminology. IEEE Std 610.12-1990
    • IEEE Std 610.12-1990
  • 7
    • 84949042870 scopus 로고    scopus 로고
    • Spanish Ministry of Public Administration. Information System Risk Analysis and Management Methodology. (Spanish)
    • Spanish Ministry of Public Administration: MAGERIT Version 1.0. Information System Risk Analysis and Management Methodology. 1996 (In Spanish)
    • (1996) MAGERIT Version 1.0
  • 8
    • 84949042871 scopus 로고    scopus 로고
    • Requisite Pro. Rational Software
    • Requisite Pro. Rational Software. http://www.rational.com
  • 9
    • 4243694529 scopus 로고    scopus 로고
    • INCOSE prepared by Requirements Working Group of the Int. Council on Systems Engineering
    • Pradip Kar, Michelle Bailey: Characteristics of Good Requirements. INCOSE 1996, prepared by Requirements Working Group of the Int. Council on Systems Engineering
    • (1996) Characteristics of Good Requirements
    • Kar, P.1    Bailey, M.2
  • 10
    • 0000292519 scopus 로고    scopus 로고
    • Dep. of computer science, university of hertfordshire and rolls-royce university technology center, dep. of computer science, the university of York
    • W.Lam, J.A. McDermid, A.J.Vickers: Dep. of Computer Science, University of Hertfordshire and Rolls-Royce University Technology Center, Dep. of Computer Science, The University of York. Ten Steps Towards Systematic Requirements Reuse. Requirements Eng (1997) 2: 102-113
    • (1997) Ten Steps Towards Systematic Requirements Reuse. Requirements Eng , vol.2 , pp. 102-113
    • Lam, W.1    McDermid, J.A.2    Vickers, A.J.3
  • 11
    • 84949042872 scopus 로고    scopus 로고
    • Wilson: Writing effective natural language requirements specifications
    • Feb 99. STSC
    • William M. Wilson: Writing Effective Natural Language Requirements Specifications. Feb 99. Crosstalk. The Journal of Defense Software Engineering. STSC. http://www.stsc.hill.af.mil/crossTalk/1999/feb/wilson.asp
    • Crosstalk. The Journal of Defense Software Engineering
    • William, M.1
  • 12
    • 33645011687 scopus 로고    scopus 로고
    • Strategic drivers of software quality: Beyond external and internal software quality
    • Fitzpatrick, R. Strategic Drivers of Software Quality: Beyond External and Internal Software Quality. Proc. of the AQAPS Int. Conf.. IEEE Comp. Society, 65-72, 2001.
    • (2001) Proc. of the AQAPS Int. Conf. IEEE Comp. Society , pp. 65-72
    • Fitzpatrick, R.1
  • 13
    • 84937400267 scopus 로고    scopus 로고
    • Towards use case and conceptual models through business modeling
    • Laender, A.H.F., Liddle, S.W., Storey, V.C. eds., Springer-Verlag
    • García, J., Ortín M. J., Moros, B. Nicolás, J. and Toval, A.: Towards Use Case and Conceptual Models through Business Modeling. Laender, A.H.F., Liddle, S.W., Storey, V.C. (eds.): Conceptual Modeling-ER 2000. Lec. Notes in Comp. Sci., Vol. 1920, . Springer-Verlag (2000) 281-294
    • (2000) Conceptual Modeling-ER 2000. Lec. Notes in Comp. Sci. , vol.1920 , pp. 281-294
    • García, J.1    Ortín, M.J.2    Moros, B.3    Nicolás, J.4    Toval, A.5
  • 16
    • 21544431902 scopus 로고    scopus 로고
    • Formal validation and verification of atomic resolution microscope control and topography
    • December
    • Nicolás, J.; Toval, A.; Arenas, A. and Alcalde, J., Formal Validation and Verification of Atomic Resolution Microscope Control and Topography, Cybernetics and Systems, Volume 32, Number 8, December 2001
    • (2001) Cybernetics and Systems , vol.32 , Issue.8
    • Nicolás, J.1    Toval, A.2    Arenas, A.3    Alcalde, J.4
  • 18
    • 0031385980 scopus 로고    scopus 로고
    • Classification of research efforts in requirements engineering ACM
    • Zave, P.: Classification of Research Efforts in Requirements Engineering, ACM Computing Surveys, vol. 29, n. 4, pp. 315-321, 1997
    • (1997) Computing Surveys , vol.29 , Issue.4 , pp. 315-321
    • Zave, P.1
  • 23
    • 33746247912 scopus 로고    scopus 로고
    • Requirements classification and reuse: Crossing domain boundaries
    • Springer, Lecture Notes in Computer Science. Viena
    • Cybulsky JL, Reed K.: Requirements Classification and Reuse: Crossing Domain Boundaries. In: 6th Int. Conf. on Software Reuse, ICSR'2000. Springer, Lecture Notes in Computer Science. Viena. 2000
    • (2000) 6th Int. Conf. on Software Reuse, ICSR'2000
    • Cybulsky, J.L.1    Reed, K.2
  • 26
    • 0028012990 scopus 로고    scopus 로고
    • An analysis of the requirements traceability problem
    • Colorado Springs Co, 1994, IEEE Computer Society Press
    • Gotel, O. and Finkelstein, A.W.: An Analysis of the requirements traceability problem. Proceedings of the Int. Conf. on Requirements Engineering, Colorado Springs Co, 1994, IEEE Computer Society Press, pp. 94-102
    • Proceedings of the Int. Conf. on Requirements Engineering , pp. 94-102
    • Gotel, O.1    Finkelstein, A.W.2
  • 27
    • 84956602782 scopus 로고    scopus 로고
    • Analyzing software requirements errors in safetycritical embedded systems
    • San Diego, CA
    • Lutz R.: Analyzing software requirements errors in safetycritical embedded systems. Proceedings of RE'93, San Diego, CA, pp. 126-33
    • Proceedings of RE'93 , pp. 126-133
    • Lutz, R.1
  • 28
    • 84979855000 scopus 로고
    • Dealing with security requirements during the development of information systems
    • Rolland C, Bodat F. and Cauvet C. (eds.) Berlin: Springer Verlag. Paris
    • Chung L.: Dealing with Security Requirements during the development of Information Systems. In: Rolland C, Bodat F. and Cauvet C. (eds.). Advanced Information Systems Eng., Proc., 5th Int. Conf. CAiSE '93. Berlin: Springer Verlag. Paris. 1993. pp. 234-251
    • (1993) Advanced Information Systems Eng., Proc., 5th Int. Conf. CAiSE '93 , pp. 234-251
    • Chung, L.1
  • 29
    • 84949042875 scopus 로고    scopus 로고
    • The role of requirement reuse in protecting personal data
    • Computer Science and Engineering: Part I, ("Database Security invited session") Orlando, Florida (USA), July
    • Toval, A., Olmos, A., Rodero, J.A. "The Role of Requirement Reuse in Protecting Personal Data", Proc. of the 5th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2001), Vol. VII, Computer Science and Engineering: Part I, ("Database Security invited session") Orlando, Florida (USA), July 2001.
    • (2001) Proc. of the 5th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2001) , vol.7
    • Toval, A.1    Olmos, A.2    Rodero, J.A.3
  • 30
    • 17844409254 scopus 로고    scopus 로고
    • Requirements reuse for improving information systems security: A practicioner's approach
    • Springer-Verlag
    • Toval, A., Nicolás, J., Moros, B., García F., Requirements Reuse for Improving Information Systems Security: A Practicioner's Approach, Requirements Engineering Journal, vol. 6, n. 4, pp. 205-219, 2002 Springer-Verlag.
    • (2002) Requirements Engineering Journal , vol.6 , Issue.4 , pp. 205-219
    • Toval, A.1    Nicolás, J.2    Moros, B.3    García, F.4
  • 31
    • 0034826451 scopus 로고    scopus 로고
    • The hidden meta-requirements of security and privacy (keynote talk)
    • August, 27-31 Toronto, Canada
    • Gene Spafford.The Hidden Meta-Requirements of Security and Privacy (keynote talk). Procs. of the Fifth IEEE Int. Sym. on Requirements Engineering, August, 27-31, 2001, Toronto, Canada.
    • (2001) Procs. of the Fifth IEEE Int. Sym. on Requirements Engineering
    • Gene, S.1
  • 33
    • 0036149234 scopus 로고    scopus 로고
    • Correctness by construction: Developing a commercial secure system
    • Jan/Feb
    • Hall, Anthony and Chapman, Roderick. Correctness by Construction: Developing a Commercial Secure System. IEEE Software Jan/Feb 2002, pp. 18-25
    • (2002) IEEE Software , pp. 18-25
    • Hall, A.1    Chapman, R.2
  • 34
    • 0036145519 scopus 로고    scopus 로고
    • Building software securely from the ground up
    • Jan/Feb
    • Ghosh, Anup K. Howell, Chuck. Whittaker, James A. Building Software Securely from the Ground Up. IEEE Software Jan/Feb 2002, pp. 14-16
    • (2002) IEEE Software , pp. 14-16
    • Ghosh, A.K.1    Howell, C.2    Whittaker, J.A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.