메뉴 건너뛰기




Volumn 15, Issue 1, 2010, Pages 119-137

Evaluating existing security and privacy requirements for legal compliance

Author keywords

Legal compliance; Privacy requirements; Refactoring requirements; Security requirements

Indexed keywords

ELECTRONIC HEALTH RECORD; HEALTHCARE DOMAINS; LEGAL COMPLIANCE; LEGAL REQUIREMENTS; OPEN-SOURCE; PRIVACY REQUIREMENTS; REFACTORINGS; REQUIREMENTS ENGINEERING TECHNIQUES; REQUIREMENTS ENGINEERS; SECURITY AND PRIVACY; SECURITY REQUIREMENTS; SYSTEM REQUIREMENTS;

EID: 77950519059     PISSN: 09473602     EISSN: 1432010X     Source Type: Journal    
DOI: 10.1007/s00766-009-0089-5     Document Type: Article
Times cited : (63)

References (34)
  • 1
    • 33745005507 scopus 로고    scopus 로고
    • Challenges associated with privacy in health care industry: Implementation of HIPAA and the security rules
    • Choi YB, Capitan KE, Krause JS, Streeper MM (2006) Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules. J Med Syst 30(1):57-64
    • (2006) J Med Syst , vol.30 , Issue.1 , pp. 57-64
    • Choi, Y.B.1    Capitan, K.E.2    Krause, J.S.3    Streeper, M.M.4
  • 6
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulatory rules for privacy and security requirements
    • Breaux TD, Antón AI (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Softw Eng 34(1):5-20
    • (2008) IEEE Trans Softw Eng , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.D.1    Antón, A.I.2
  • 10
    • 0003706051 scopus 로고    scopus 로고
    • Garner BA (ed), 8th edn. Thompson West
    • Garner BA (ed) (2004) Black's law dictionary, 8th edn. Thompson West
    • (2004) Black's Law Dictionary
  • 15
    • 17744386721 scopus 로고    scopus 로고
    • Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
    • Massacci F, Prest M, Zannone N (2005) Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation. Comput Stand Interfaces 27(5):445-455
    • (2005) Comput Stand Interfaces , vol.27 , Issue.5 , pp. 445-455
    • Massacci, F.1    Prest, M.2    Zannone, N.3
  • 16
    • 0003152468 scopus 로고    scopus 로고
    • Deriving goals from a use-case based requirements specification
    • Carter R, Dagnino A, Dempster J, Siege D (2001) Deriving goals from a use-case based requirements specification. Requirements Eng 6(1):63-73
    • (2001) Requirements Eng , vol.6 , Issue.1 , pp. 63-73
    • Carter, R.1    Dagnino, A.2    Dempster, J.3    Siege, D.4
  • 18
    • 37249000278 scopus 로고    scopus 로고
    • Scenario support for effective requirements
    • Alspaugh TA, Antón AI (2008) Scenario support for effective requirements. Inf Softw Technol 50(3):198-220
    • (2008) Inf Softw Technol , vol.50 , Issue.3 , pp. 198-220
    • Alspaugh, T.A.1    Antón, A.I.2
  • 21
    • 0032178650 scopus 로고    scopus 로고
    • CREWS-SAVRE: Scenarios for acquiring and validating requirements
    • Maiden NAM (1998) CREWS-SAVRE: scenarios for acquiring and validating requirements. Autom Softw Eng 5(4):419-446
    • (1998) Autom Softw Eng , vol.5 , Issue.4 , pp. 419-446
    • Maiden, N.A.M.1
  • 22
    • 0028401161 scopus 로고
    • Inquiry-based requirements analysis
    • Potts C, Takahashi K, Antón A (1994) Inquiry-based requirements analysis. IEEE Softw 11:21-32
    • (1994) IEEE Softw , vol.11 , pp. 21-32
    • Potts, C.1    Takahashi, K.2    Antón, A.3
  • 24
    • 0141509901 scopus 로고    scopus 로고
    • Precluding incongruous behavior by aligning software requirements with security and privacy policies
    • Earp JB, Carter RA (2003) Precluding incongruous behavior by aligning software requirements with security and privacy policies. Inf Softw Technol 45(14):967-977
    • (2003) Inf Softw Technol , vol.45 , Issue.14 , pp. 967-977
    • Earp, J.B.1    Carter, R.A.2
  • 29
    • 0034833312 scopus 로고    scopus 로고
    • In: Proceedings of the fifth IEEE international symposium on requirements engineering
    • Allenby K, Kelly T (2001) Deriving safety requirements using scenarios. In: Proceedings of the fifth IEEE international symposium on requirements engineering, pp 228-235
    • (2001) Deriving Safety Requirements Using Scenarios , pp. 228-235
    • Allenby, K.1    Kelly, T.2
  • 33
    • 0032025414 scopus 로고    scopus 로고
    • Scenarios in system development: Current practice
    • Weidenhaupt K, Pohl K, Jarke M, Haumer P (1998) Scenarios in system development: current practice. IEEE Softw 15:34-45
    • (1998) IEEE Softw , vol.15 , pp. 34-45
    • Weidenhaupt, K.1    Pohl, K.2    Jarke, M.3    Haumer, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.