메뉴 건너뛰기




Volumn , Issue , 2010, Pages 629-636

The production rule framework: Developing a canonical set of software requirements for compliance with law

Author keywords

healthcare it; legal compliance; production rule modeling; requirements engineering; security; software engineering

Indexed keywords

ELECTRONIC MEDICAL RECORD; HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACTS; HEALTHCARE IT; LEGAL COMPLIANCE; NON-FUNCTIONAL REQUIREMENTS; OPEN SOURCES; PRODUCTION RULE MODELING; PRODUCTION RULES; SECURITY; SECURITY RULES; SOFTWARE ENGINEERS; SOFTWARE REQUIREMENTS; SOFTWARE SYSTEMS;

EID: 78650944341     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1882992.1883092     Document Type: Conference Paper
Times cited : (29)

References (30)
  • 4
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing Regulatory Rules for Privacy and Security Requirements
    • Jan.-Feb.
    • T.D. Breaux, A.I. Antón, "Analyzing Regulatory Rules for Privacy and Security Requirements", IEEE Trans. on Software Engineering, 34(1), Jan.-Feb. 2008, pp. 5-20.
    • (2008) IEEE Trans. on Software Engineering , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.D.1    Antón, A.I.2
  • 7
    • 0002953848 scopus 로고
    • Some Fundamental Legal Conceptions as Applied in Judicial Reasoning
    • Nov.
    • W.N. Hohfeld, "Some Fundamental Legal Conceptions as Applied in Judicial Reasoning", The Yale Law Journal, 23(1), Nov. 1913, pp. 16-59.
    • (1913) The Yale Law Journal , vol.23 , Issue.1 , pp. 16-59
    • Hohfeld, W.N.1
  • 8
    • 78650945403 scopus 로고    scopus 로고
    • ChoicePoint Breach, Exposed 13,750 Consumer Records
    • Oct. 19
    • B. Krebs, "ChoicePoint Breach, Exposed 13,750 Consumer Records", The Washington Post, Oct. 19, 2009, 〈http://voices. washingtonpost.com/securityfix/2009/10/choicepoint-breach-exposed-137. html〉.
    • (2009) The Washington Post
    • Krebs, B.1
  • 11
    • 77950519059 scopus 로고    scopus 로고
    • Evaluating Existing Security and Privacy Requirements for Legal Compliance
    • Mar.
    • A.K. Massey, P.N. Otto, L.J. Hayward, and A.I. Antón, "Evaluating Existing Security and Privacy Requirements for Legal Compliance", Requirements Engineering Journal, 15(1), Mar. 2010, pp. 119-137.
    • (2010) Requirements Engineering Journal , vol.15 , Issue.1 , pp. 119-137
    • Massey, A.K.1    Otto, P.N.2    Hayward, L.J.3    Antón, A.I.4
  • 14
    • 78650956011 scopus 로고    scopus 로고
    • A Refined Production Rule Model for Aiding in Regulatory Compliance
    • in submission North Carolina State University Technical Report, TR-2010-3, 2010
    • J.C. Maxwell, A.I. Antón, "A Refined Production Rule Model for Aiding in Regulatory Compliance", (in submission) IEEE Trans. on Software Engineering, 2010. North Carolina State University Technical Report, TR-2010-3, 2010.
    • (2010) IEEE Trans. on Software Engineering
    • Maxwell, J.C.1    Antón, A.I.2
  • 15
  • 17
    • 0026883734 scopus 로고
    • Representing and Using Nonfunctional Requirements: A Process-Oriented Approach
    • Jun.
    • J. Mylopoulos, L. Chung, B. Nixon, "Representing and Using Nonfunctional Requirements: A Process-Oriented Approach", IEEE Trans. on Software Engineering, 18(6), Jun. 1992, pp. 483-497.
    • (1992) IEEE Trans. on Software Engineering , vol.18 , Issue.6 , pp. 483-497
    • Mylopoulos, J.1    Chung, L.2    Nixon, B.3
  • 18
    • 34948903300 scopus 로고    scopus 로고
    • The Choicepoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information
    • Sep.-Oct.
    • P.N. Otto, A.I. Antón, D.L. Baumer, "The Choicepoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information", IEEE Security and Privacy, 5(5), Sep.-Oct. 2007, pp. 15-23.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.5 , pp. 15-23
    • Otto, P.N.1    Antón, A.I.2    Baumer, D.L.3
  • 28
  • 29
    • 78650955284 scopus 로고    scopus 로고
    • Commitment Analysis to Operationalize Software Requirements from Privacy Notices
    • in press
    • J.D. Young, "Commitment Analysis to Operationalize Software Requirements from Privacy Notices," (in press) Requirements Engineering Journal, 2010.
    • (2010) Requirements Engineering Journal
    • Young, J.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.