-
1
-
-
85033566750
-
Logic Programming for Large Scale Applications in Law: A Formalisation of Supplementary Benefit Legislation
-
T.J.M. Bench-Capon, G.O. Robinson, T.W. Routen, M.J. Sergot, "Logic Programming for Large Scale Applications in Law: A Formalisation of Supplementary Benefit Legislation", Proc. of the 1st ACM Intl. Conf. on Artificial Intelligence and Law, Boston, 1987, pp. 190-198.
-
Proc. of the 1st ACM Intl. Conf. on Artificial Intelligence and Law, Boston, 1987
, pp. 190-198
-
-
Bench-Capon, T.J.M.1
Robinson, G.O.2
Routen, T.W.3
Sergot, M.J.4
-
2
-
-
78650958795
-
Esplex: A Rule and Conceptual Model for Representing Statutes
-
C. Biagioli, P. Mariani, D. Tiscornia, "Esplex: A Rule and Conceptual Model for Representing Statutes", Proc. of the 1st ACM Intl. Conf. on Artificial Intelligence and Law, Boston, 1987, pp. 240-251.
-
Proc. of the 1st ACM Intl. Conf. on Artificial Intelligence and Law, Boston, 1987
, pp. 240-251
-
-
Biagioli, C.1
Mariani, P.2
Tiscornia, D.3
-
4
-
-
40449096076
-
Analyzing Regulatory Rules for Privacy and Security Requirements
-
Jan.-Feb.
-
T.D. Breaux, A.I. Antón, "Analyzing Regulatory Rules for Privacy and Security Requirements", IEEE Trans. on Software Engineering, 34(1), Jan.-Feb. 2008, pp. 5-20.
-
(2008)
IEEE Trans. on Software Engineering
, vol.34
, Issue.1
, pp. 5-20
-
-
Breaux, T.D.1
Antón, A.I.2
-
5
-
-
38149067484
-
Towards a Framework for Tracking Legal Compliance in Healthcare
-
S. Ghanavati, D. Amyot, L. Peyton, "Towards a Framework for Tracking Legal Compliance in Healthcare", Proc. of the 19th Intl. Conf. on Advanced Information Systems Engineering, Trondheim, Norway, 2007, pp. 218-232.
-
Proc. of the 19th Intl. Conf. on Advanced Information Systems Engineering, Trondheim, Norway, 2007
, pp. 218-232
-
-
Ghanavati, S.1
Amyot, D.2
Peyton, L.3
-
6
-
-
73549097759
-
Compliance Analysis Based on a Goal-Oriented Requirement Language Evaluation Methodology
-
S. Ghanavati, D. Amyot, L. Peyton, "Compliance Analysis Based on a Goal-Oriented Requirement Language Evaluation Methodology", Proc. of the 17th IEEE Intl. Conf. on Requirements Engineering, Atlanta, 2009, pp. 133-142.
-
Proc. of the 17th IEEE Intl. Conf. on Requirements Engineering, Atlanta, 2009
, pp. 133-142
-
-
Ghanavati, S.1
Amyot, D.2
Peyton, L.3
-
7
-
-
0002953848
-
Some Fundamental Legal Conceptions as Applied in Judicial Reasoning
-
Nov.
-
W.N. Hohfeld, "Some Fundamental Legal Conceptions as Applied in Judicial Reasoning", The Yale Law Journal, 23(1), Nov. 1913, pp. 16-59.
-
(1913)
The Yale Law Journal
, vol.23
, Issue.1
, pp. 16-59
-
-
Hohfeld, W.N.1
-
8
-
-
78650945403
-
ChoicePoint Breach, Exposed 13,750 Consumer Records
-
Oct. 19
-
B. Krebs, "ChoicePoint Breach, Exposed 13,750 Consumer Records", The Washington Post, Oct. 19, 2009, 〈http://voices. washingtonpost.com/securityfix/2009/10/choicepoint-breach-exposed-137. html〉.
-
(2009)
The Washington Post
-
-
Krebs, B.1
-
9
-
-
78650928797
-
A Formalization of HIPAA for a Medical Messaging System
-
P.E. Lam, J.C. Mitchell, S. Sundaram, "A Formalization of HIPAA for a Medical Messaging System", Proc. of the 6th International Conference on Trust, Privacy & Security in Digital Business, Linz, 2009.
-
Proc. of the 6th International Conference on Trust, Privacy & Security in Digital Business, Linz, 2009
-
-
Lam, P.E.1
Mitchell, J.C.2
Sundaram, S.3
-
10
-
-
77952965376
-
Prioritizing Legal Requirements
-
A.K. Massey, P.N. Otto, A.I. Antón, "Prioritizing Legal Requirements", Proc. of the 2nd Intl. IEEE Workshop on Requirements Engineering and the Law, Atlanta, 2009.
-
Proc. of the 2nd Intl. IEEE Workshop on Requirements Engineering and the Law, Atlanta, 2009
-
-
Massey, A.K.1
Otto, P.N.2
Antón, A.I.3
-
11
-
-
77950519059
-
Evaluating Existing Security and Privacy Requirements for Legal Compliance
-
Mar.
-
A.K. Massey, P.N. Otto, L.J. Hayward, and A.I. Antón, "Evaluating Existing Security and Privacy Requirements for Legal Compliance", Requirements Engineering Journal, 15(1), Mar. 2010, pp. 119-137.
-
(2010)
Requirements Engineering Journal
, vol.15
, Issue.1
, pp. 119-137
-
-
Massey, A.K.1
Otto, P.N.2
Hayward, L.J.3
Antón, A.I.4
-
12
-
-
84870707021
-
Developing Production Rule Models to Aid in Acquiring Requirements from Legal Texts
-
J.C. Maxwell, A.I. Antón, "Developing Production Rule Models to Aid in Acquiring Requirements from Legal Texts", Proc. of the 17th Intl. IEEE Requirements Engineering Conf., Atlanta, 2009, pp. 101-110.
-
Proc. of the 17th Intl. IEEE Requirements Engineering Conf., Atlanta, 2009
, pp. 101-110
-
-
Maxwell, J.C.1
Antón, A.I.2
-
13
-
-
77953018887
-
Validating Existing Requirements for Compliance with Law Using a Production Rule Model
-
J.C. Maxwell, A.I. Antón, "Validating Existing Requirements for Compliance with Law Using a Production Rule Model", Proc. of the 2nd Intl. IEEE Workshop on Requirements Engineering and the Law, Atlanta, 2009, pp. 1-6.
-
Proc. of the 2nd Intl. IEEE Workshop on Requirements Engineering and the Law, Atlanta, 2009
, pp. 1-6
-
-
Maxwell, J.C.1
Antón, A.I.2
-
14
-
-
78650956011
-
A Refined Production Rule Model for Aiding in Regulatory Compliance
-
in submission North Carolina State University Technical Report, TR-2010-3, 2010
-
J.C. Maxwell, A.I. Antón, "A Refined Production Rule Model for Aiding in Regulatory Compliance", (in submission) IEEE Trans. on Software Engineering, 2010. North Carolina State University Technical Report, TR-2010-3, 2010.
-
(2010)
IEEE Trans. on Software Engineering
-
-
Maxwell, J.C.1
Antón, A.I.2
-
15
-
-
33947620690
-
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
-
M.J. May, C.A. Gunter, I. Lee, "Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies", 19th IEEE Computer Security Foundations Workshop, pp. 85-97, 2006.
-
(2006)
19th IEEE Computer Security Foundations Workshop
, pp. 85-97
-
-
May, M.J.1
Gunter, C.A.2
Lee, I.3
-
17
-
-
0026883734
-
Representing and Using Nonfunctional Requirements: A Process-Oriented Approach
-
Jun.
-
J. Mylopoulos, L. Chung, B. Nixon, "Representing and Using Nonfunctional Requirements: A Process-Oriented Approach", IEEE Trans. on Software Engineering, 18(6), Jun. 1992, pp. 483-497.
-
(1992)
IEEE Trans. on Software Engineering
, vol.18
, Issue.6
, pp. 483-497
-
-
Mylopoulos, J.1
Chung, L.2
Nixon, B.3
-
18
-
-
34948903300
-
The Choicepoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information
-
Sep.-Oct.
-
P.N. Otto, A.I. Antón, D.L. Baumer, "The Choicepoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information", IEEE Security and Privacy, 5(5), Sep.-Oct. 2007, pp. 15-23.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.5
, pp. 15-23
-
-
Otto, P.N.1
Antón, A.I.2
Baumer, D.L.3
-
20
-
-
84963195944
-
Indian Central Civil Service Pension Rules: A Case Study in Logic Programming Applied to Regulations
-
M.J. Sergot, A.S. Kamble, K.K. Bajaj, "Indian Central Civil Service Pension Rules: A Case Study in Logic Programming Applied to Regulations", Proc. of the 3rd ACM Intl. Conf. on Artificial Intelligence and Law, Oxford, 1991, pp. 118-127.
-
Proc. of the 3rd ACM Intl. Conf. on Artificial Intelligence and Law, Oxford, 1991
, pp. 118-127
-
-
Sergot, M.J.1
Kamble, A.S.2
Bajaj, K.K.3
-
21
-
-
0022715548
-
The British Nationality Act as a Logic Program
-
May
-
M.J. Sergot, F. Sadri, A. Kowalski, F. Kriwaczek, P. Hammond, H.T. Cory, "The British Nationality Act as a Logic Program", Comm. of the ACM, 29(5), May 1986, pp. 370-386.
-
(1986)
Comm. of the ACM
, vol.29
, Issue.5
, pp. 370-386
-
-
Sergot, M.J.1
Sadri, F.2
Kowalski, A.3
Kriwaczek, F.4
Hammond, P.5
Cory, H.T.6
-
23
-
-
77952993038
-
A Meta-Model for Modelling Law-Compliant Requirements
-
A. Siena, A. Perini, A. Susi, J. J. Mylopoulos, "A Meta-Model for Modelling Law-Compliant Requirements", Proc. of the 2nd Intl. Workshop on Requirements and Law, Atlanta, 2009.
-
Proc. of the 2nd Intl. Workshop on Requirements and Law, Atlanta, 2009
-
-
Siena, A.1
Perini, A.2
Susi, A.3
Mylopoulos, J.J.4
-
24
-
-
0034497420
-
Eliciting security requirements by misuse cases
-
G. Sindre, A.L. Opdahl, "Eliciting security requirements by misuse cases",, Proc. of the 37th Intl. Conf. on Technology of Object-Oriented Languages and Systems, 2000, pp. 120-131.
-
Proc. of the 37th Intl. Conf. on Technology of Object-Oriented Languages and Systems, 2000
, pp. 120-131
-
-
Sindre, G.1
Opdahl, A.L.2
-
27
-
-
78650959927
-
A Requirements Elicitation Approach Based in Templates and Patterns
-
A.D. Toro, B.B. Jimenez, A.R. Cortes, M.T. Bonilla, "A Requirements Elicitation Approach Based in Templates and Patterns", Proc. of the 2nd Latin America Workshop on Requirements Engineering, Buenos Aires, 1999.
-
Proc. of the 2nd Latin America Workshop on Requirements Engineering, Buenos Aires, 1999
-
-
Toro, A.D.1
Jimenez, B.B.2
Cortes, A.R.3
Bonilla, M.T.4
-
28
-
-
23044498039
-
Case Study Research: Design and Methods
-
3rd ed.
-
R.K. Yin, Case Study Research: Design and Methods, in Applied Social Research Methods Series, Vol. 5, 2003, 3rd ed.
-
(2003)
Applied Social Research Methods Series
, vol.5
-
-
Yin, R.K.1
-
29
-
-
78650955284
-
Commitment Analysis to Operationalize Software Requirements from Privacy Notices
-
in press
-
J.D. Young, "Commitment Analysis to Operationalize Software Requirements from Privacy Notices," (in press) Requirements Engineering Journal, 2010.
-
(2010)
Requirements Engineering Journal
-
-
Young, J.D.1
|