Automated Identification of Security and Privacy Requirements from Software Engineering Contracts

被引:1
|
作者
Jain, Chirag [1 ]
Anish, Preethu Rose [1 ]
Ghaisas, Smita [1 ]
机构
[1] TCS Res, Chennai, Tamil Nadu, India
关键词
Software Engineering Contracts; Security and Privacy Requirements; Natural Language Generation model; Text-to-Text Transfer Transformer (T5);
D O I
10.1109/REW57809.2023.00047
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The increasing prevalence of information disclosure, data breach and privacy risk has obliged the incorporation of security and privacy measures while designing software systems. With rise in concerns related to security and privacy, different laws and regulations have been enacted to protect vulnerable information. Complying with these laws and regulations is essential for software systems to manage vulnerable information. To comply with these laws, it is important to identify obligatory security and privacy requirements from Software Engineering (SE) contracts while designing software systems. However, manually identifying these requirements from contracts is error-prone and a difficult task given that contracts are written in Legalese and is not comprehensible to software developers who have to implement these security and privacy measures into the software. To mitigate this, we propose an approach to automatically identify obligatory security and privacy requirements from SE contracts. Our approach leverages the power of state-of-the-art Natural Language Generation transformer model T5 (Text-to-Text Transfer Transformer). We achieved a Fl-score of 91% with T5 for identification of security and privacy requirements.
引用
收藏
页码:234 / 238
页数:5
相关论文
共 50 条
  • [1] Governance-Focused Classification of Security and Privacy Requirements from Obligations in Software Engineering Contracts
    Anish, Preethu Rose
    Verma, Aparna
    Venkatesan, Sivanthy
    Logamurugan, V
    Ghaisas, Smita
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY, REFSQ 2024, 2024, 14588 : 92 - 108
  • [2] Engineering secure software by modelling privacy and security requirements
    Kreeger, MN
    Duncan, I
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 37 - 40
  • [3] Conflicts Between Security and Privacy Measures in Software Requirements Engineering
    Ganji, Daniel
    Mouratidis, Haralambos
    Gheytassi, Saeed Malekshahi
    Petridis, Miltos
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 323 - 334
  • [4] Extracting and Classifying Requirements from Software Engineering Contracts
    Sainani, Abhishek
    Anish, Preethu Rose
    Joshi, Vivek
    Ghaisas, Smita
    2020 28TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE'20), 2020, : 147 - 157
  • [5] Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering
    Mellado, Daniel
    Rodriguez, Jesus
    Fernandez-Medina, Eduardo
    Piattini, Mario
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 224 - +
  • [6] Visualising privacy and security for requirements engineering
    Kreeger, MN
    Duncan, I
    SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
  • [7] Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements
    Hassan, R.
    Eltoweissy, M.
    Bohner, S.
    El-Kassas, S.
    IET SOFTWARE, 2010, 4 (02) : 149 - 160
  • [8] Integrating Security and Privacy in Quantum Software Engineering
    Barletta, Vita Santa
    Caivano, Danilo
    Pal, Anibrata
    PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 538 - 547
  • [9] REASONABLENESS MEETS REQUIREMENTS: REGULATING SECURITY AND PRIVACY IN SOFTWARE
    Otto, Paul N.
    DUKE LAW JOURNAL, 2009, 59 (02) : 309 - 342
  • [10] Software Security Requirements Engineering: State of the Art
    Ramachandran, Muthu
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 313 - 322