Automated Identification of Security and Privacy Requirements from Software Engineering Contracts

被引:1
|
作者
Jain, Chirag [1 ]
Anish, Preethu Rose [1 ]
Ghaisas, Smita [1 ]
机构
[1] TCS Res, Chennai, Tamil Nadu, India
关键词
Software Engineering Contracts; Security and Privacy Requirements; Natural Language Generation model; Text-to-Text Transfer Transformer (T5);
D O I
10.1109/REW57809.2023.00047
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The increasing prevalence of information disclosure, data breach and privacy risk has obliged the incorporation of security and privacy measures while designing software systems. With rise in concerns related to security and privacy, different laws and regulations have been enacted to protect vulnerable information. Complying with these laws and regulations is essential for software systems to manage vulnerable information. To comply with these laws, it is important to identify obligatory security and privacy requirements from Software Engineering (SE) contracts while designing software systems. However, manually identifying these requirements from contracts is error-prone and a difficult task given that contracts are written in Legalese and is not comprehensible to software developers who have to implement these security and privacy measures into the software. To mitigate this, we propose an approach to automatically identify obligatory security and privacy requirements from SE contracts. Our approach leverages the power of state-of-the-art Natural Language Generation transformer model T5 (Text-to-Text Transfer Transformer). We achieved a Fl-score of 91% with T5 for identification of security and privacy requirements.
引用
收藏
页码:234 / 238
页数:5
相关论文
共 50 条
  • [21] Requirements engineering to audit privacy issues in medical and health software
    Martinez, Miguel A.
    Toval, Ambrosio
    Campos, Manuel
    HEALTHINF 2008: PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON HEALTH INFORMATICS, VOL 2, 2008, : 74 - 81
  • [22] Automated Identification of Deontic Modalities in Software Engineering Contracts: A Domain Adaptation-based Generative Approach
    Rejithkumar, Gokul
    Anish, Preethu Rose
    Ghaisas, Sinita
    2023 IEEE 31ST INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS, REW, 2023, : 72 - 75
  • [23] Towards security requirements management for software product lines:: A security domain requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (06) : 361 - 371
  • [25] Precluding incongruous behavior by aligning software requirements with security and privacy policies
    Antón, AI
    Earp, JB
    Carter, RA
    INFORMATION AND SOFTWARE TECHNOLOGY, 2003, 45 (14) : 967 - 977
  • [26] How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
    Compagna, Luca
    El Khoury, Paul
    Krausova, Alzbeta
    Massacci, Fabio
    Zannone, Nicola
    ARTIFICIAL INTELLIGENCE AND LAW, 2009, 17 (01) : 1 - 30
  • [27] Domain Adaptation for an Automated Classification of Deontic Modalities in Software Engineering Contracts
    Joshi, Vivek
    Anish, Preethu Rose
    Ghaisas, Smita
    PROCEEDINGS OF THE 29TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '21), 2021, : 1275 - 1280
  • [28] Engineering safety and security related requirements for software intensive systems
    Firesmith, Donald G.
    29th International Conference on Software Engineering: ICSE 2007 Companion Volume, Proceedings, 2007, : 169 - 169
  • [29] Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology
    Diamantopoulou, Vasiliki
    Mouratidis, Haralambos
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 382 - 400
  • [30] Automated support for reuse-based requirements engineering in global software engineering
    Carrillo de Gea, Juan Manuel
    Nicolas, Joaquin
    Fernandez-Aleman, Jose L.
    Toval, Ambrosio
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2017, 29 (08)