Automated Identification of Security and Privacy Requirements from Software Engineering Contracts

被引:1
|
作者
Jain, Chirag [1 ]
Anish, Preethu Rose [1 ]
Ghaisas, Smita [1 ]
机构
[1] TCS Res, Chennai, Tamil Nadu, India
关键词
Software Engineering Contracts; Security and Privacy Requirements; Natural Language Generation model; Text-to-Text Transfer Transformer (T5);
D O I
10.1109/REW57809.2023.00047
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The increasing prevalence of information disclosure, data breach and privacy risk has obliged the incorporation of security and privacy measures while designing software systems. With rise in concerns related to security and privacy, different laws and regulations have been enacted to protect vulnerable information. Complying with these laws and regulations is essential for software systems to manage vulnerable information. To comply with these laws, it is important to identify obligatory security and privacy requirements from Software Engineering (SE) contracts while designing software systems. However, manually identifying these requirements from contracts is error-prone and a difficult task given that contracts are written in Legalese and is not comprehensible to software developers who have to implement these security and privacy measures into the software. To mitigate this, we propose an approach to automatically identify obligatory security and privacy requirements from SE contracts. Our approach leverages the power of state-of-the-art Natural Language Generation transformer model T5 (Text-to-Text Transfer Transformer). We achieved a Fl-score of 91% with T5 for identification of security and privacy requirements.
引用
收藏
页码:234 / 238
页数:5
相关论文
共 50 条
  • [31] Deriving engineering software from requirements
    Williamson, K
    Healy, M
    JOURNAL OF INTELLIGENT MANUFACTURING, 2000, 11 (01) : 3 - 28
  • [32] Deriving engineering software from requirements
    Keith Williamson
    Michael Healy
    Journal of Intelligent Manufacturing, 2000, 11 : 3 - 28
  • [33] Identification, Assessment and Automated Classification of Requirements Engineering Techniques
    Jarzebowicz, Aleksander
    Sztramski, Kacper
    SOFTWARE ENGINEERING METHODS IN INTELLIGENT ALGORITHMS, VOL 1, 2019, 984 : 200 - 212
  • [34] How to Integrate Security Compliance Requirements with Agile Software Engineering at Scale?
    Moyon, Fabiola
    Mendez, Daniel
    Beckers, Kristian
    Klepper, Sebastian
    PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT (PROFES 2020), 2020, 12562 : 69 - 87
  • [35] Engineering Privacy Requirements Valuable Lessons from Another
    Martin, Yod-Samuel
    del Alamo, Jose M.
    Yelmo, Juan C.
    2014 IEEE 1ST WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE), 2014, : 19 - 24
  • [36] System security requirements: A framework for early identification, specification and measurement of related software requirements
    Meridji, Kenza
    Al-Sarayreh, Khalid T.
    Abran, Alain
    Trudel, Sylvie
    COMPUTER STANDARDS & INTERFACES, 2019, 66
  • [37] Security Requirements Engineering From TARA to PenTest
    Ebert, Christof
    2019 27TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2019), 2019, : 500 - 501
  • [38] System Identification for Adaptive Software Systems: A Requirements Engineering Perspective
    Souza, Vitor E. Silva
    Lapouchnian, Alexei
    Mylopoulos, John
    CONCEPTUAL MODELING - ER 2011, 2011, 6998 : 346 - +
  • [39] From Requirements to Software Design: An Automated Solution for Packaging Software Classes
    Amannejad, Yasaman
    Moshirpour, Mohammad
    Far, Behrouz H.
    Alhajj, Reda
    2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2014, : 36 - 43
  • [40] Commitment analysis to operationalize software requirements from privacy policies
    Young, Jessica D.
    REQUIREMENTS ENGINEERING, 2011, 16 (01) : 33 - 46