Automated Identification of Security and Privacy Requirements from Software Engineering Contracts

被引:1
|
作者
Jain, Chirag [1 ]
Anish, Preethu Rose [1 ]
Ghaisas, Smita [1 ]
机构
[1] TCS Res, Chennai, Tamil Nadu, India
关键词
Software Engineering Contracts; Security and Privacy Requirements; Natural Language Generation model; Text-to-Text Transfer Transformer (T5);
D O I
10.1109/REW57809.2023.00047
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The increasing prevalence of information disclosure, data breach and privacy risk has obliged the incorporation of security and privacy measures while designing software systems. With rise in concerns related to security and privacy, different laws and regulations have been enacted to protect vulnerable information. Complying with these laws and regulations is essential for software systems to manage vulnerable information. To comply with these laws, it is important to identify obligatory security and privacy requirements from Software Engineering (SE) contracts while designing software systems. However, manually identifying these requirements from contracts is error-prone and a difficult task given that contracts are written in Legalese and is not comprehensible to software developers who have to implement these security and privacy measures into the software. To mitigate this, we propose an approach to automatically identify obligatory security and privacy requirements from SE contracts. Our approach leverages the power of state-of-the-art Natural Language Generation transformer model T5 (Text-to-Text Transfer Transformer). We achieved a Fl-score of 91% with T5 for identification of security and privacy requirements.
引用
收藏
页码:234 / 238
页数:5
相关论文
共 50 条
  • [41] Commitment analysis to operationalize software requirements from privacy policies
    Jessica D. Young
    Requirements Engineering, 2011, 16 : 33 - 46
  • [42] (UN)ETHICAL SOFTWARE ENGINEERING A critical review about Software Engineering in face of Security Requirements in the IoT/IoE Society
    Sauches Flores, Fabiana Figueira
    de Lemos Meira, Silvio Romero
    2021 15TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2021), 2021,
  • [43] Security and privacy requirements in interactive TV
    Dhiah el Diehn I. Abou-Tair
    Ingo Köster
    Kathrin Höfke
    Multimedia Systems, 2011, 17 : 393 - 408
  • [44] Automated Classification of Security Requirements
    Jindal, Rajni
    Malhotra, Ruchika
    Jain, Abha
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 2027 - 2033
  • [45] ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY
    KINGSLAKE, R
    INFORMATION PRIVACY, 1979, 1 (07): : 312 - 314
  • [46] Security and privacy requirements in interactive TV
    Abou-Tair, Dhiah el Diehn I.
    Koester, Ingo
    Hoefke, Kathrin
    MULTIMEDIA SYSTEMS, 2011, 17 (05) : 393 - 408
  • [47] Requirements by contracts allow automated system testing
    Nebut, C
    Fleurey, F
    Le Traon, Y
    Jézéquel, JM
    ISSRE 2003: 14TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2003, : 85 - 96
  • [48] Security requirements for software development
    Kim, TH
    Shin, MC
    Kim, SH
    Cha, JS
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2004, 3215 : 116 - 122
  • [49] Welcome to the Eleventh International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'24)
    University of Maine, United States
    不详
    不详
    不详
    Proc. - IEEE Int. Requir. Eng. Conf. Workshops, REW, 2024, (230):
  • [50] Welcome to the Tenth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'23)
    Ki-Aries, Duncan
    Lee, Seok-Won
    Salnitri, Mattia
    2023 IEEE 31ST INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS, REW, 2023, : 213 - 213