Towards a Common Security and Privacy Requirements Elicitation Methodology

被引:2
|
作者
Makri, Eleni-Laskarina [1 ]
Lambrinoudakis, Costas [1 ]
机构
[1] Univ Piraeus, Piraeus, Greece
关键词
Security requirements; Privacy requirements; Privacy principles; Risk analysis;
D O I
10.1007/978-3-319-23276-8_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are many methodologies that have been proposed in the literature for identifying the security and privacy requirements that must be satisfied by an information system in order to protect its users. At the same time, there are several "privacy principles" that have been considered as equally important for the avoidance of privacy violation incidents. However, to the best of our knowledge, there is no methodology that can cover both the identification of the security and privacy requirements and at the same time to take into account the main privacy principles. The consequence is that the designers of an information system usually follow an ad hoc approach for the identification of security/privacy requirements, thus failing to protect users in an effective way. This paper introduces the main idea behind a methodology that integrates the basic steps of well-established risk analysis methodologies with those of methodologies used for the identification of privacy requirements, considering, at the same time, the most well-known privacy principles. The proposed methodology aims to assist information system designers to come up with a complete and accurate list of all security and privacy requirements that must be satisfied by the system.
引用
收藏
页码:151 / 159
页数:9
相关论文
共 50 条
  • [41] Security requirements elicitation via weaving scenarios based on security evaluation criteria
    Itoga, Hiroya
    Ohnishi, Atsushi
    USIC 2007: PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2007, : 70 - 79
  • [42] TOWARDS A STRATEGIC REQUIREMENTS ELICITATION A Proposal of the PRINCE Model
    Nakatani, Takako
    Hori, Shouzo
    Tsuda, Michio
    Inoki, Mari
    Katamine, Keiichi
    Hashimoto, Masaaki
    ICSOFT 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 1, 2009, : 145 - +
  • [43] Towards a multiple ontology framework for requirements elicitation and reuse
    Li Zong-yong
    Wang Zhi-xue
    Yang Ying-ying
    Wu Yue
    Liu Ying
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL I, PROCEEDINGS, 2007, : 189 - +
  • [44] Towards Goal-Oriented Software Requirements Elicitation
    Redouane, Abdesselam
    2021 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2021, : 596 - 599
  • [45] Prototyping for requirements elicitation and validation: A participative prototype evaluation methodology
    Hickey, AM
    Dean, DL
    ASSOCIATION FOR INFORMATION SYSTEMS PROCEEDINGS OF THE AMERICAS CONFERENCE ON INFORMATION SYSTEMS, 1998, : 798 - 800
  • [46] Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners
    Canedo, Edna Dias
    Bandeira, Ian Nery
    Seidel Calazans, Angelica Toffano
    Teixeira Costa, Pedro Henrique
    Rodrigues Cancado, Emille Catarine
    Bonifacio, Rodrigo
    REQUIREMENTS ENGINEERING, 2023, 28 (02) : 177 - 194
  • [47] Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners
    Edna Dias Canedo
    Ian Nery Bandeira
    Angelica Toffano Seidel Calazans
    Pedro Henrique Teixeira Costa
    Emille Catarine Rodrigues Cançado
    Rodrigo Bonifácio
    Requirements Engineering, 2023, 28 : 177 - 194
  • [48] The hidden meta-requirements of security and privacy
    Spafford, G
    FIFTH IEEE INTERNATIONAL SYMPOSIUM ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2001, : 10 - 10
  • [49] Requirements for Security, Privacy, and Trust in the Internet of Things
    Mohammed, Sabah
    Kim, Tai-Hoon
    Fang, Wai Chi
    IEEE SECURITY & PRIVACY, 2021, 19 (01) : 8 - 10
  • [50] Security and Privacy in Video Surveillance: Requirements and Challenges
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 169 - 184