Mining and Analysing Security Goal Models in Health Information Systems

被引:3
|
作者
Weber-Jahnke, Jens H. [1 ]
Onabajo, Adeniyi [1 ]
机构
[1] Univ Victoria, Dept Comp Sci, Victoria, BC, Canada
关键词
REQUIREMENTS; SUPPORT;
D O I
10.1109/SEHC.2009.5069605
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Large-scale health information software systems have to adhere to complex, multi-lateral security and privacy regulations. Such regulations are typically defined in form Of natural language (NL) documents. There is little methodological support for bridging the gap between NL regulations and the requirements engineering methods that have been developed by the software engineering community. This paper presents a method and tool support, which are aimed at narrowing this gap by mining and analysing structured security requirements in unstructured NL regulations. A key value proposition of our approach is that requirements are mined "in-place", i.e., the structured model is tightly integrated with the NL text. This results in better traceability and enables an iterative rather than waterfall-like requirements extraction and analysis process. The tool and method have been evaluated in context of a real-world, large scale project, i.e., the Canadian Electronic Health Record.
引用
收藏
页码:42 / 52
页数:11
相关论文
共 50 条
  • [1] Leveraging Goal Models and Performance Indicators to Assess Health Care Information Systems
    Kuziemsky, Craig
    Liu, Xia
    Peyton, Liam
    [J]. QUATIC 2010: SEVENTH INTERNATIONAL CONFERENCE ON THE QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY, 2010, : 222 - 227
  • [2] PERSONALIZED INFORMATION SECURITY IN HEALTH INFORMATION SYSTEMS
    Kablukov, A. A.
    Ivankova, I. A.
    [J]. ZAPOROZHYE MEDICAL JOURNAL, 2012, (06) : 91 - 93
  • [3] Behavioral adaptation of information systems through goal models
    Liaskos, Sotirios
    Khan, Shakil M.
    Litoiu, Marin
    Jungblut, Marina Daoud
    Rogozhkin, Vyacheslav
    Mylopoulos, John
    [J]. INFORMATION SYSTEMS, 2012, 37 (08) : 767 - 783
  • [4] Priority indexing model for evaluating and analysing organisations' information security systems
    Zaied, Abdel Nasser H.
    [J]. International Journal of Information Systems and Change Management, 2009, 4 (01) : 57 - 65
  • [5] Issues of security and network security in health care information systems
    Patel, A
    Kantzavelou, I
    [J]. TOWARDS SECURITY IN MEDICAL TELEMATICS: LEGAL AND TECHNICAL ASPECTS, 1996, 27 : 216 - 223
  • [6] CORBA security services for health information systems
    Blobel, B
    Holena, M
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 1998, 52 (1-3) : 29 - 37
  • [7] SECURITY FOR DECENTRALIZED HEALTH INFORMATION-SYSTEMS
    BLEUMER, G
    [J]. INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1994, 35 : 139 - 145
  • [8] Security and privacy of electronic health information systems
    Bertino, Elisa
    Deng, Robert H.
    Huang, Xinyi
    Zhou, Jianying
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (06) : 485 - 486
  • [9] Security and privacy of electronic health information systems
    Elisa Bertino
    Robert H. Deng
    Xinyi Huang
    Jianying Zhou
    [J]. International Journal of Information Security, 2015, 14 : 485 - 486
  • [10] A security architecture for interconnecting health information systems
    Gritzalis, D
    Lambrinoudakis, C
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2004, 73 (03) : 305 - 309