Mining and Analysing Security Goal Models in Health Information Systems

被引:3
|
作者
Weber-Jahnke, Jens H. [1 ]
Onabajo, Adeniyi [1 ]
机构
[1] Univ Victoria, Dept Comp Sci, Victoria, BC, Canada
关键词
REQUIREMENTS; SUPPORT;
D O I
10.1109/SEHC.2009.5069605
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Large-scale health information software systems have to adhere to complex, multi-lateral security and privacy regulations. Such regulations are typically defined in form Of natural language (NL) documents. There is little methodological support for bridging the gap between NL regulations and the requirements engineering methods that have been developed by the software engineering community. This paper presents a method and tool support, which are aimed at narrowing this gap by mining and analysing structured security requirements in unstructured NL regulations. A key value proposition of our approach is that requirements are mined "in-place", i.e., the structured model is tightly integrated with the NL text. This results in better traceability and enables an iterative rather than waterfall-like requirements extraction and analysis process. The tool and method have been evaluated in context of a real-world, large scale project, i.e., the Canadian Electronic Health Record.
引用
收藏
页码:42 / 52
页数:11
相关论文
共 50 条
  • [21] A mapping of Information Security in Health Information Systems in Latin America and Brazil
    Pereira, Samaris Ramiro
    Lopes Fernandes, Joao Carlos
    Labrada, Luis
    Bandiera-Paiva, Paulo
    [J]. INFORMATICS, MANAGEMENT AND TECHNOLOGY IN HEALTHCARE, 2013, 190 : 123 - 125
  • [22] A Survey of Security Standards Applicable to Health Information Systems
    Akowuah, Francis
    Yuan, Xiaohong
    Xu, Jinsheng
    Wang, Hong
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2013, 7 (04) : 22 - 36
  • [23] Privacy and security shield for health information systems (e-health)
    Ulieru, Mihaela
    Ionescu, Dan
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (03): : 215 - 221
  • [24] Privacy and security shield for health information systems (e-health)
    Ulieru, M
    Ionescu, D
    [J]. IECON 2004 - 30TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOL. 1, 2004, : 496 - 501
  • [25] Pathway Supporting Health Information Systems: Interdisciplinary Goal Integration - A Review
    Scheplitz, Tim
    [J]. INNOVATION THROUGH INFORMATION SYSTEMS, VOL I: A COLLECTION OF LATEST RESEARCH ON DOMAIN ISSUES, 2021, 46 : 79 - 87
  • [26] Constructing Conceptual Model for Security Culture in Health Information Systems Security Effectiveness
    Shahri, Ahmad Bakhtiyari
    Ismail, Zuraini
    Ab Rahim, Nor Zairah
    [J]. ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, 2013, 206 : 213 - 220
  • [27] Analysing the Security of NFC Based Payment Systems
    Tabet, Nour Elhouda
    Ayu, Media Anugerah
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATICS AND COMPUTING (ICIC), 2016, : 169 - 174
  • [28] Analysing Virtual Machine Security in Cloud Systems
    Al Said, Taimur
    Rana, Omer F.
    [J]. INTELLIGENT CLOUD COMPUTING, 2015, 8993 : 137 - 151
  • [29] Cyberinfrastructure for homeland security: Advances in information sharing, data mining, and collaboration systems
    Raghu, T. S.
    Chen, Hsinchun
    [J]. DECISION SUPPORT SYSTEMS, 2007, 43 (04) : 1321 - 1323
  • [30] Information Security in Big Data Mining
    Revathi, T.
    Sudharsana, V
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 2045 - 2049