Eliciting confidentiality requirements in practice

نویسندگان

  • Seda F. Gürses
  • Jens H. Weber
  • Christina Obry
  • Adeniyi Onabajo
  • Thomas Santen
  • Morgan Price
چکیده

Confidentiality, the protection of unauthorized disclosure of information, plays an important role in information security of software systems. Security researchers have developed numerous approaches on how to implement confidentiality, typically based on cryptographic algorithms and tight access control. However, less work has been done on defining systematic methods on how to elicit and define confidentiality requirements in the first place. Moreover, most of these approaches are illustrated with simulated examples that do not capture the richness of real world experience. This paper reports on our experiences eliciting confidentiality requirements in a real world project in the health care area. The method applied originates from the M.Sc. thesis of one of the authors and is still considered work in progress. Still, valuable insight into issues of confidentiality requirements engineering can be gained Copyright c © 2005 S. Güerses and all other authors named above. Permission to copy is hereby granted provided the original copyright notice is reproduced in copies made. from this case study and we expect that its publication will become a basis for discussion and the definition of a further research agenda in this area.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Elicitation Strategies for Web Application Using Activity Theory

Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...

متن کامل

Elicitation Strategies for Web Application Using Activity Theory

Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perce...

متن کامل

رازداری در محیط داروخانه

Confidentiality is considered as a principle commitment of all health care professionals. Respecting confidentiality creates and maintains the trust between patients and health professionals. Patients should be assured that their information will be kept confidential unless there is a persuasive reason. Confidentiality originates from principle of patient’s autonomy, and there is no need to ...

متن کامل

Eliciting Efficiency Requirements with Use Cases

Non-functional requirements provide the glue between functional requirements and architectural decisions. Thus, it is important to elicit and specify the nonfunctional requirements precisely. In practice, however, they are mostly neglected. In this paper, we sketch an approach developed in the context of the EMPRESS project, which allows efficiency requirements to be elicited in conjunction wit...

متن کامل

رازداری در علوم پزشکی

Confidentiality is an inevitable pillar of the history of the physician-patient relationship. Misunderstanding of this principle not only causes harm to sanctity of the medical profession, but also can damage the quality of the therapeutic relationship, and more broadly public health. The keystone of this negative effect is the potential harm to the patients’ trust and confidence. Generally, th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005