skip to main content
10.1145/1276318.1276346acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicailConference Proceedingsconference-collections
Article

How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach

Published:04 June 2007Publication History

ABSTRACT

Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary security measures. Several frameworks have been proposed to deal with thii issue. For instance, purpose-based access control is normally considered a good solution for meeting the requirements of privacy legislation. Yet, understanding why, how, and when such solutions to security and privacy problems have to be deployed is often unanswered.

In this paper, we look at the problem from a broader perspective, accounting for legal and organizational issues. Security engineers and legal experts should be able to start from the organizational model and derive from there the points where security and privacy problems may arise and determine which solutions best fit the (legal) problems that they face. In particular, we investigate the methodology needed to capture security and privacy requirements for a Health Care Centre using a smart items infrastructure.

References

  1. T. J. M. Bench-Capon, G. O. Robinson, T. W. Routen, and M. J. Sergot. Logic programming for large scale applications in law: A formalisation of supplementary benefit legislation. In Proc. of ICAIL'87, pages 190--198. ACM Press, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. J. M. Bench-Capon and G. Sartor. A model of legal reasoning with cases incorporating theories and values. Artif. Intell., 150(1--2):97--143, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. K. D. M. and E. M. C. Final technical report: Security patterns for web application development. Technical report, 2002. Available at http://www.scrypt.net/Google ScholarGoogle Scholar
  4. E. Fernandez and R. Pan. A Pattern Language for Security Models. In In Proc. of PLoP'01, 2001.Google ScholarGoogle Scholar
  5. E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P. Giorgini, F. Massacci, and N. Zannone. Security and Trust Requirements Engineering. In FOSAD 2004/2005, LNCS 3655, pages 237--272. Springer-Verlag, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. ISO. Quality Management Systems: Requirements. ISO 9001:2000, 2000.Google ScholarGoogle Scholar
  8. S. Kanger. Law and logic. Theoria, 38(3):105--132, 1972.Google ScholarGoogle ScholarCross RefCross Ref
  9. S. Konrad, B. H. C. Cheng, L. A. Campbell, and R. Wassermann. Using security patterns to model and analyze security requirements. In Proc. of RHAS'03. IEEE Press, 2003.Google ScholarGoogle Scholar
  10. R. A. Kowalski and M. J. Sergot. Computer Representation of the Law. In Proc. of IJCAI'05, pages 1269--1270. Morgan Kaufmann, 1985.Google ScholarGoogle Scholar
  11. L. Lamport. How to write a long formula. Formal Aspects of Comp., 6(5):580--584, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  12. F. Massacci, J. Mylopoulos, and N. Zannone. An Ontology for Secure Socio-Technical Systems. In Handbook of Ontologies for Business Interaction. The IDEA Group, 2007.Google ScholarGoogle Scholar
  13. H. Mouratidis, M. Weiss, and P. Giorgini. Security patterns meet agent oriented software engineering: a complementary solution for developing security information systems. In In Proc. of ER'05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Schumacher. Security Engineering with Patterns: Origins, Theoretical Models, and New Applications. Springer-Verlag, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Yoder and J. Barcalow. Architectural Patterns for Enabling Application Security. In In Proc. of PLoP'97, 1997.Google ScholarGoogle Scholar

Index Terms

  1. How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICAIL '07: Proceedings of the 11th international conference on Artificial intelligence and law
        June 2007
        302 pages
        ISBN:9781595936806
        DOI:10.1145/1276318
        • Conference Chair:
        • Anne Gardner,
        • Program Chair:
        • Radboud Winkels

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 June 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate69of169submissions,41%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader