Repository logo
  • Log In
Repository logo
  • Communities & Collections
  • All of DORA
  • Log In
  1. Home
  2. Browse by Author

Browsing by Author "Islam, S."

Now showing 1 - 3 of 3
Results Per Page
Sort Options
  • No Thumbnail Available
    ItemMetadata only
    Extracting security requirements from relevant laws and regulations
    (IEEE, 2012-07-16) Zarrabi, Jorshari Fatemeh; Mouratidis, H.; Islam, S.
    —For software systems that process and manage sensitive information, compliance with laws has become not an option but a necessity. Analysing relevant laws and aligning them with the system requirements is necessary for attaining compliance issues. But analyzing laws within the context of software system requirements is a difficult task, mainly because the concepts used in legal texts are different compared to the concepts used in requirements engineering. This paper contributes to that direction. In particular it presents a process to model and analyse laws and regulations and to support the elicitation of security requirements based on the relevant legal and system context. Finally a case study is used to demonstrate the applicability of the proposed approach.
  • No Thumbnail Available
    ItemMetadata only
    A Meta-model for Legal Compliance and Trustworthiness of Information Systems
    (Springer, 2012-06-25) Zarrabi, Jorshari Fatemeh; Pavlidis, Michalis; Mouratidis, H.; Preston, David; Islam, S.
    Information systems manage and hold a huge amount of important and critical information. For this reason, information systems must be trustworthy and should comply with relevant laws and regulations. Legal issues should be incorporated into the system development process and there should be a systematic and structured assessment of a system’s trustworthiness to fulfil relevant legal obligations. This paper presents a novel meta-model, which combines legal and trust related concepts, to enable information systems developers to model and reason about the trustworthiness of a system in terms of its law compliance. A case study is used to demonstrate the applicability and benefits of the proposed meta-model.
  • Loading...
    Thumbnail Image
    ItemOpen Access
    To Comply Software and IT System Development with Related Laws
    (2011-01-09) Zarrabi, Jorshari Fatemeh; Islam, S.; Mouratidis, H.
    . Accretion procedure of crimes and security breaches against the privacy of individual’s information and their maintenance information systems has cost huge amount of financial and other resources loose. Consequently governments take serious actions toward approving protective legislation against cyber crimes and it will be duty of software developers to adopt policies and measures to ensure that their designed systems are compatible with existing laws and their amendments. Since information technology and legislation are two quite distinct sciences, existence of a mechanism to do this adjustment and satisfy security and legal requirements of a designing software system is very essential. This paper is representing a framework that will help IT professionals to extract security requirements from relevant rules and use them in design of a system which is in accordance with those rules. It is giving brief discussion of the framework’s methodology and design of a simulating computer-aided system of this framework. It also reports the research progress and new discovered conclusions.
Quick Links
  • De Montfort University Home
  • Library Learning Services
  • DMU Figshare (DMU's Data Repository)
Useful Links
  • Submission Guide
  • DMU Open Access Libguide
  • Take Down Policy
  • Connect with DORA

Kimberlin Library

De Montfort University
The Gateway
Leicester, LE1 9BH
0116 257 7042
justask@dmu.ac.uk

DSpace software copyright © 2002-2025 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback