Browsing by Author "Islam, S."
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Metadata only Extracting security requirements from relevant laws and regulations(IEEE, 2012-07-16) Zarrabi, Jorshari Fatemeh; Mouratidis, H.; Islam, S.—For software systems that process and manage sensitive information, compliance with laws has become not an option but a necessity. Analysing relevant laws and aligning them with the system requirements is necessary for attaining compliance issues. But analyzing laws within the context of software system requirements is a difficult task, mainly because the concepts used in legal texts are different compared to the concepts used in requirements engineering. This paper contributes to that direction. In particular it presents a process to model and analyse laws and regulations and to support the elicitation of security requirements based on the relevant legal and system context. Finally a case study is used to demonstrate the applicability of the proposed approach.Item Metadata only A Meta-model for Legal Compliance and Trustworthiness of Information Systems(Springer, 2012-06-25) Zarrabi, Jorshari Fatemeh; Pavlidis, Michalis; Mouratidis, H.; Preston, David; Islam, S.Information systems manage and hold a huge amount of important and critical information. For this reason, information systems must be trustworthy and should comply with relevant laws and regulations. Legal issues should be incorporated into the system development process and there should be a systematic and structured assessment of a system’s trustworthiness to fulfil relevant legal obligations. This paper presents a novel meta-model, which combines legal and trust related concepts, to enable information systems developers to model and reason about the trustworthiness of a system in terms of its law compliance. A case study is used to demonstrate the applicability and benefits of the proposed meta-model.Item Open Access To Comply Software and IT System Development with Related Laws(2011-01-09) Zarrabi, Jorshari Fatemeh; Islam, S.; Mouratidis, H.. Accretion procedure of crimes and security breaches against the privacy of individual’s information and their maintenance information systems has cost huge amount of financial and other resources loose. Consequently governments take serious actions toward approving protective legislation against cyber crimes and it will be duty of software developers to adopt policies and measures to ensure that their designed systems are compatible with existing laws and their amendments. Since information technology and legislation are two quite distinct sciences, existence of a mechanism to do this adjustment and satisfy security and legal requirements of a designing software system is very essential. This paper is representing a framework that will help IT professionals to extract security requirements from relevant rules and use them in design of a system which is in accordance with those rules. It is giving brief discussion of the framework’s methodology and design of a simulating computer-aided system of this framework. It also reports the research progress and new discovered conclusions.