Proceedings of the 6th International Conference on Information Systems Security and Privacy 2020
DOI: 10.5220/0008960604730480
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…The GDPR is a strong regulation on privacy and provides detailed explanations for each role of a stake holder [11]. Stakeholders related to privacy and de-identification are well represented in the GDPR.…”
Section: Stakeholdermentioning
confidence: 99%
“…The GDPR is a strong regulation on privacy and provides detailed explanations for each role of a stake holder [11]. Stakeholders related to privacy and de-identification are well represented in the GDPR.…”
Section: Stakeholdermentioning
confidence: 99%
“…It facilitates the process of identifying and analyzing six types of threats, namely Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of privileges, in which the initials form the acronym STRIDE. Each of these threats corresponds to the violation of a desirable property (security objective) of the system under study, as follows: STRIDE can be used to analyze threats for systems being in a variety of development phases, even for systems at the design phase; thus, it enables adherence to security-bydesign principles [41]. Furthermore, even though originally designed for software systems, STRIDE has been also used in ecosystem environments where CPSs are prominently present [42][43][44].…”
Section: Stridementioning
confidence: 99%
“…STRIDE can be used to analyze threats for systems being in a variety of development phases, even for systems at the design phase; thus, it enables adherence to security-by-design principles [ 41 ]. Furthermore, even though originally designed for software systems, STRIDE has been also used in ecosystem environments where CPSs are prominently present [ 42 , 43 , 44 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, literature related to the GDPR and RE (RQ3) charts possibilities of utilizing NLP to assist with manual tasks. The literature discusses, among other things, methods and approaches towards achieving GDPR-compliance during the requirements engineering process, which include the manual processing of textual data forms [14], matching related requirements to avoid duplication and tracking requirements [53]. NLP can assist industry professionals with these manual and potentially repetitive tasks.…”
Section: Bridging the Gapmentioning
confidence: 99%