2013 21st IEEE International Requirements Engineering Conference (RE) 2013
DOI: 10.1109/re.2013.6636701
|View full text |Cite
|
Sign up to set email alerts
|

Formal analysis of privacy requirements specifications for multi-tier applications

Abstract: Companies require data from multiple sources to develop new information systems, such as social networking, e-commerce, and location-based services. Systems rely on complex, multi-stakeholder data supply-chains to deliver value. These data supply-chains have complex privacy requirements: Privacy policies affecting multiple stakeholders (e.g., user, developer, company, government) regulate the collection, use, and sharing of data over multiple jurisdictions (e.g. California, United States, Europe). Increasingly… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 16 publications
0
14
0
Order By: Relevance
“…There have been some recent papers on extracting privacy requirements from privacy regulations and laws [9,10]. These could be part of the privacy framework as well and help in reducing the impact due to cultural differences for privacy.…”
Section: Related Workmentioning
confidence: 99%
“…There have been some recent papers on extracting privacy requirements from privacy regulations and laws [9,10]. These could be part of the privacy framework as well and help in reducing the impact due to cultural differences for privacy.…”
Section: Related Workmentioning
confidence: 99%
“…AppSent * a sentence in app's privacy policy whose main verb ∈ V P * Res AppP P * resources that the app will * according to an app's privacy policy Res AppP P * resources that app will not * according to an app's privacy policy LibSent * a sentence in lib's privacy policy whose main verb ∈ V P * Res LibP P * resources to the lib will * according to the lib's privacy policy Table I lists the symbols related to privacy policy. We summarize four types of main verbs, which are commonly used in privacy policies, as suggested by [27], [28], including:…”
Section: Main Verbs Sentences and Resourcesmentioning
confidence: 99%
“…Maxwell and Antón [40] formalized legal texts of the Health Insurance Portability and Accountability Act as production rule models to support regulatory compliance analysis. Breaux et al performed extensive research on formalizing legal text for supporting compliance verification of software requirements with regulations in order to establish traceability between requirements and regulations [6,8,7].…”
Section: Related Workmentioning
confidence: 99%