首页> 外文会议>ACM symposium on Applied Computing >Identifying vulnerabilities and critical requirements using criminal court proceedings
【24h】

Identifying vulnerabilities and critical requirements using criminal court proceedings

机译:使用刑事法院程序确定漏洞和关键要求

获取原文

摘要

Information systems governed by laws and regulations are subject to civil and criminal violations. In the United States, these violations are documented in court records, such as complaints, indictments, plea agreements, and verdicts, which thus constitute a source of real-world software vulnerabilities. This paper reports on an exploratory case study to identify legal vulnerabilities and provides guidance to practitioners in the analysis of court documents. As legal violations occur after system deployment, court records reveal vulnerabilities that were likely overlooked during software development. We evaluate established requirements engineering techniques, including sequence and misuse case diagrams and goal models, as applied to criminal court records to identify mitigating requirements that improve privacy protections. These techniques, when properly applied, can help organizations focus their risk-management efforts on emerging legal vulnerabilities. We illustrate our analysis using criminal indictments involving the U.S. Health Insurance Portability and Accountability Act (HIPAA).
机译:受法律和法规约束的信息系统可能会遭受民事和刑事侵害。在美国,这些违规行为记录在法庭记录中,例如投诉,起诉,辩诉协议和判决,因此构成了现实世界中的软件漏洞。本文报告了一项探索性案例研究,以识别法律漏洞,并为从业人员在法庭文件分析中提供指导。由于在系统部署后发生了违反法律的行为,法院记录显示了在软件开发过程中可能被忽略的漏洞。我们评估已建立的需求工程技术,包括序列和滥用案例图和目标模型,这些技术已应用于刑事法院记录,以识别缓解风险的需求,从而改善隐私保护。如果正确应用这些技术,它们可以帮助组织将风险管理工作集中在新出现的法律漏洞上。我们使用涉及《美国健康保险可移植性和责任法案》(HIPAA)的刑事起诉来说明我们的分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号