首页> 外文期刊>Computer standards & interfaces >Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
【24h】

Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation

机译:在实践中使用安全需求工程方法:符合意大利数据保护法规

获取原文
获取原文并翻译 | 示例
       

摘要

Extending Requirements Engineering modelling and formal analysis methodologies to cope with Security Requirements has been a major effort in the past decade. Yet, only few works describe complex case studies that show the ability of the informal and formal approaches to cope with the level complexity required by compliance with ISO-17799 security management requirements. In this paper we present a comprehensive case study of the application of the Secure Tropos RE methodology for compliance to the Italian legislation on Privacy and Data Protection by the University of Trento, leading to the definition and analysis of a ISO-17799-like security management scheme.
机译:在过去的十年中,扩展需求工程模型和形式分析方法以应对安全需求一直是一项重大工作。但是,只有很少的作品描述了复杂的案例研究,这些案例研究显示了非正式和正式方法能够应对符合ISO-17799安全管理要求所要求的级别复杂性的能力。在本文中,我们将对Secure Tropos RE方法论的应用进行全面的案例研究,以符合特伦托大学关于隐私和数据保护的意大利立法,从而定义和分析了类似于ISO-17799的安全管理方法。方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号