Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation

Massacci, Fabio and Prest, Marco and Zannone, Nicola (2004) Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation. UNSPECIFIED. (Unpublished)

[img]
Preview
PDF
Download (595Kb) | Preview

    Abstract

    Extending Requirements Engineering modelling and formal analysis methodologies to cope with Security Requirements has been a major effort in the past decade. Yet, only few works describe complex case studies that show the ability of the informal and formal approaches to cope with the level complexity required by compliance with ISO-17799 security management requirements. In this paper we present a comprehensive case study of the application of the Secure Tropos RE methodology for the compliance to the Italian legislation on Privacy and Data Protection by the University of Trento, leading to the definition and analysis of a ISO-17799-like security management scheme.

    Item Type: Departmental Technical Report
    Department or Research center: Information Engineering and Computer Science
    Subjects: Q Science > QA Mathematics > QA076 Computer software
    Report Number: DIT-04-103
    Repository staff approval on: 03 Dec 2004

    Actions (login required)

    View Item