Publikation: A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria
Dateien
Datum
Herausgeber:innen
ISSN der Zeitschrift
Electronic ISSN
ISBN
Bibliografische Daten
Verlag
Schriftenreihe
Auflagebezeichnung
DOI (zitierfähiger Link)
Internationale Patentnummer
Angaben zur Forschungsförderung
Projekt
Open Access-Veröffentlichung
Core Facility der Universität Konstanz
Titel in einer weiteren Sprache
Publikationstyp
Publikationsstatus
Erschienen in
Zusammenfassung
We propose and apply a requirements engineering approach that focuses on security and privacy properties and takes into account various stakeholder interests. The proposed methodology facilitates the integration of security and privacy by design into the requirements engineering process. Thus, specific, detailed security and privacy requirements can be implemented from the very beginning of a software project. The method is applied to an exemplary application scenario in the logistics industry. The approach includes the application of threat and risk rating methodologies, a technique to derive technical requirements from legal texts, as well as a matching process to avoid duplication and accumulate all essential requirements.
Zusammenfassung in einer weiteren Sprache
Fachgebiet (DDC)
Schlagwörter
Konferenz
Rezension
Zitieren
ISO 690
ZINSMAIER, Sandra, Hanno LANGWEG, Marcel WALDVOGEL, 2020. A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria. 6th International Conference on Information Systems Security and Privacy. Valletta, Malta, 25. Feb. 2020 - 27. Feb. 2020. In: FURNELL, Steven, ed., Paolo MORI, ed., Edgar WEIPPL, ed. and others. Proceedings of the 6th International Conference on Information Systems Security and Privacy. Setúbal, Portugal: SCITEPRESS, 2020, pp. 473-480. ISBN 9789897583995. Available under: doi: 10.5220/0008960604730480BibTex
@inproceedings{Zinsmaier2020-02-25Pract-53098, year={2020}, doi={10.5220/0008960604730480}, title={A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria}, isbn={9789897583995}, publisher={SCITEPRESS}, address={Setúbal, Portugal}, booktitle={Proceedings of the 6th International Conference on Information Systems Security and Privacy}, pages={473--480}, editor={Furnell, Steven and Mori, Paolo and Weippl, Edgar}, author={Zinsmaier, Sandra and Langweg, Hanno and Waldvogel, Marcel} }
RDF
<rdf:RDF xmlns:dcterms="http://purl.org/dc/terms/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:void="http://rdfs.org/ns/void#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > <rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/53098"> <dc:creator>Zinsmaier, Sandra</dc:creator> <dc:contributor>Waldvogel, Marcel</dc:contributor> <dc:language>eng</dc:language> <dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <dcterms:issued>2020-02-25</dcterms:issued> <dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/> <dc:creator>Langweg, Hanno</dc:creator> <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2021-03-08T09:57:20Z</dcterms:available> <void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/> <dcterms:title>A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria</dcterms:title> <dcterms:abstract xml:lang="eng">We propose and apply a requirements engineering approach that focuses on security and privacy properties and takes into account various stakeholder interests. The proposed methodology facilitates the integration of security and privacy by design into the requirements engineering process. Thus, specific, detailed security and privacy requirements can be implemented from the very beginning of a software project. The method is applied to an exemplary application scenario in the logistics industry. The approach includes the application of threat and risk rating methodologies, a technique to derive technical requirements from legal texts, as well as a matching process to avoid duplication and accumulate all essential requirements.</dcterms:abstract> <foaf:homepage rdf:resource="http://localhost:8080/"/> <bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/53098"/> <dc:contributor>Langweg, Hanno</dc:contributor> <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2021-03-08T09:57:20Z</dc:date> <dc:creator>Waldvogel, Marcel</dc:creator> <dc:contributor>Zinsmaier, Sandra</dc:contributor> </rdf:Description> </rdf:RDF>