Title :
Finding Defects in Natural Language Confidentiality Requirements
Author :
Weber-Jahnke, Jens H. ; Onabajo, Adeniyi
Author_Institution :
Dept. of Comput. Sci., Univ. of Victoria, Victoria, BC, Canada
fDate :
Aug. 31 2009-Sept. 4 2009
Abstract :
Large-scale software systems must adhere to complex, multi-lateral security and privacy requirements from regulations. It is industrial practice to define such requirements in form of natural language (NL) documents. Currently existing approaches to analyzing NL confidentiality requirements rely on a manual linguistic transformation and normalization of the original text, prior to the analysis. This paper presents an alternative approach to analyzing requirements by using semantic annotations placed directly into the original NL documents. The benefits of this alternative approach are twofold: (1) it can effectively be supported by an interactive annotation tool and (2) there is a direct traceability between annotation structures and the original NL documents. We have evaluated our method and tool support using the same real-world case study that was used to evaluate the earlier linguistic approach. Our results show that our method generates the same results, i.e., it uncovers the same problems.
Keywords :
document handling; natural language processing; security of data; large-scale software systems; manual linguistic normalization; manual linguistic transformation; natural language confidentiality requirements; natural language documents; semantic annotation; Access control; Bridges; Computer science; Computer security; Large-scale systems; Law; Legal factors; Natural languages; Privacy; Software systems; annotations; conflicts; defaults; exceptions; goal-based models; incompleteness; requirements analysis;
Conference_Titel :
Requirements Engineering Conference, 2009. RE '09. 17th IEEE International
Conference_Location :
Atlanta, GA
Print_ISBN :
978-0-7695-3761-0