Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements

Duaa Alkubaisy, Karl Cox, Haralambos Mouratidis

Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

Abstract

requirement engineering live in a world were contradiction is the norm. Hence, development of software engineering is usually an adjustable and upgrading cyclical process. We found in the literature that some requirements conflict with other requirements. We will focus in this study on identification and resolution of conflicts between security and privacy requirements. Although, most the recent studies focus on identifying conflicts without proposing a solution to resolve it. This paper presents an approach to identifying and resolving conflicting privacy and security requirements as patterns. By using patterns to describe the problem we can propose a solution for each conflict.

Original languageEnglish
Title of host publicationProceedings
Subtitle of host publicationRCIS 2019 - IEEE 13th International Conference on Research Challenges in Information Science: Towards a Design Science for Information Systems
EditorsManuel Kolp, Jean Vanderdonckt, Monique Snoeck, Yves Wautelet
PublisherIEEE Computer Society
ISBN (Electronic)9781728148441
DOIs
Publication statusPublished - 31 May 2019
Event13th IEEE International Conference on Research Challenges in Information Science, RCIS 2019 - Brussels, Belgium
Duration: 29 May 201931 May 2019

Publication series

NameProceedings - International Conference on Research Challenges in Information Science
Volume2019-May
ISSN (Print)2151-1349
ISSN (Electronic)2151-1357

Conference

Conference13th IEEE International Conference on Research Challenges in Information Science, RCIS 2019
Country/TerritoryBelgium
CityBrussels
Period29/05/1931/05/19

Bibliographical note

© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Keywords

  • conflict
  • privacy requirements
  • security requirements
  • software engineering
  • strategy of resolution

Fingerprint

Dive into the research topics of 'Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements'. Together they form a unique fingerprint.

Cite this