loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Motoshi Saeki 1 ; Haruhiko Kaiya 2 and Satoshi Hattori 1

Affiliations: 1 Tokyo Institute of Technology, Japan ; 2 Shinshu University, Japan

Keyword(s): Requirements elicitation, Regulation, Model checking, Use case, Computational tree logic, Regulatory vulnerability.

Related Ontology Subjects/Areas/Topics: Requirements Elicitation and Specification ; Software Engineering ; Software Engineering Methods and Techniques

Abstract: This paper proposes a technique to apply model checking in order to show the regulatory compliance of requirements specifications written in use case models. We define three levels of regulatory vulnerability of a requirements specification by the situation of its non-compliance with regulations. For automatic compliance checking, the behavior of business processes and information systems are specified with use cases and they are translated into finite state transition machines. By using model checker SMV, we formally verify if the regulations that are represented with computational tree logic can be satisfied with the state machines.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.142.98.108

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Saeki, M.; Kaiya, H. and Hattori, S. (2009). DETECTING REGULATORY VULNERABILITY IN FUNCTIONAL REQUIREMENTS SPECIFICATIONS. In Proceedings of the 4th International Conference on Software and Data Technologies - Volume 1: ICSOFT; ISBN 978-989-674-009-2; ISSN 2184-2833, SciTePress, pages 105-114. DOI: 10.5220/0002240001050114

@conference{icsoft09,
author={Motoshi Saeki. and Haruhiko Kaiya. and Satoshi Hattori.},
title={DETECTING REGULATORY VULNERABILITY IN FUNCTIONAL REQUIREMENTS SPECIFICATIONS},
booktitle={Proceedings of the 4th International Conference on Software and Data Technologies - Volume 1: ICSOFT},
year={2009},
pages={105-114},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002240001050114},
isbn={978-989-674-009-2},
issn={2184-2833},
}

TY - CONF

JO - Proceedings of the 4th International Conference on Software and Data Technologies - Volume 1: ICSOFT
TI - DETECTING REGULATORY VULNERABILITY IN FUNCTIONAL REQUIREMENTS SPECIFICATIONS
SN - 978-989-674-009-2
IS - 2184-2833
AU - Saeki, M.
AU - Kaiya, H.
AU - Hattori, S.
PY - 2009
SP - 105
EP - 114
DO - 10.5220/0002240001050114
PB - SciTePress