loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Motoshi Saeki 1 ; Haruhiko Kaiya 2 and Satoshi Hattori 1

Affiliations: 1 Tokyo Institute of Technology, Japan ; 2 Shinshu University, Japan

ISBN: 978-989-674-009-2

Keyword(s): Requirements elicitation, Regulation, Model checking, Use case, Computational tree logic, Regulatory vulnerability.

Related Ontology Subjects/Areas/Topics: Requirements Elicitation and Specification ; Software Engineering ; Software Engineering Methods and Techniques

Abstract: This paper proposes a technique to apply model checking in order to show the regulatory compliance of requirements specifications written in use case models. We define three levels of regulatory vulnerability of a requirements specification by the situation of its non-compliance with regulations. For automatic compliance checking, the behavior of business processes and information systems are specified with use cases and they are translated into finite state transition machines. By using model checker SMV, we formally verify if the regulations that are represented with computational tree logic can be satisfied with the state machines.

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.206.241.26

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Saeki M.; Kaiya H.; Hattori S. and (2009). DETECTING REGULATORY VULNERABILITY IN FUNCTIONAL REQUIREMENTS SPECIFICATIONS.In Proceedings of the 4th International Conference on Software and Data Technologies - Volume 1: ICSOFT, ISBN 978-989-674-009-2, pages 105-114. DOI: 10.5220/0002240001050114

@conference{icsoft09,
author={Motoshi Saeki and Haruhiko Kaiya and Satoshi Hattori},
title={DETECTING REGULATORY VULNERABILITY IN FUNCTIONAL REQUIREMENTS SPECIFICATIONS},
booktitle={Proceedings of the 4th International Conference on Software and Data Technologies - Volume 1: ICSOFT,},
year={2009},
pages={105-114},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002240001050114},
isbn={978-989-674-009-2},
}

TY - CONF

JO - Proceedings of the 4th International Conference on Software and Data Technologies - Volume 1: ICSOFT,
TI - DETECTING REGULATORY VULNERABILITY IN FUNCTIONAL REQUIREMENTS SPECIFICATIONS
SN - 978-989-674-009-2
AU - Saeki, M.
AU - Kaiya, H.
AU - Hattori, S.
PY - 2009
SP - 105
EP - 114
DO - 10.5220/0002240001050114

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.