920 research outputs found

    Modeling security and privacy requirements: A use case-driven approach

    Get PDF
    Context: Modern internet-based services, ranging from food-delivery to home-caring, leverage the availability of multiple programmable devices to provide handy services tailored to end-user needs. These services are delivered through an ecosystem of device-specific software components and interfaces (e.g., mobile and wearable device applications). Since they often handle private information (e.g., location and health status), their security and privacy requirements are of crucial importance. Defining and analyzing those requirements is a significant challenge due to the multiple types of software components and devices integrated into software ecosystems. Each software component presents peculiarities that often depend on the context and the devices the component interact with, and that must be considered when dealing with security and privacy requirements. Objective: In this paper, we propose, apply, and assess a modeling method that supports the specification of security and privacy requirements in a structured and analyzable form. Our motivation is that, in many contexts, use cases are common practice for the elicitation of functional requirements and should also be adapted for describing security requirements. Method: We integrate an existing approach for modeling security and privacy requirements in terms of security threats, their mitigations, and their relations to use cases in a misuse case diagram. We introduce new security-related templates, i.e., a mitigation template and a misuse case template for specifying mitigation schemes and misuse case specifications in a structured and analyzable manner. Natural language processing can then be used to automatically report inconsistencies among artifacts and between the templates and specifications. Results: We successfully applied our approach to an industrial healthcare project and report lessons learned and results from structured interviews with engineers. Conclusion: Since our approach supports the precise specification and analysis of security threats, threat scenarios and their mitigations, it also supports decision making and the analysis of compliance to standards

    Development of a Radiology Information Systems (RIS)

    Get PDF
    Un sistema d'informació de radiologia o RIS és un sistema de programari unificat que té com a objectiu gestionar totes les dades i donar suport a tots els processos de negoci i fluxos de treball necessaris en un centre de radiologia. Aquest document mostra el procés de dissenyar, desenvolupar, i implantar una solució de nova creació. En aquest document s'explica tot el procés des de l'anàlisi prèvia fins al resultat final. És important tenir en compte que, a causa de les restriccions d'extensió i de temps, s'ha seleccionat acuradament un abast representatiu més reduït de manera que encara il·lustra el millor posible el projecte.A Radiology Information System or RIS is a unified software system which that aims to manage all the data and support all the required business processes and workflows in a radiology center. This document showcases the process of designing, developing, and implanting a newly created solution. The whole process starting from the prior analysis up to the final result is explained in this document. It is important to note that due to extension and time constraints, a smaller representative scope has been carefully selected in a way that still illustrates the larger project as best as possible
    corecore