Why Defeasible Deontic Logic needs a Multi Preference Semantics
ECSQARU '95 Proceedings of the European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty
Building Expressive and Flexible Process Models Using a UML-Based Approach
EWSPT '01 Proceedings of the 8th European Workshop on Software Process Technology
Information extraction from case law and retrieval of prior cases
Artificial Intelligence - Special issue on AI and law
Legal Knowledge and Information Systems: Jurix 2003 the Sixteenth Annual Conference
Legal Knowledge and Information Systems: Jurix 2003 the Sixteenth Annual Conference
Logic-based regulation compliance-assistance
ICAIL '03 Proceedings of the 9th international conference on Artificial intelligence and law
Ontology-based Active Requirements Engineering Framework
APSEC '05 Proceedings of the 12th Asia-Pacific Software Engineering Conference
Privacy-preserving semantic interoperation and access control of heterogeneous databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Software Abstractions: Logic, Language, and Analysis
Software Abstractions: Logic, Language, and Analysis
Extracting rights and obligations from regulations: toward a tool-supported process
Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering
Analyzing Regulatory Rules for Privacy and Security Requirements
IEEE Transactions on Software Engineering
Requirements and compliance in legal systems: a logic approach
RELAW '08 Proceedings of the 2008 Requirements Engineering and Law
Regulations Expressed As Logical Models (REALM)
Proceedings of the 2005 conference on Legal Knowledge and Information Systems: JURIX 2005: The Eighteenth Annual Conference
Proceedings of the 2007 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the sixth SoMeT_07
Towards a framework for tracking legal compliance in healthcare
CAiSE'07 Proceedings of the 19th international conference on Advanced information systems engineering
Analysis of multilateral software confidentiality requirements
Analysis of multilateral software confidentiality requirements
Validating legal compliance: governance analysis method
Validating legal compliance: governance analysis method
Hi-index | 0.00 |
We present a model-based approach to extract governance requirements from the law and enterprise regulations, to formal specifications. This is the first step of an end-to-end implemented methodology for validating legal compliance of enterprises to law through logic models. Our UML-based Governance Extraction Model (GEM) is able to extract many legal and enterprise requirements, particularly business process and access-control requirements. Examples from Canadian and USA financial and privacy laws are provided. As a result of our extraction process, logic analyzers were shown to be able to detect compliance faults.