The Role of Logic in Computational Models of Legal Argument: A Critical Survey
Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part II
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
Requirements engineering for trust management: model, methodology, and reasoning
International Journal of Information Security
From Trust to Dependability through Risk Analysis
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Proceedings of the 11th international conference on Artificial intelligence and law
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Analyzing Regulatory Rules for Privacy and Security Requirements
IEEE Transactions on Software Engineering
Enforcing a security pattern in stakeholder goal models
Proceedings of the 4th ACM workshop on Quality of protection
Computer Standards & Interfaces
ER'05 Proceedings of the 24th international conference on Conceptual Modeling
Hi-index | 0.00 |
The traditional approach of computer scientists to Law is that laws (statutes, regulations, etc.) set the requirements, logicians and requirements analysts model them, and finally IT technical solutions or organizational patterns are used to implement them. In this paper we try to answer a radically different question: Can a technical solution (e.g. a requirement in a security and dependability pattern) be implemented by legal means? We show how Legal Patterns, that represent the legal analogy of Software Patterns, can be formally used to implement trust relations required by security and dependability patterns.