Eliciting confidentiality requirements in practice

  • Authors:
  • Seda Gürses;Jens H. Jahnke;Christina Obry;Adeniyi Onabajo;Thomas Santen;Morgan Price

  • Affiliations:
  • Department of Information Systems, Humboldt University, Berlin, Germany;Department of Computer Science, University of Victoria, Victoria, BC, Canada;Department of Computer Science, University of Victoria, Victoria, BC, Canada;Department of Computer Science, University of Victoria, Victoria, BC, Canada;Softwaretechnik, TU Berlin, Berlin, Germany;Department of Family Practice, University of British Columbia, Vancouver, BC, Canada

  • Venue:
  • CASCON '05 Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Confidentiality, the protection of unauthorized disclosure of information, plays an important role in information security of software systems. Security researchers have developed numerous approaches on how to implement confidentiality, typically based on cryptographic algorithms and tight access control. However, less work has been done on defining systematic methods on how to elicit and define confidentiality requirements in the first place. Moreover, most of these approaches are illustrated with simulated examples that do not capture the richness of real world experience. This paper reports on our experiences eliciting confidentiality requirements in a real world project in the health care area. The method applied originates from the M.Sc. thesis of one of the authors and is still considered work in progress. Still, valuable insight into issues of confidentiality requirements engineering can be gained from this case study and we expect that its publication will become a basis for discussion and the definition of a further research agenda in this area.